WorldWideScience

Sample records for id subdivision scheme

  1. Shape Preserving Interpolatory Subdivision Schemes for Nonuniform Data

    NARCIS (Netherlands)

    Kuijt, F.; van Damme, Rudolf M.J.

    2002-01-01

    This article is concerned with a class of shape preserving four-point subdivision schemes which are stationary and which interpolate nonuniform univariate data {(xi, fi)}. These data are functional data, i.e., xi≠xj if i≠j. Subdivision for the strictly monotone x-values is performed by a subdivision

  2. A fast and accurate dihedral interpolation loop subdivision scheme

    Science.gov (United States)

    Shi, Zhuo; An, Yalei; Wang, Zhongshuai; Yu, Ke; Zhong, Si; Lan, Rushi; Luo, Xiaonan

    2018-04-01

    In this paper, we propose a fast and accurate dihedral interpolation Loop subdivision scheme for subdivision surfaces based on triangular meshes. In order to solve the problem of surface shrinkage, we keep the limit condition unchanged, which is important. Extraordinary vertices are handled using modified Butterfly rules. Subdivision schemes are computationally costly as the number of faces grows exponentially at higher levels of subdivision. To address this problem, our approach is to use local surface information to adaptively refine the model. This is achieved simply by changing the threshold value of the dihedral angle parameter, i.e., the angle between the normals of a triangular face and its adjacent faces. We then demonstrate the effectiveness of the proposed method for various 3D graphic triangular meshes, and extensive experimental results show that it can match or exceed the expected results at lower computational cost.

  3. Statistical and Geometrical Way of Model Selection for a Family of Subdivision Schemes

    Institute of Scientific and Technical Information of China (English)

    Ghulam MUSTAFA

    2017-01-01

    The objective of this article is to introduce a generalized algorithm to produce the m-point n-ary approximating subdivision schemes (for any integer m,n ≥ 2).The proposed algorithm has been derived from uniform B-spline blending functions.In particular,we study statistical and geometrical/traditional methods for the model selection and assessment for selecting a subdivision curve from the proposed family of schemes to model noisy and noisy free data.Moreover,we also discuss the deviation of subdivision curves generated by proposed family of schemes from convex polygonal curve.Furthermore,visual performances of the schemes have been presented to compare numerically the Gibbs oscillations with the existing family of schemes.

  4. Enhancing privacy of users in eID schemes

    NARCIS (Netherlands)

    Shrishak, Kris; Erkin, Z.; Schaar, Remco

    2016-01-01

    In todays world transactions are increasingly being performed over the internetbut require identication of users as in face-to-face transactions. In order to facilitate eGovernance as well as other eCommerce services Electronic Identiation(eID) schemes, which intend to provide unique and reliable

  5. Time-and-ID-Based Proxy Reencryption Scheme

    OpenAIRE

    Mtonga, Kambombo; Paul, Anand; Rho, Seungmin

    2014-01-01

    Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled wi...

  6. Time-and-ID-Based Proxy Reencryption Scheme

    Directory of Open Access Journals (Sweden)

    Kambombo Mtonga

    2014-01-01

    Full Text Available Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE. We prove that our scheme is semantically secure in the standard model.

  7. Comparison of different interpolation operators including nonlinear subdivision schemes in the simulation of particle trajectories

    International Nuclear Information System (INIS)

    Bensiali, Bouchra; Bodi, Kowsik; Ciraolo, Guido; Ghendrih, Philippe; Liandrat, Jacques

    2013-01-01

    In this work, we compare different interpolation operators in the context of particle tracking with an emphasis on situations involving velocity field with steep gradients. Since, in this case, most classical methods give rise to the Gibbs phenomenon (generation of oscillations near discontinuities), we present new methods for particle tracking based on subdivision schemes and especially on the Piecewise Parabolic Harmonic (PPH) scheme which has shown its advantage in image processing in presence of strong contrasts. First an analytic univariate case with a discontinuous velocity field is considered in order to highlight the effect of the Gibbs phenomenon on trajectory calculation. Theoretical results are provided. Then, we show, regardless of the interpolation method, the need to use a conservative approach when integrating a conservative problem with a velocity field deriving from a potential. Finally, the PPH scheme is applied in a more realistic case of a time-dependent potential encountered in the edge turbulence of magnetically confined plasmas, to compare the propagation of density structures (turbulence bursts) with the dynamics of test particles. This study highlights the difference between particle transport and density transport in turbulent fields

  8. An enhanced dynamic ID-based authentication scheme for telecare medical information systems

    Directory of Open Access Journals (Sweden)

    Ankita Chaturvedi

    2017-01-01

    Full Text Available The authentication schemes for telecare medical information systems (TMIS try to ensure secure and authorized access. ID-based authentication schemes address secure communication, but privacy is not properly addressed. In recent times, dynamic ID-based remote user authentication schemes for TMIS have been presented to protect user’s privacy. The dynamic ID-based authentication schemes efficiently protect the user’s privacy. Unfortunately, most of the existing dynamic ID-based authentication schemes for TMIS ignore the input verifying condition. This makes login and password change phases inefficient. Inefficiency of the password change phase may lead to denial of service attack in the case of incorrect input in the password change phase. To overcome these weaknesses, we proposed a new dynamic ID-based authentication scheme using a smart card. The proposed scheme can quickly detect incorrect inputs which makes the login and password change phase efficient. We adopt the approach with the aim to protect privacy, and efficient login and password change phases. The proposed scheme also resists off-line password guessing attack and denial of service attack. We also demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham logic. In addition, our scheme is comparable in terms of the communication and computational overheads with relevant schemes for TMIS.

  9. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  10. Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment

    Directory of Open Access Journals (Sweden)

    Sang-Soo Yeo

    2014-01-01

    Full Text Available This paper presents the vulnerabilities analyses of KL scheme which is an ID-based authentication scheme for AMI network attached SCADA in smart grid and proposes a security-enhanced authentication scheme which satisfies forward secrecy as well as security requirements introduced in KL scheme and also other existing schemes. The proposed scheme uses MDMS which is the supervising system located in an electrical company as a time-synchronizing server in order to synchronize smart devices at home and conducts authentication between smart meter and smart devices using a new secret value generated by an OTP generator every session. The proposed scheme has forward secrecy, so it increases overall security, but its communication and computation overhead reduce its performance slightly, comparing the existing schemes. Nonetheless, hardware specification and communication bandwidth of smart devices will have better conditions continuously, so the proposed scheme would be a good choice for secure AMI environment.

  11. An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme

    Directory of Open Access Journals (Sweden)

    Juan Qu

    2013-01-01

    Full Text Available In recent years, several dynamic ID-based remote user authentication schemes have been proposed. In 2012, Wen and Li proposed a dynamic ID-based remote user authentication with key agreement scheme. They claimed that their scheme can resist impersonation attack and insider attack and provide anonymity for the users. However, we will show that Wen and Li's scheme cannot withstand insider attack and forward secrecy, does not provide anonymity for the users, and inefficiency for error password login. In this paper, we propose a novel ECC-based remote user authentication scheme which is immune to various known types of attack and is more secure and practical for mobile clients.

  12. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  13. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  14. A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.

    Science.gov (United States)

    Chang, Ya-Fen; Chen, Chia-Chen; Chang, Pei-Yu

    2013-04-01

    Nowadays, users/patients may gain desired medical services on-line because of the rapid development of computer network technologies. Conventional healthcare services are provided by a single server. However, care team collaboration by integrating services is the key to improve financial and clinical performance. How a user/patient accesses desired medical services provided by multiple servers becomes a challenge to realize care team collaboration. User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In this paper, we first discuss the perceived security drawbacks of pervasive smart-card-based remote user authentication schemes. Then, we propose a novel dynamic-ID-based user authentication scheme based on elliptic curve cryptosystem (ECC) for multi-server environment with smart cards. The proposed scheme ensures user anonymity and computational efficiency and complies with essential requirements of a secure smart-card-based authentication scheme for multi-server environment to enable care team collaboration.

  15. New techniques for subdivision modelling

    OpenAIRE

    BEETS, Koen

    2006-01-01

    In this dissertation, several tools and techniques for modelling with subdivision surfaces are presented. Based on the huge amount of theoretical knowledge about subdivision surfaces, we present techniques to facilitate practical 3D modelling which make subdivision surfaces even more useful. Subdivision surfaces have reclaimed attention several years ago after their application in full-featured 3D animation movies, such as Toy Story. Since then and due to their attractive properties an ever i...

  16. Simplifying massive planar subdivisions

    DEFF Research Database (Denmark)

    Arge, Lars; Truelsen, Jakob; Yang, Jungwoo

    2014-01-01

    We present the first I/O- and practically-efficient algorithm for simplifying a planar subdivision, such that no point is moved more than a given distance εxy and such that neighbor relations between faces (homotopy) are preserved. Under some practically realistic assumptions, our algorithm uses ....... For example, for the contour map simplification problem it is significantly faster than the previous algorithm, while obtaining approximately the same simplification factor. Read More: http://epubs.siam.org/doi/abs/10.1137/1.9781611973198.3...

  17. Gender differences in functional connectivities between insular subdivisions and selective pain-related brain structures.

    Science.gov (United States)

    Dai, Yu-Jie; Zhang, Xin; Yang, Yang; Nan, Hai-Yan; Yu, Ying; Sun, Qian; Yan, Lin-Feng; Hu, Bo; Zhang, Jin; Qiu, Zi-Yu; Gao, Yi; Cui, Guang-Bin; Chen, Bi-Liang; Wang, Wen

    2018-03-14

    The incidence of pain disorders in women is higher than in men, making gender differences in pain a research focus. The human insular cortex is an important brain hub structure for pain processing and is divided into several subdivisions, serving different functions in pain perception. Here we aimed to examine the gender differences of the functional connectivities (FCs) between the twelve insular subdivisions and selected pain-related brain structures in healthy adults. Twenty-six healthy males and 11 age-matched healthy females were recruited in this cross-sectional study. FCs between the 12 insular subdivisions (as 12 regions of interest (ROIs)) and the whole brain (ROI-whole brain level) or 64 selected pain-related brain regions (64 ROIs, ROI-ROI level) were measured between the males and females. Significant gender differences in the FCs of the insular subdivisions were revealed: (1) The FCs between the dorsal dysgranular insula (dId) and other brain regions were significantly increased in males using two different techniques (ROI-whole brain and ROI-ROI analyses); (2) Based on the ROI-whole brain analysis, the FC increases in 4 FC-pairs were observed in males, including the left dId - the right median cingulate and paracingulate/ right posterior cingulate gyrus/ right precuneus, the left dId - the right median cingulate and paracingulate, the left dId - the left angular as well as the left dId - the left middle frontal gyrus; (3) According to the ROI-ROI analysis, increased FC between the left dId and the right rostral anterior cingulate cortex was investigated in males. In summary, the gender differences in the FCs of the insular subdivisions with pain-related brain regions were revealed in the current study, offering neuroimaging evidence for gender differences in pain processing. ClinicalTrials.gov, NCT02820974 . Registered 28 June 2016.

  18. Generalization of binary tensor product schemes depends upon four parameters

    International Nuclear Information System (INIS)

    Bashir, R.; Bari, M.; Mustafa, G.

    2018-01-01

    This article deals with general formulae of parametric and non parametric bivariate subdivision scheme with four parameters. By assigning specific values to those parameters we get some special cases of existing tensor product schemes as well as a new proposed scheme. The behavior of schemes produced by the general formulae is interpolating, approximating and relaxed. Approximating bivariate subdivision schemes produce some other surfaces as compared to interpolating bivariate subdivision schemes. Polynomial reproduction and polynomial generation are desirable properties of subdivision schemes. Capability of polynomial reproduction and polynomial generation is strongly connected with smoothness, sum rules, convergence and approximation order. We also calculate the polynomial generation and polynomial reproduction of 9-point bivariate approximating subdivision scheme. Comparison of polynomial reproduction, polynomial generation and continuity of existing and proposed schemes has also been established. Some numerical examples are also presented to show the behavior of bivariate schemes. (author)

  19. Subdivision, Sampling, and Initialization Strategies for Simplical Branch and Bound in Global Optimization

    DEFF Research Database (Denmark)

    Clausen, Jens; Zilinskas, A,

    2002-01-01

    We consider the problem of optimizing a Lipshitzian function. The branch and bound technique is a well-known solution method, and the key components for this are the subdivision scheme, the bound calculation scheme, and the initialization. For Lipschitzian optimization, the bound calculations are...

  20. Optimal Spatial Subdivision method for improving geometry navigation performance in Monte Carlo particle transport simulation

    International Nuclear Information System (INIS)

    Chen, Zhenping; Song, Jing; Zheng, Huaqing; Wu, Bin; Hu, Liqin

    2015-01-01

    Highlights: • The subdivision combines both advantages of uniform and non-uniform schemes. • The grid models were proved to be more efficient than traditional CSG models. • Monte Carlo simulation performance was enhanced by Optimal Spatial Subdivision. • Efficiency gains were obtained for realistic whole reactor core models. - Abstract: Geometry navigation is one of the key aspects of dominating Monte Carlo particle transport simulation performance for large-scale whole reactor models. In such cases, spatial subdivision is an easily-established and high-potential method to improve the run-time performance. In this study, a dedicated method, named Optimal Spatial Subdivision, is proposed for generating numerically optimal spatial grid models, which are demonstrated to be more efficient for geometry navigation than traditional Constructive Solid Geometry (CSG) models. The method uses a recursive subdivision algorithm to subdivide a CSG model into non-overlapping grids, which are labeled as totally or partially occupied, or not occupied at all, by CSG objects. The most important point is that, at each stage of subdivision, a conception of quality factor based on a cost estimation function is derived to evaluate the qualities of the subdivision schemes. Only the scheme with optimal quality factor will be chosen as the final subdivision strategy for generating the grid model. Eventually, the model built with the optimal quality factor will be efficient for Monte Carlo particle transport simulation. The method has been implemented and integrated into the Super Monte Carlo program SuperMC developed by FDS Team. Testing cases were used to highlight the performance gains that could be achieved. Results showed that Monte Carlo simulation runtime could be reduced significantly when using the new method, even as cases reached whole reactor core model sizes

  1. Nanothermodynamics: a subdivision potential approach

    Directory of Open Access Journals (Sweden)

    R. Moussavi

    2005-12-01

    Full Text Available  Classical thermodynamic laws and relations have been developed for macroscopic systems that satisfy the thermodynamic limit. These relations are challenged as the system size decreases to the scale of nano-systems, in which thermodynamic properties are overshadowed by system size, and the usual classical concepts of extensivity and intensivity are no longer valid. The challenges to the classical thermodynamics in relation to small systems are demonstrated, and via the approach introduced by Hill, the concept of sub-division potential is clarified in details. The fundamental thermodynamic relations are obtained using a rational-based method.

  2. Subdivision of Texas watersheds for hydrologic modeling.

    Science.gov (United States)

    2009-06-01

    The purpose of this report is to present a set of findings and examples for subdivision of watersheds for hydrologic modeling. Three approaches were used to examine the impact of watershed subdivision on modeled hydrologic response: (1) An equal-area...

  3. Work Planing Automation at Mechanical Subdivision

    OpenAIRE

    Dzindzelėta, Vytautas

    2005-01-01

    Work planing automation, installation possibilities and future outlook at mechanical subdivision. To study how the work planing has changed before and after automation process and to analyse automation process methodology.

  4. AN INTERPOLATING CURVE SUBDIVISION SCHEME BASED ON DISCRETE FIRST DERIVATIVE

    Directory of Open Access Journals (Sweden)

    ALBEIRO ESPINOSA BEDOYA

    2013-01-01

    tortuosidad. Un análisis de las distribuciones de frecuencia obtenidas para esta propiedad, empleando la prueba de KruskalWallis, revela que el esquema DFDS posee los menores valores de tortuosidad en un rango más estrecho.

  5. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  6. Effect of Watertight Subdivision on Subdivision Index for Medium Size Ro–Ro Passenger Ferries

    Directory of Open Access Journals (Sweden)

    M. Pawlowski

    2017-09-01

    Full Text Available Ro-pax vessels should fulfil the requirements of the current harmonised SOLAS Convention. The study analyses the effect of various ro-pax vessel subdivision arrangements on the subdivision index. A Polish ferry was chosen as a generic ship to perform the study. For illustration of damage survivability, the attained subdivision index A was calculated for a number of modified configurations. The arrangements included single and double sides above and below the car deck, with and without a double buoyant car deck. The conclusions of the study can be used in the design of new ro-pax vessels.

  7. Planet map generation by tetrahedral subdivision

    DEFF Research Database (Denmark)

    Mogensen, Torben Ægidius

    2010-01-01

    We present a method for generating pseudo-random, zoomable planet maps for games and art.  The method is based on spatial subdivision using tetrahedrons.  This ensures planet maps without discontinuities caused by mapping a flat map onto a sphere. We compare the method to other map...

  8. Using subdivision surfaces and adaptive surface simplification algorithms for modeling chemical heterogeneities in geophysical flows

    Science.gov (United States)

    Schmalzl, JöRg; Loddoch, Alexander

    2003-09-01

    We present a new method for investigating the transport of an active chemical component in a convective flow. We apply a three-dimensional front tracking method using a triangular mesh. For the refinement of the mesh we use subdivision surfaces which have been developed over the last decade primarily in the field of computer graphics. We present two different subdivision schemes and discuss their applicability to problems related to fluid dynamics. For adaptive refinement we propose a weight function based on the length of triangle edge and the sum of the angles of the triangle formed with neighboring triangles. In order to remove excess triangles we apply an adaptive surface simplification method based on quadric error metrics. We test these schemes by advecting a blob of passive material in a steady state flow in which the total volume is well preserved over a long time. Since for time-dependent flows the number of triangles may increase exponentially in time we propose the use of a subdivision scheme with diffusive properties in order to remove the small scale features of the chemical field. By doing so we are able to follow the evolution of a heavy chemical component in a vigorously convecting field. This calculation is aimed at the fate of a heavy layer at the Earth's core-mantle boundary. Since the viscosity variation with temperature is of key importance we also present a calculation with a strongly temperature-dependent viscosity.

  9. Interoperability for electronic ID

    OpenAIRE

    Zygadlo, Zuzanna

    2009-01-01

    Electronic Business, including eBanking, eCommerce and eGovernmental services, is today based on a large variety of security solutions, comprising electronic IDs provided by a broad community of Public Key Infrastructure (PKI) vendors. Significant differences in implementations of those solutions introduce a problem of lack of interoperability in electronic business, which have not yet been resolved by standardization and interoperability initiatives based on existing PKI trust models. It i...

  10. FlowIDS

    OpenAIRE

    Sabolčák, Peter

    2006-01-01

    FlowIDS is system which can detect some of the undesirable traffi c in computer networks (undesirable traffic could be also ie. virus activity or overloading of network) and mostly doing counteraction which are set by administrator. Information about data ows are provided by hardware of network infrastructure, eliminitaion of undesirable activity is done through changes in network hardware settings. Regarding the quantity of solution which are provided on market, I decided to focus on Cisco n...

  11. Testing block subdivision algorithms on block designs

    Science.gov (United States)

    Wiseman, Natalie; Patterson, Zachary

    2016-01-01

    Integrated land use-transportation models predict future transportation demand taking into account how households and firms arrange themselves partly as a function of the transportation system. Recent integrated models require parcels as inputs and produce household and employment predictions at the parcel scale. Block subdivision algorithms automatically generate parcel patterns within blocks. Evaluating block subdivision algorithms is done by way of generating parcels and comparing them to those in a parcel database. Three block subdivision algorithms are evaluated on how closely they reproduce parcels of different block types found in a parcel database from Montreal, Canada. While the authors who developed each of the algorithms have evaluated them, they have used their own metrics and block types to evaluate their own algorithms. This makes it difficult to compare their strengths and weaknesses. The contribution of this paper is in resolving this difficulty with the aim of finding a better algorithm suited to subdividing each block type. The proposed hypothesis is that given the different approaches that block subdivision algorithms take, it's likely that different algorithms are better adapted to subdividing different block types. To test this, a standardized block type classification is used that consists of mutually exclusive and comprehensive categories. A statistical method is used for finding a better algorithm and the probability it will perform well for a given block type. Results suggest the oriented bounding box algorithm performs better for warped non-uniform sites, as well as gridiron and fragmented uniform sites. It also produces more similar parcel areas and widths. The Generalized Parcel Divider 1 algorithm performs better for gridiron non-uniform sites. The Straight Skeleton algorithm performs better for loop and lollipop networks as well as fragmented non-uniform and warped uniform sites. It also produces more similar parcel shapes and patterns.

  12. N -Ink Printer Characterization With Barycentric Subdivision.

    Science.gov (United States)

    Babaei, Vahid; Hersch, Roger D

    2016-07-01

    Printing with a large number of inks, also called N -ink printing, is a challenging task. The challenges comprise spectral modeling of the printer, color separation, halftoning, and limitations of the amount of inks. Juxtaposed halftoning, a perfectly dot-off-dot halftoning method, has proved to be useful to address some of these challenges. However, for juxtaposed halftones, prediction of colors as a function of ink area coverages has not yet been fully investigated. The goal of this paper is to introduce a spectral prediction model for N -ink juxtaposed-halftone prints. As the area-coverage domain of juxtaposed inks forms a simplex, we propose a cellular subdivision of the area-coverage domain using the barycentric subdivision of simplexes. The barycentric subdivision provides algorithmically straightforward means to design and implement an N -ink color prediction model. Within the subdomain cells, the Yule-Nielsen spectral Neugebauer model is used for the spectral prediction. Our proposed model is highly accurate for prints with a large number of inks while requiring a relatively low number of calibration samples.

  13. Variational reconstruction using subdivision surfaces with continuous sharpness control

    Institute of Scientific and Technical Information of China (English)

    Xiaoqun Wu; Jianmin Zheng; Yiyu Cai; Haisheng Li

    2017-01-01

    We present a variational method for subdivision surface reconstruction from a noisy dense mesh.A new set of subdivision rules with continuous sharpness control is introduced into Loop subdivision for better modeling subdivision surface features such as semi-sharp creases,creases,and corners.The key idea is to assign a sharpness value to each edge of the control mesh to continuously control the surface features.Based on the new subdivision rules,a variational model with L1 norm is formulated to find the control mesh and the corresponding sharpness values of the subdivision surface that best fits the input mesh.An iterative solver based on the augmented Lagrangian method and particle swarm optimization is used to solve the resulting non-linear,non-differentiable optimization problem.Our experimental results show that our method can handle meshes well with sharp/semi-sharp features and noise.

  14. Orienting the Neighborhood: A Subdivision Energy Analysis Tool; Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Christensen, C.; Horowitz, S.

    2008-07-01

    This paper describes a new computerized Subdivision Energy Analysis Tool being developed to allow users to interactively design subdivision street layouts while receiving feedback about energy impacts based on user-specified building design variants and availability of roof surfaces for photovoltaic and solar water heating systems.

  15. Prototype design based on NX subdivision modeling application

    Science.gov (United States)

    Zhan, Xianghui; Li, Xiaoda

    2018-04-01

    Prototype design is an important part of the product design, through a quick and easy way to draw a three-dimensional product prototype. Combined with the actual production, the prototype could be modified several times, resulting in a highly efficient and reasonable design before the formal design. Subdivision modeling is a common method of modeling product prototypes. Through Subdivision modeling, people can in a short time with a simple operation to get the product prototype of the three-dimensional model. This paper discusses the operation method of Subdivision modeling for geometry. Take a vacuum cleaner as an example, the NX Subdivision modeling functions are applied. Finally, the development of Subdivision modeling is forecasted.

  16. Facts about Infectious Diseases (ID)

    Science.gov (United States)

    ... an ID Specialist? Facts about ID Pocketcard Infectious diseases are caused by microscopic organisms that penetrate the body’s natural ... from diseases such as AIDS or treatment of diseases such as cancer, may allow ... of contaminated food or water, bites from vectors such as ticks or mosquitoes ...

  17. Key Technical Aspects Influencing the Accuracy of Tablet Subdivision.

    Science.gov (United States)

    Teixeira, Maíra T; Sá-Barreto, Lívia C L; Gratieri, Taís; Gelfuso, Guilherme M; Silva, Izabel C R; Cunha-Filho, Marcílio S S

    2017-05-01

    Tablet subdivision is a common practice used mainly for dose adjustment. The aim of this study was to investigate how the technical aspects of production as well as the method of tablets subdivision (employing a tablet splitter or a kitchen knife) influence the accuracy of this practice. Five drugs commonly used as subdivided tablets were selected. For each drug, the innovator drug product, a scored-generic and a non-scored generic were investigated totalizing fifteen drug products. Mechanical and physical tests, including image analysis, were performed. Additionally, comparisons were made between tablet subdivision method, score, shape, diluent composition and coating. Image analysis based on surface area was a useful tool as an alternative assay to evaluate the accuracy of tablet subdivision. The tablet splitter demonstrates an advantage relative to a knife as it showed better results in weight loss and friability tests. Oblong, coated and scored tablets had better results after subdivision than round, uncoated and non-scored tablets. The presence of elastic diluents such as starch and dibasic phosphate dehydrate conferred a more appropriate behaviour for the subdivision process than plastic materials such as microcrystalline cellulose and lactose. Finally, differences were observed between generics and their innovator products in all selected drugs with regard the quality control assays in divided tablet, which highlights the necessity of health regulations to consider subdivision performance at least in marketing authorization of generic products.

  18. Revocable ID-Based Signature with Short Size over Lattices

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-01-01

    Full Text Available In the past, many ID-based signature (IBS schemes based on the integer factorization or discrete logarithm problems were proposed. With the progress on the development of quantum technology, IBS schemes mentioned above would become vulnerable. Recently, several IBS schemes over lattices were proposed to be secure against attacks in the quantum era. As conventional public-key settings, ID-based public-key settings have to offer a revocation mechanism to revoke misbehaving or malicious users. However, in the past, little work focuses on the revocation problem in the IBS schemes over lattices. In this article, we propose a new revocable IBS (RIBS scheme with short size over lattices. Based on the short integer solution (SIS assumption, we prove that the proposed RIBS scheme provides existential unforgeability against adaptive chosen-message attacks. As compared to the existing IBS schemes over lattices, our RIBS scheme has better performance in terms of signature size, signing key size, and the revocation mechanism with public channels.

  19. Effects of Worldwide Population Subdivision on ALDH2 Linkage Disequilibrium

    OpenAIRE

    Peterson, Raymond J.; Goldman, David; Long, Jeffrey C.

    1999-01-01

    The effect of human population subdivision on linkage disequilibrium has previously been studied for unlinked genes. However, no study has focused on closely linked polymorphisms or formally partitioned linkage disequilibrium within and among worldwide populations. With an emphasis on population subdivision, the goal of this paper is to investigate the causes of linkage disequilibrium in ALDH2, the gene that encodes aldehyde dehydrogenase 2. Haplotypes for 756 people from 17 populations acros...

  20. Orienting the Neighborhood: A Subdivision Energy Analysis Tool

    Energy Technology Data Exchange (ETDEWEB)

    Christensen, C.; Horowitz, S.

    2008-01-01

    In subdivisions, house orientations are largely determined by street layout. The resulting house orientations affect energy consumption (annual and on-peak) for heating and cooling, depending on window area distributions and shading from neighboring houses. House orientations also affect energy production (annual and on-peak) from solar thermal and photovoltaic systems, depending on available roof surfaces. Therefore, house orientations fundamentally influence both energy consumption and production, and an appropriate street layout is a prerequisite for taking full advantage of energy efficiency and renewable energy opportunities. The potential influence of street layout on solar performance is often acknowledged, but solar and energy issues must compete with many other criteria and constraints that influence subdivision street layout. When only general guidelines regarding energy are available, these factors may be ignored or have limited effect. Also, typical guidelines are often not site-specific and do not account for local parameters such as climate and the time value of energy. For energy to be given its due consideration in subdivision design, energy impacts need to be accurately quantified and displayed interactively to facilitate analysis of design alternatives. This paper describes a new computerized Subdivision Energy Analysis Tool being developed to allow users to interactively design subdivision street layouts while receiving feedback about energy impacts based on user-specified building design variants and availability of roof surfaces for photovoltaic and solar water heating systems.

  1. An Improved QTM Subdivision Model with Approximate Equal-area

    Directory of Open Access Journals (Sweden)

    ZHAO Xuesheng

    2016-01-01

    Full Text Available To overcome the defect of large area deformation in the traditional QTM subdivision model, an improved subdivision model is proposed which based on the “parallel method” and the thought of the equal area subdivision with changed-longitude-latitude. By adjusting the position of the parallel, this model ensures that the grid area between two adjacent parallels combined with no variation, so as to control area variation and variation accumulation of the QTM grid. The experimental results show that this improved model not only remains some advantages of the traditional QTM model(such as the simple calculation and the clear corresponding relationship with longitude/latitude grid, etc, but also has the following advantages: ①this improved model has a better convergence than the traditional one. The ratio of area_max/min finally converges to 1.38, far less than 1.73 of the “parallel method”; ②the grid units in middle and low latitude regions have small area variations and successive distributions; meanwhile, with the increase of subdivision level, the grid units with large variations gradually concentrate to the poles; ③the area variation of grid unit will not cumulate with the increasing of subdivision level.

  2. Insular subdivisions functional connectivity dysfunction within major depressive disorder.

    Science.gov (United States)

    Peng, Xiaolong; Lin, Pan; Wu, Xiaoping; Gong, Ruxue; Yang, Rui; Wang, Jue

    2018-02-01

    Major depressive disorder (MDD) is a mental disorder characterized by cognitive and affective deficits. Previous studies suggested that insula is a crucial node of the salience network for initiating network switching, and dysfunctional connection to this region may be related to the mechanism of MDD. In this study, we systematically investigated and quantified the altered functional connectivity (FC) of the specific insular subdivisions and its relationship to psychopathology of MDD. Resting-state FC of insular subdivisions, including bilateral ventral/dorsal anterior insula and posterior insula, were estimated in 19 MDD patients and 19 healthy controls. Abnormal FC was quantified between groups. Additionally, we investigated the relationships between insular connectivity and depressive symptom severity. MDD patients demonstrated aberrant FC for insular subdivisions to superior temporal sulcus, inferior prefrontal gyrus, amygdala and posterior parietal cortex. Moreover, depression symptoms (Hamilton Depression Rating Scale and Hamilton Anxiety Rating Scale scorers) were associated with the FC values of insular subdivisions. First, the sample size of our current study is relatively small, which may affect the statistic power. Second, using standardized insular subdivision seeds for FC analyses may neglect subtle natural differences in size and location of functional area across individuals and may thus affect connectivity maps. Abnormal FC of insular subdivisions to default network and central executive network may represent impaired intrinsic networks switching which may affect the underlying emotional and sensory disturbances in MDD. And our findings can help to understand the pathophysiology and underlying neural mechanisms of MDD. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Divided Spheres Geodesics and the Orderly Subdivision of the Sphere

    CERN Document Server

    Popko, Edward S

    2012-01-01

    This well-illustrated book-in color throughout-presents a thorough introduction to the mathematics of Buckminster Fuller's invention of the geodesic dome, which paved the way for a flood of practical applications as diverse as weather forecasting and fish farms. The author explains the principles of spherical design and the three main categories of subdivision based on geometric solids (polyhedra). He illustrates how basic and advanced CAD techniques apply to spherical subdivision and covers modern applications in product design, engineering, science, games, and sports balls.

  4. ID based cryptography for secure cloud data storage

    OpenAIRE

    Kaaniche , Nesrine; Boudguiga , Aymen; Laurent , Maryline

    2013-01-01

    International audience; This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the commercial cloud providers. It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-Based Cryptography. Our solution has several advantages. First, it provides secrecy for encrypted data which are stored in public servers. Second, it offers controlled data access and sharing among users, so that unauthorized us...

  5. Totally odd K-4-subdivisions in 4-chromatic graphs

    DEFF Research Database (Denmark)

    Thomassen, Carsten

    2001-01-01

    We prove the conjecture made by Bjarne Toft in 1975 that every 4-chromatic graph contains a subdivision of K-4 in which each edge of K-4 corresponds to a path of odd length. As an auxiliary result we characterize completely the subspace of the cycle space generated by all cycles through two fixed...

  6. 29 CFR 541.103 - Department or subdivision.

    Science.gov (United States)

    2010-07-01

    ... example, a large employer's human resources department might have subdivisions for labor relations, pensions and other benefits, equal employment opportunity, and personnel management, each of which has a... to time to a specific job or series of jobs and a unit with permanent status and function. A...

  7. 24 CFR 1710.115 - Subdivision characteristics and climate.

    Science.gov (United States)

    2010-04-01

    ... erosion, sedimentation or periodic flooding throughout the subdivision? (2) If there is a program... seeding in areas of heavy grading or cut and fill along with the construction of diversion channels, ditches, outlet channels, waterway stabilizers and sediment control basins.) (f) Nuisances. Are there any...

  8. Land Subdivision in Peri-Urban Areas of Sub-Saharan African Cities ...

    African Journals Online (AJOL)

    USER

    , ... development costs substantially, making it difficult in particular for the urban poor ... data and case studies detailing informal land subdivision largely drawn from ..... in a partnership for the unified planning, servicing and subdivision of their ...

  9. One ID Card for the Entire Campus.

    Science.gov (United States)

    Ridenour, David P.; Ferguson, Linda M.

    1986-01-01

    The implementation by Indiana State University of a machine-readable photo ID system for their food services prompted an investigation into the available alternatives and requirements for a more efficient all-University ID card system. The new ID system is described. (AUTHOR/MLW)

  10. VLM Tool for IDS Integration

    Directory of Open Access Journals (Sweden)

    Cǎtǎlin NAE

    2010-03-01

    Full Text Available This paper is dedicated to a very specific type of analysis tool (VLM - Vortex Lattice Method to be integrated in a IDS - Integrated Design System, tailored for the usage of small aircraft industry. The major interest is to have the possibility to simulate at very low computational costs a preliminary set of aerodynamic characteristics for basic aerodynamic global characteristics (Lift, Drag, Pitching Moment and aerodynamic derivatives for longitudinal and lateral-directional stability analysis. This work enables fast investigations of the influence of configuration changes in a very efficient computational environment. Using experimental data and/or CFD information for a specific calibration of VLM method, reliability of the analysis may me increased so that a first type (iteration zero aerodynamic evaluation of the preliminary 3D configuration is possible. The output of this tool is basic state aerodynamic and associated stability and control derivatives, as well as a complete set of information on specific loads on major airframe components.The major interest in using and validating this type of methods is coming from the possibility to integrate it as a tool in an IDS system for conceptual design phase, as considered for development for CESAR project (IP, UE FP6.

  11. ID Barrel installed in cryostat

    CERN Multimedia

    Apsimon, R.; Romaniouk, A.

    Wednesday 23rd August was a memorable day for the Inner Detector community as they witnessed the transport and installation of the central part of the inner detector (ID-barrel) into the ATLAS detector. Many members of the collaboration gathered to witness this moment at Point 1. After years of design, construction and commissioning, the outer two detectors (TRT and SCT) of the ID barrel were moved from the SR1 cleanroom to the ATLAS cavern. The barrel was moved across the car park from building 2175 to SX1. Although only a journey of about 100 metres, this required weeks of planning and some degree of luck as far as the weather was concerned. Accelerometers were fitted to the barrel to provide real-time monitoring and no values greater than 0.1 g were recorded, fully satisfying the transport specification for this extremely precise and fragile detector. Muriel, despite her fear of heights, bravely volunteered to keep a close eye on the detector. Swapping cranes to cross the entire parking lot, while Mur...

  12. Architectonic subdivisions of neocortex in the tree shrew (Tupaia belangeri)

    OpenAIRE

    Wong, Peiyan; Kaas, Jon H.

    2009-01-01

    Tree shrews are small mammals that bear some semblance to squirrels, but are actually close relatives of primates. Thus, they have been extensively studied as a model for the early stages of primate evolution. In the present study, subdivisions of cortex were reconstructed from brain sections cut in the coronal, sagittal or horizontal planes, and processed for parvalbumin (PV), SMI-32 immunopositive neurofilament protein epitopes, vesicle glutamate transporter 2 (VGluT2), free ionic zinc, mye...

  13. Electron ID in ATLAS Run 2

    CERN Document Server

    Thais, Savannah Jennifer; The ATLAS collaboration

    2018-01-01

    Efficient and accurate electron identification is of critical importance to measuring many physics processes with leptons in the final state, including H->4l, dark vector boson searches, and various SUSY searches. This poster will describe the current status of the Likelihood driven Electron ID, highlighting the recent move from a MC driven ID to a data-driven ID. It will include the most recent identification efficiency and scale-factor measurements. Additionally, it will describe continued improvements for Run 2 electron ID, highlighting improvements in the low pt region and potential Machine Learning improvements.

  14. Tinjauan Desain Website Kemlu.Go.Id

    Directory of Open Access Journals (Sweden)

    Danu Widhyatmoko

    2013-04-01

    Full Text Available Review of kemlu.go.id website design is a research report on Kemlu.go.id website design. Kemlu.go.id website aims to be the information gateway of Ministry of Foreign Affairs, and also as guidelines of foreign politic policies of Republic of Indonesia. The review had been accomplished by using analytical method based on the "Nine Essential Principles for Good Web Design" developed by Collis Ta'eed (2007. At the end of the article, several recommendations in developing kemlu.go.id website are presented to create better appearance.  

  15. Tinjauan Desain Website Kemlu.Go.Id

    OpenAIRE

    Danu Widhyatmoko

    2013-01-01

    Review of kemlu.go.id website design is a research report on Kemlu.go.id website design. Kemlu.go.id website aims to be the information gateway of Ministry of Foreign Affairs, and also as guidelines of foreign politic policies of Republic of Indonesia. The review had been accomplished by using analytical method based on the "Nine Essential Principles for Good Web Design" developed by Collis Ta'eed (2007). At the end of the article, several recommendations in developing kemlu.go.id website are...

  16. Id1 and Id3 expression is associated with increasing grade of prostate cancer: Id3 preferentially regulates CDKN1B

    International Nuclear Information System (INIS)

    Sharma, Pankaj; Patel, Divya; Chaudhary, Jaideep

    2012-01-01

    As transcriptional regulators of basic helix–oop–helix (bHLH) transcription and non-bHLH factors, the inhibitor of differentiation (Id1, Id2, Id3, and Id4) proteins play a critical role in coordinated regulation of cell growth, differentiation, tumorigenesis, and angiogenesis. Id1 regulates prostate cancer (PCa) cell proliferation, apoptosis, and androgen independence, but its clinical significance in PCa remains controversial. Moreover, there is lack of evidence on the expression of Id2 and Id3 in PCa progression. In this study we investigated the expression of Id2 and Id3 and reevaluated the expression of Id1 in PCa. We show that increased Id1 and Id3 protein expression is strongly associated with increasing grade of PCa. At the molecular level, we report that silencing either Id1 or Id3 attenuates cell cycle. Although structurally and mechanistically similar, our results show that both these proteins are noncompensatory at least in PCa progression. Moreover, through gene silencing approaches we show that Id1 and Id3 primarily attenuates CDKN1A (p21) and CDKN1B (p27), respectively. We also demonstrate that silencing Id3 alone significantly attenuates proliferation of PCa cells as compared with Id1. We propose that increased Id1 and Id3 expression attenuates all three cyclin-dependent kinase inhibitors (CDKN2B, -1A, and -1B) resulting in a more aggressive PCa phenotype

  17. Solving polynomial systems using no-root elimination blending schemes

    KAUST Repository

    Barton, Michael

    2011-12-01

    Searching for the roots of (piecewise) polynomial systems of equations is a crucial problem in computer-aided design (CAD), and an efficient solution is in strong demand. Subdivision solvers are frequently used to achieve this goal; however, the subdivision process is expensive, and a vast number of subdivisions is to be expected, especially for higher-dimensional systems. Two blending schemes that efficiently reveal domains that cannot contribute by any root, and therefore significantly reduce the number of subdivisions, are proposed. Using a simple linear blend of functions of the given polynomial system, a function is sought after to be no-root contributing, with all control points of its BernsteinBézier representation of the same sign. If such a function exists, the domain is purged away from the subdivision process. The applicability is demonstrated on several CAD benchmark problems, namely surfacesurfacesurface intersection (SSSI) and surfacecurve intersection (SCI) problems, computation of the Hausdorff distance of two planar curves, or some kinematic-inspired tasks. © 2011 Elsevier Ltd. All rights reserved.

  18. Analysis and Research on Several Global Subdivision Grids

    Directory of Open Access Journals (Sweden)

    SONG Shuhua

    2016-12-01

    Full Text Available In order to solve the problem that lacking of an unified organization frame about global remote sensing satellite image data, this paper introduces serval global subdivision grids as the unified organization frame for remote sensing image. Based on the characteristics of remote sensing image data, this paper analyzes and summarizes the design principles and difficulties of the organization frame. Based on analysis and comparison with these grids, GeoSOT is more suitable as the unified organization frame for remote sensing image. To provide a reference for the global remote sensing image organization.

  19. Research on Remote Sensing Image Template Processing Based on Global Subdivision Theory

    OpenAIRE

    Xiong Delan; Du Genyuan

    2013-01-01

    Aiming at the questions of vast data, complex operation, and time consuming processing for remote sensing image, subdivision template was proposed based on global subdivision theory, which can set up high level of abstraction and generalization for remote sensing image. The paper emphatically discussed the model and structure of subdivision template, and put forward some new ideas for remote sensing image template processing, key technology and quickly applied demonstration. The research has ...

  20. A proposed HTTP service based IDS

    Directory of Open Access Journals (Sweden)

    Mohamed M. Abd-Eldayem

    2014-03-01

    Full Text Available The tremendous growth of the web-based applications has increased information security vulnerabilities over the Internet. Security administrators use Intrusion-Detection System (IDS to monitor network traffic and host activities to detect attacks against hosts and network resources. In this paper IDS based on Naïve Bayes classifier is analyzed. The main objective is to enhance IDS performance through preparing the training data set allowing to detect malicious connections that exploit the http service. Results of application are demonstrated and discussed. In the training phase of the proposed IDS, at first a feature selection technique based on Naïve Bayes classifier is used, this technique identifies the most important HTTP traffic features that can be used to detect HTTP attacks. In the testing and running phases proposed IDS classifies the network traffic based on the requested service, then based on the selected features Naïve Bayes classifier is used to analyze the HTTP service based traffic and identifies the HTTP normal connections and attacks. The performance of the IDS is measured through experiments using NSL-KDD data set. The results show that the detection rate of the IDS is about 99%, the false-positive rate is about 1%, and the false-negative rate is about 0.25%; therefore, proposed IDS holds the highest detection rate and the lowest false alarm compared with other leading IDS. In addition, the proposed IDS based on Naïve Bayes is used to classify network connections as a normal or attack. And it holds a high detection rate and a low false alarm.

  1. A Subdivision-Based Representation for Vector Image Editing.

    Science.gov (United States)

    Liao, Zicheng; Hoppe, Hugues; Forsyth, David; Yu, Yizhou

    2012-11-01

    Vector graphics has been employed in a wide variety of applications due to its scalability and editability. Editability is a high priority for artists and designers who wish to produce vector-based graphical content with user interaction. In this paper, we introduce a new vector image representation based on piecewise smooth subdivision surfaces, which is a simple, unified and flexible framework that supports a variety of operations, including shape editing, color editing, image stylization, and vector image processing. These operations effectively create novel vector graphics by reusing and altering existing image vectorization results. Because image vectorization yields an abstraction of the original raster image, controlling the level of detail of this abstraction is highly desirable. To this end, we design a feature-oriented vector image pyramid that offers multiple levels of abstraction simultaneously. Our new vector image representation can be rasterized efficiently using GPU-accelerated subdivision. Experiments indicate that our vector image representation achieves high visual quality and better supports editing operations than existing representations.

  2. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    Science.gov (United States)

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

  3. Subdivision Error Analysis and Compensation for Photoelectric Angle Encoder in a Telescope Control System

    Directory of Open Access Journals (Sweden)

    Yanrui Su

    2015-01-01

    Full Text Available As the position sensor, photoelectric angle encoder affects the accuracy and stability of telescope control system (TCS. A TCS-based subdivision error compensation method for encoder is proposed. Six types of subdivision error sources are extracted through mathematical expressions of subdivision signals first. Then the period length relationships between subdivision signals and subdivision errors are deduced. And the error compensation algorithm only utilizing the shaft position of TCS is put forward, along with two control models; Model I is that the algorithm applies only to the speed loop of TCS and Model II is applied to both speed loop and position loop. Combined with actual project, elevation jittering phenomenon of the telescope is discussed to decide the necessity of DC-type subdivision error compensation. Low-speed elevation performance before and after error compensation is compared to help decide that Model II is preferred. In contrast to original performance, the maximum position error of the elevation with DC subdivision error compensation is reduced by approximately 47.9% from 1.42″ to 0.74″. The elevation gets a huge decrease in jitters. This method can compensate the encoder subdivision errors effectively and improve the stability of TCS.

  4. Reclassification to the NCAA Division I Football Bowl Subdivision: A Case Study at Western Kentucky University

    Science.gov (United States)

    Upright, Paula A.

    2009-01-01

    The purpose of this study was to describe the reclassification process of Western Kentucky University's football program from the Football Championship Subdivision (FCS) to the Football Bowl Subdivision (FBS), the highest and most visible level of NCAA competition. Three research questions guided the study: (a) Why did Western Kentucky University…

  5. 12 CFR 1.110 - Taxing powers of a State or political subdivision.

    Science.gov (United States)

    2010-01-01

    ... impact of any possible limitations regarding the State's or political subdivision's taxing powers, as... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Taxing powers of a State or political subdivision. 1.110 Section 1.110 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY...

  6. Long-term evaluation of Class II subdivision treatment with unilateral maxillary first molar extraction

    NARCIS (Netherlands)

    Livas, Christos; Pandis, Nikolaos; Booij, Johan Willem; Katsaros, Christos; Ren, Yijin

    Objective: To evaluate the long-term effects of asymmetrical maxillary first molar (M1) extraction in Class II subdivision treatment. Materials and Methods: Records of 20 Class II subdivision whites (7 boys, 13 girls; mean age, 13.0 years; SD, 1.7 years) consecutively treated with the Begg technique

  7. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  8. Edge subdivision and edge multisubdivision versus some domination related parameters in generalized corona graphs

    Directory of Open Access Journals (Sweden)

    Magda Dettlaff

    2016-01-01

    Full Text Available Given a graph \\(G=(V,E\\, the subdivision of an edge \\(e=uv\\in E(G\\ means the substitution of the edge \\(e\\ by a vertex \\(x\\ and the new edges \\(ux\\ and \\(xv\\. The domination subdivision number of a graph \\(G\\ is the minimum number of edges of \\(G\\ which must be subdivided (where each edge can be subdivided at most once in order to increase the domination number. Also, the domination multisubdivision number of \\(G\\ is the minimum number of subdivisions which must be done in one edge such that the domination number increases. Moreover, the concepts of paired domination and independent domination subdivision (respectively multisubdivision numbers are defined similarly. In this paper we study the domination, paired domination and independent domination (subdivision and multisubdivision numbers of the generalized corona graphs.

  9. Electromyography Activation Levels of the 3 Gluteus Medius Subdivisions During Manual Strength Testing

    DEFF Research Database (Denmark)

    Otten, Roald; Tol, Johannes L; Holmich, Per

    2015-01-01

    deficits and guide specific rehabilitation programs. However, the optimal positions for assessing the strength and activation of these subdivisions are unknown. OBJECTIVE: The first aim was to establish which strength-testing positions produce the highest surface electromyography (sEMG) activation levels...... of the individual GM subdivisions. The second aim was to evaluate differences in sEMG activation levels between the tested and contralateral (stabilizing) leg. METHOD: Twenty healthy physically active male subjects participated in this study. Muscle activity using sEMG was recorded for the GM subdivisions in 8......STUDY DESIGN: Cross-sectional. CONTEXT: Gluteus medius (GM) muscle dysfunction is associated with overuse injury. The GM is functionally composed of 3 separate subdivisions: anterior, middle, and posterior. Clinical assessment of the GM subdivisions is relevant to detect strength and activation...

  10. Pengalaman Komunikasi Pelanggan Zalora.co.id (Studi Fenomenologi Pelanggan Zalora.co.id)

    OpenAIRE

    Aji, Widya Andhika; Pradekso, Tandiyo; Ulfa, Nurist Surayya

    2013-01-01

    1PENGALAMAN KOMUNIKASI PELANGGAN ZALORA.CO.ID(Studi Fenomenologi Pelanggan Zalora.co.id)Oleh:Widya Andhika AjiFakultas Ilmu Sosial dan Ilmu PolitikUniversitas Diponegoro SemarangABSTRAKPenelitian ini bertujuan untuk menganalisis pengalaman komunikasi danpemahaman penerimaan konsumen terkait pesan komunikasi pemasaran dalamberbelanja di Zalora.co.id. Dengan menggunakan sampel pada lima informandan metode wawancara, dapat ditarik kesimpulan: Pelanggan Zalora.co.idmemiliki pengalaman komunikasi ...

  11. Id-1 and Id-2 genes and products as markers of epithelial cancer

    Science.gov (United States)

    Desprez, Pierre-Yves [El Cerrito, CA; Campisi, Judith [Berkeley, CA

    2008-09-30

    A method for detection and prognosis of breast cancer and other types of cancer. The method comprises detecting expression, if any, for both an Id-1 and an Id-2 genes, or the ratio thereof, of gene products in samples of breast tissue obtained from a patient. When expressed, Id-1 gene is a prognostic indicator that breast cancer cells are invasive and metastatic, whereas Id-2 gene is a prognostic indicator that breast cancer cells are localized and noninvasive in the breast tissue.

  12. An IDS Alerts Aggregation Algorithm Based on Rough Set Theory

    Science.gov (United States)

    Zhang, Ru; Guo, Tao; Liu, Jianyi

    2018-03-01

    Within a system in which has been deployed several IDS, a great number of alerts can be triggered by a single security event, making real alerts harder to be found. To deal with redundant alerts, we propose a scheme based on rough set theory. In combination with basic concepts in rough set theory, the importance of attributes in alerts was calculated firstly. With the result of attributes importance, we could compute the similarity of two alerts, which will be compared with a pre-defined threshold to determine whether these two alerts can be aggregated or not. Also, time interval should be taken into consideration. Allowed time interval for different types of alerts is computed individually, since different types of alerts may have different time gap between two alerts. In the end of this paper, we apply proposed scheme on DAPRA98 dataset and the results of experiment show that our scheme can efficiently reduce the redundancy of alerts so that administrators of security system could avoid wasting time on useless alerts.

  13. A technical assistance on data collection on subdivision of wet-system apparatuses

    International Nuclear Information System (INIS)

    2001-09-01

    In the Ningyo-Toge Environmental Engineering Center, development on subdivision engineering system for abolition of nuclear fuel facilities has been promoted. However, data on subdivision of instruments and apparatuses to be carried out as a part of the abolition was insufficient. Therefore, here was intended to investigate data collections so as to use subdivision of a wet-system apparatuses of the smelting conversion facility begun on June, 2000, as a field of data collection as effectively as possible, on construction of the system rationally supporting abolition of nuclear fuel facility promoted at the Ningyo-Toge Environmental Engineering Center. This subdivision of the wet-system apparatuses of the facility is programmed to carry out the subdivision for two years of 2000 and 2001 fiscal years. Its working procedure is begun from non-polluted matters (electrics, instruments, and utility pipings) at every rooms to carry out appliances using uranium. Here were reported on present states survey of the subdivision, kinds and frequencies of data at the subdivision, data collection manual, and rationalization of data recording method. (G.K.)

  14. Augmenting Sand Simulation Environments through Subdivision and Particle Refinement

    Science.gov (United States)

    Clothier, M.; Bailey, M.

    2012-12-01

    Recent advances in computer graphics and parallel processing hardware have provided disciplines with new methods to evaluate and visualize data. These advances have proven useful for earth and planetary scientists as many researchers are using this hardware to process large amounts of data for analysis. As such, this has provided opportunities for collaboration between computer graphics and the earth sciences. Through collaboration with the Oregon Space Grant and IGERT Ecosystem Informatics programs, we are investigating techniques for simulating the behavior of sand. We are also collaborating with the Jet Propulsion Laboratory's (JPL) DARTS Lab to exchange ideas and gain feedback on our research. The DARTS Lab specializes in simulation of planetary vehicles, such as the Mars rovers. Their simulations utilize a virtual "sand box" to test how a planetary vehicle responds to different environments. Our research builds upon this idea to create a sand simulation framework so that planetary environments, such as the harsh, sandy regions on Mars, are more fully realized. More specifically, we are focusing our research on the interaction between a planetary vehicle, such as a rover, and the sand beneath it, providing further insight into its performance. Unfortunately, this can be a computationally complex problem, especially if trying to represent the enormous quantities of sand particles interacting with each other. However, through the use of high-performance computing, we have developed a technique to subdivide areas of actively participating sand regions across a large landscape. Similar to a Level of Detail (LOD) technique, we only subdivide regions of a landscape where sand particles are actively participating with another object. While the sand is within this subdivision window and moves closer to the surface of the interacting object, the sand region subdivides into smaller regions until individual sand particles are left at the surface. As an example, let's say

  15. Simulating Sand Behavior through Terrain Subdivision and Particle Refinement

    Science.gov (United States)

    Clothier, M.

    2013-12-01

    Advances in computer graphics, GPUs, and parallel processing hardware have provided researchers with new methods to visualize scientific data. In fact, these advances have spurred new research opportunities between computer graphics and other disciplines, such as Earth sciences. Through collaboration, Earth and planetary scientists have benefited by using these advances in hardware technology to process large amounts of data for visualization and analysis. At Oregon State University, we are collaborating with the Oregon Space Grant and IGERT Ecosystem Informatics programs to investigate techniques for simulating the behavior of sand. In addition, we have also been collaborating with the Jet Propulsion Laboratory's DARTS Lab to exchange ideas on our research. The DARTS Lab specializes in the simulation of planetary vehicles, such as the Mars rovers. One aspect of their work is testing these vehicles in a virtual "sand box" to test their performance in different environments. Our research builds upon this idea to create a sand simulation framework to allow for more complex and diverse environments. As a basis for our framework, we have focused on planetary environments, such as the harsh, sandy regions on Mars. To evaluate our framework, we have used simulated planetary vehicles, such as a rover, to gain insight into the performance and interaction between the surface sand and the vehicle. Unfortunately, simulating the vast number of individual sand particles and their interaction with each other has been a computationally complex problem in the past. However, through the use of high-performance computing, we have developed a technique to subdivide physically active terrain regions across a large landscape. To achieve this, we only subdivide terrain regions where sand particles are actively participating with another object or force, such as a rover wheel. This is similar to a Level of Detail (LOD) technique, except that the density of subdivisions are determined by

  16. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  17. The impacts of population subdivision on the viability of Brachyteles hypoxanthus.

    Science.gov (United States)

    Eduardo, Anderson A; Brito, Daniel

    2012-01-01

    Habitat loss and fragmentation turn continuous large populations into metapopulations of smaller populations, more prone to the negative effects of stochastic processes. We modeled scenarios simulating the subdivision of Brachyteles hypoxanthus populations under different dispersal rates. Results show the existence of a population subdivision threshold, below which subdivision causes the metapopulation structure to collapse. Management should target first the increase in local populations through habitat restoration/protection, and only after populations are sufficiently large, connectivity strategies should take place. Copyright © 2012 S. Karger AG, Basel.

  18. About the Subdivision of Indoor Spaces in Indoorgml

    Science.gov (United States)

    Diakité, A. A.; Zlatanova, S.; Li, K.-J.

    2017-10-01

    Boosted by the dynamic urbanization of cities, indoor environments are getting more and more complex in order to be able to host people properly. While most of our time is spent inside buildings, the need of GIS tools to assist our daily activities that can become tedious, such as indoor navigation or facility management, became more and more urgent. In that perspective, the IndoorGML standard is aiming to address the gaps left by other standards regarding the spatial modelling for indoor navigation. It includes several concepts such as the organization of the spaces into cells along with their network representation and the possibility to represent multiple connected layers. However, being at its first stage, several concepts of the standard could be improved. One of these is the cell subspacing that is not enough discussed in the current version of the standard. In this paper, we explore all the aspects involved in the subdivision process, from the identification of the navigable and non-navigable space cells to the generation of a navigation graph. We propose several criteria on which the indoor sub-spacing can rely to be automatically performed and and illustrate them on a 3D indoor model.

  19. ABOUT THE SUBDIVISION OF INDOOR SPACES IN INDOORGML

    Directory of Open Access Journals (Sweden)

    A. A. Diakité

    2017-10-01

    Full Text Available Boosted by the dynamic urbanization of cities, indoor environments are getting more and more complex in order to be able to host people properly. While most of our time is spent inside buildings, the need of GIS tools to assist our daily activities that can become tedious, such as indoor navigation or facility management, became more and more urgent. In that perspective, the IndoorGML standard is aiming to address the gaps left by other standards regarding the spatial modelling for indoor navigation. It includes several concepts such as the organization of the spaces into cells along with their network representation and the possibility to represent multiple connected layers. However, being at its first stage, several concepts of the standard could be improved. One of these is the cell subspacing that is not enough discussed in the current version of the standard. In this paper, we explore all the aspects involved in the subdivision process, from the identification of the navigable and non-navigable space cells to the generation of a navigation graph. We propose several criteria on which the indoor sub-spacing can rely to be automatically performed and and illustrate them on a 3D indoor model.

  20. Vibrational measurements in 3-ID-B

    International Nuclear Information System (INIS)

    Sutter, J.; Alp, E.; Barraza, J.; Shu, D.

    1998-04-01

    The authors have undertaken a series of vibrational measurements in hutch 3-ID-B. Their motivation was to compare two different methods of mounting an interferometer for effectiveness in vibrational isolation and stability. In addition they were able to compare the stability of the optical table with and without its eight large bolts inserted

  1. Independence Day 2004 (ID04) / Raul Hindov

    Index Scriptorium Estoniae

    Hindov, Raul

    2004-01-01

    Ülevaade 20.-22. veebruarini 2004 toimunud kaugluurepatrullide rännaku ja sõdurioskuste kompleksõppusest ID04 (Independence Day 2004 - Iseseisvuspäev 2004), millel osales 25 patrullvõistlusteks valmistuvat meest ja naist

  2. Census County Subdivisions for the United States Virgin Islands (CENSUS.COUNTY_SUBDIV_USVI)

    Data.gov (United States)

    U.S. Environmental Protection Agency — County subdivisions are the primary divisions of counties and statistically equivalent entities for the reporting of decennial census data. They include census...

  3. TIGER/Line Shapefile, 2015, Series Information for the Current County Subdivision State-based Shapefiles

    Data.gov (United States)

    US Census Bureau, Department of Commerce — County subdivisions are the primary divisions of counties and their equivalent entities for the reporting of Census Bureau data. They include legally-recognized...

  4. Stability of class II subdivision malocclusion treatment with 3 and 4 premolar extractions

    OpenAIRE

    Janson, Guilherme; Araki, Janine; Estelita, S?rgio; Camardella, Leonardo T

    2014-01-01

    Background The purpose of this study was to compare the occlusal stability of class II subdivision malocclusion treatment with 3 and 4 first premolar extractions. A sample of 156 dental casts from 52 patients with class II subdivision malocclusion was divided into two groups according to the extraction protocol. Group 1 comprised 24 patients treated with 3 premolar extractions and group 2 included 28 patients treated with 4 premolar extractions. Methods Peer assessment rating (PAR) indexes we...

  5. Electromyographic analysis of the three subdivisions of gluteus medius during weight-bearing exercises

    Directory of Open Access Journals (Sweden)

    O'Sullivan Kieran

    2010-07-01

    Full Text Available Abstract Background Gluteus medius (GM dysfunction is associated with many musculoskeletal disorders. Rehabilitation exercises aimed at strengthening GM appear to improve lower limb kinematics and reduce pain. However, there is a lack of evidence to identify which exercises best activate GM. In particular, as GM consists of three distinct subdivisions, it is unclear if GM activation is consistent across these subdivisions during exercise. The aim of this study was to determine the activation of the anterior, middle and posterior subdivisions of GM during weight-bearing exercises. Methods A single session, repeated-measures design. The activity of each GM subdivision was measured in 15 pain-free subjects using surface electromyography (sEMG during three weight-bearing exercises; wall squat (WS, pelvic drop (PD and wall press (WP. Muscle activity was expressed relative to maximum voluntary isometric contraction (MVIC. Differences in muscle activation were determined using one-way repeated measures ANOVA with post-hoc Bonferroni analysis. Results The activation of each GM subdivision during the exercises was significantly different (interaction effect; p Discussion Posterior GM displayed higher activation across all three exercises than both anterior and middle GM. The WP produced the highest %MVIC activation for all GM subdivisions, and this was most pronounced for posterior GM. Clinicians may use these results to effectively progress strengthening exercises for GM in the rehabilitation of lower extremity injuries.

  6. A Method of Vector Map Multi-scale Representation Considering User Interest on Subdivision Gird

    Directory of Open Access Journals (Sweden)

    YU Tong

    2016-12-01

    Full Text Available Compared with the traditional spatial data model and method, global subdivision grid show a great advantage in the organization and expression of massive spatial data. In view of this, a method of vector map multi-scale representation considering user interest on subdivision gird is proposed. First, the spatial interest field is built using a large number POI data to describe the spatial distribution of the user interest in geographic information. Second, spatial factor is classified and graded, and its representation scale range can be determined. Finally, different levels of subdivision surfaces are divided based on GeoSOT subdivision theory, and the corresponding relation of subdivision level and scale is established. According to the user interest of subdivision surfaces, the spatial feature can be expressed in different degree of detail. It can realize multi-scale representation of spatial data based on user interest. The experimental results show that this method can not only satisfy general-to-detail and important-to-secondary space cognitive demands of users, but also achieve better multi-scale representation effect.

  7. Architectonic subdivisions of the amygdalar complex of a primitive marsupial (Didelphis aurita).

    Science.gov (United States)

    Rocha-Rego, V; Canteras, N S; Anomal, R F; Volchan, E; Franca, J G

    2008-05-15

    The architecture of the amygdaloid complex of a marsupial, the opossum Didelphis aurita, was analyzed using classical stains like Nissl staining and myelin (Gallyas) staining, and enzyme histochemistry for acetylcholinesterase and NADPH-diaphorase. Most of the subdivisions of the amygdaloid complex described in eutherian mammals were identified in the opossum brain. NADPH-diaphorase revealed reactivity in the neuropil of nearly all amygdaloid subdivisions with different intensities, allowing the identification of the medial and lateral subdivisions of the cortical posterior nucleus and the lateral subdivision of the lateral nucleus. The lateral, central, basolateral and basomedial nuclei exhibited acetylcholinesterase positivity, which provided a useful chemoarchitectural criterion for the identification of the anterior basolateral nucleus. Myelin stain allowed the identification of the medial subdivision of the lateral nucleus, and resulted in intense staining of the medial subdivisions of the central nucleus. The medial, posterior, and cortical nuclei, as well as the amygdalopiriform area did not exhibit positivity for myelin staining. On the basis of cyto- and chemoarchitectural criteria, the present study highlights that the opossum amygdaloid complex shares similarities with that of other species, thus supporting the idea that the organization of the amygdala is part of a basic plan conserved through mammalian evolution.

  8. Beam transport radiation shielding for branch lines 2-ID-B and 2-ID-C

    International Nuclear Information System (INIS)

    Feng, Y.P.; Lai, B.; McNulty, I.; Dejus, R.J.; Randall, K.J.; Yun, W.

    1995-01-01

    The x-ray radiation shielding requirements beyond the first optics enclosure have been considered for the beam transport of the 2-ID-B and 2-ID-C branch lines of Sector 2 (SRI-CAT) of the APS. The first three optical components (mirrors) of the 2-ID-B branch are contained within the shielded first optics enclosure. Calculations indicate that scattering of the primary synchrotron beam by beamline components outside the enclosure, such as apertures and monochromators, or by gas particles in case of vacuum failure is within safe limits for this branch. A standard 2.5-inch-diameter stainless steel pipe with 1/16-inch-thick walls provides adequate shielding to reduce the radiation dose equivalent rate to human tissue to below the maximum permissible limit of 0.25 mrem/hr. The 2-ID-C branch requires, between the first optics enclosure where only two mirrors are used and the housing for the third mirror, additional lead shielding (0.75 mm) and a minimum approach distance of 2.6 cm. A direct beam stop consisting of at least 4.5 mm of lead is also required immediately downstream of the third mirror for 2-ID-C. Finally, to stop the direct beam from escaping the experimental station, a beam stop consisting of at least 4-mm or 2.5-mm steel is required for the 2-ID-B or 2-ID-C branches, respectively. This final requirement can be met by the vacuum chambers used to house the experiments for both branch lines

  9. Idékatalog Appetit på maden

    DEFF Research Database (Denmark)

    Jensen, Tenna; Jespersen, Astrid Pernille; Grønnow, Liv Cæcilie

    2015-01-01

    Idékataloget er en selvstændig publikation hørende til projekt Appetit på maden. Idékataloget er udviklet til brug i Københavns Kommune.......Idékataloget er en selvstændig publikation hørende til projekt Appetit på maden. Idékataloget er udviklet til brug i Københavns Kommune....

  10. Prospective relations between resting-state connectivity of parietal subdivisions and arithmetic competence.

    Science.gov (United States)

    Price, Gavin R; Yeo, Darren J; Wilkey, Eric D; Cutting, Laurie E

    2018-04-01

    The present study investigates the relation between resting-state functional connectivity (rsFC) of cytoarchitectonically defined subdivisions of the parietal cortex at the end of 1st grade and arithmetic performance at the end of 2nd grade. Results revealed a dissociable pattern of relations between rsFC and arithmetic competence among subdivisions of intraparietal sulcus (IPS) and angular gyrus (AG). rsFC between right hemisphere IPS subdivisions and contralateral IPS subdivisions positively correlated with arithmetic competence. In contrast, rsFC between the left hIP1 and the right medial temporal lobe, and rsFC between the left AG and left superior frontal gyrus, were negatively correlated with arithmetic competence. These results suggest that strong inter-hemispheric IPS connectivity is important for math development, reflecting either neurocognitive mechanisms specific to arithmetic processing, domain-general mechanisms that are particularly relevant to arithmetic competence, or structural 'cortical maturity'. Stronger connectivity between IPS, and AG, subdivisions and frontal and temporal cortices, however, appears to be negatively associated with math development, possibly reflecting the ability to disengage suboptimal problem-solving strategies during mathematical processing, or to flexibly reorient task-based networks. Importantly, the reported results pertain even when controlling for reading, spatial attention, and working memory, suggesting that the observed rsFC-behavior relations are specific to arithmetic competence. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  11. Group-ID based RFID Mutual Authentication

    Directory of Open Access Journals (Sweden)

    LEE, Y.

    2013-11-01

    Full Text Available For passive type RFID tags, EPCglobal Class 1 Generation-2 Revision is used widely as a de facto standard. As it was designed for low cost, it is quite vulnerable to security issues, such as privacy concerns. This paper presents a new RFID mutual authentication protocol, which is designed to be configured on EPC Gen2 platform and to meet various security requirements while providing efficiency using PRNG (Pseudo Random Number Generator. Group-ID is used to minimize the authentication time. Security analysis of the proposed protocol is discussed.

  12. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  13. Automatic spent fuel ID number reader (I)

    International Nuclear Information System (INIS)

    Tanabe, S.; Kawamoto, H.; Fujimaki, K.; Kobe, A.

    1991-01-01

    An effective and efficient technique has been developed for facilitating identification works of LWR spent fuel stored in large scale spent fuel storage pools of such as processing plants. Experience shows that there are often difficulties in the implementation of operator's nuclear material accountancy and control works as well as safeguards inspections conducted on spent fuel assemblies stored in deep water pool. This paper reports that the technique is realized as an automatic spent fuel ID number reader system installed on fuel handling machine. The ID number reader system consists of an optical sub-system and an image processing sub-system. Thousands of spent fuel assemblies stored in under water open racks in each storage pool could be identified within relatively short time (e.g. within several hours) by using this combination. Various performance tests were carried out on image processing sub-system in 1990 using TV images obtained from different types of spent fuel assemblies stored in various storage pools of PWR and BWR power stations

  14. RPD: Reusable Pseudo-Id Distribution for a Secure and Privacy Preserving VANET

    Directory of Open Access Journals (Sweden)

    Sulaiman Ashraph

    2013-08-01

    Full Text Available In any VANET, security and privacy are the two fundamental issues. Obtaining efficient security in vehicular communication is essential without compromising privacy-preserving mechanisms. Designing a suitable protocol for VANET by having these two issues in mind is challenging because efficiency, unlinkablity and traceability are the three qualities having contradictions between them. In this paper, we introduce an efficient Reusable Pseudo-id Distribution (RPD scheme. The Trusted Authority (TA designating the Road Side Units (RSUs to generate n reusable pseudo ids and distribute them to the On Board Units (OBUs on request characterizes the proposed protocol. RSUs issue the aggregated hashes of all its valid pseudo-ids along with a symmetric shared key and a particular pseudo-id to each vehicle that enters into its coverage range. Through this the certificates attached to the messages can be eliminated and thus resulting in a significantly reduced packet size. The same anonymous keys can then be re-distributed by the RSUs episodically to other vehicles. We analyze the proposed protocol extensively to demonstrate its merits and efficiency.

  15. To ID or Not to ID? Changes in Classification Rates of Intellectual Disability Using "DSM-5"

    Science.gov (United States)

    Papazoglou, Aimilia; Jacobson, Lisa A.; McCabe, Marie; Kaufmann, Walter; Zabel, T. Andrew

    2014-01-01

    The "Diagnostic and Statistical Manual of Mental Disorders-Fifth Edition" ("DSM-5") diagnostic criteria for intellectual disability (ID) include a change to the definition of adaptive impairment. New criteria require impairment in one adaptive domain rather than two or more skill areas. The authors examined the diagnostic…

  16. An Improvement on Remote User Authentication Schemes Using Smart Cards

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2018-01-01

    Full Text Available In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack and man-in-the-middle attack. In this paper, we show that Yeh et al.’s schemes are still vulnerable to ID-theft attack, off-line password guessing attacks, undetectable on-line password guessing attacks and user impersonation attack. Notably, problems remain in situations where the user lost a smart card or the malicious legal user. To remedy these flaws, this paper proposes an improvement on Yeh et al.’s remote user authentication schemes using smart cards.

  17. 75 FR 76038 - Zach System Corporation a Subdivision of Zambon Company, SPA Including On-Site Leased Workers of...

    Science.gov (United States)

    2010-12-07

    ... Subdivision of Zambon Company, SPA Including On-Site Leased Workers of Turner Industries and Go Johnson, La..., including on-site leased workers from Turner Industries and Go Johnson, La Porte, Texas. The Department's... investigation revealed that Zach System Corporation is a subdivision of Zambon Company, SPA, not Zach System SPA...

  18. Influence of unilateral maxillary first molar extraction treatment on second and third molar inclination in Class II subdivision patients

    NARCIS (Netherlands)

    Livas, Christos; Pandis, Nikolaos; Booij, Johan Willem; Halazonetis, Demetrios J.; Katsaros, Christos; Ren, Yijin

    Objective: To assess the maxillary second molar (M2) and third molar (M3) inclination following orthodontic treatment of Class II subdivision malocclusion with unilateral maxillary first molar (M1) extraction. Materials and Methods: Panoramic radiographs of 21 Class II subdivision adolescents (eight

  19. 20 CFR 1002.39 - Are States (and their political subdivisions), the District of Columbia, the Commonwealth of...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Are States (and their political subdivisions... REEMPLOYMENT RIGHTS ACT OF 1994 Eligibility For Reemployment Coverage of Employers and Positions § 1002.39 Are States (and their political subdivisions), the District of Columbia, the Commonwealth of Puerto Rico, and...

  20. Organization of development of plans of a production association and participation of enterprises and their subdivisions

    Energy Technology Data Exchange (ETDEWEB)

    Gubenko, I V

    1982-01-01

    Experimental development of plans with participation of enterprises and their subdivisions is presented. The method of determining the intensity of the plans of the drilling enterprises is revealed. Data are presented on the use of a computer to develop a technical-industrial financial plan of the enterprise and association.

  1. Theatre for Change: An Analysis of Two Performances by Women in Mundemba Sub-Division.

    Science.gov (United States)

    Tanyi-Tang, Anne

    2001-01-01

    Contends that theatre has the power to induce oppressors to change their attitudes permanently towards the groups they oppress. Describes theatrical performances by women in Mundemba Sub-Division, Cameroon, which created lasting changes in men's attitudes. Concludes that theatre calls for sociocultural and economic changes and it has the power to…

  2. Does Becoming a Member of the Football Bowl Subdivision Increase Institutional Attractiveness to Potential Students

    Science.gov (United States)

    Jones, Willis A.

    2014-01-01

    In recent years, a number of colleges and universities have made the decision to pursue membership in the NCAA's Football Bowl Subdivision (FBS) with the idea that participating in higher profile intercollegiate football can help attract students to their institution. This belief, however, has not been empirically examined. Using…

  3. Land Subdivision in Peri-Urban Areas of Sub-Saharan African Cities ...

    African Journals Online (AJOL)

    USER

    The review of literature on urban land subdivision provides us with useful ... The second section is the methodology detailing the literature review approach ... problem of shortages of urban land, and to increase access to land for the ..... gradual integration of the informal sector into political decision-making process and.

  4. Manûtu ša Bābili = the Babylonian subdivision of the mina

    NARCIS (Netherlands)

    van der Spek, R.J.

    A new interpretation of the term Manûtu ša Bābili is presented here. It is not the exchange rate between shekels and drachmas, as was generally assumed, but it is the Babylonian subdivision ("counting") of the mina as opposed to the Greek mina. A Babylonian mina counts 30 staters, a Greek mina 25

  5. 45 CFR 303.52 - Pass-through of incentives to political subdivisions.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Pass-through of incentives to political subdivisions. 303.52 Section 303.52 Public Welfare Regulations Relating to Public Welfare OFFICE OF CHILD SUPPORT ENFORCEMENT (CHILD SUPPORT ENFORCEMENT PROGRAM), ADMINISTRATION FOR CHILDREN AND FAMILIES...

  6. A New Subdivision Of The Rat Midbrain Periaqueductal Gray Based On Its Myeloarchitecture.

    NARCIS (Netherlands)

    Holstege, G.; Gerrits, P.O.; Croon, D.H.

    1993-01-01

    A new subdivision of the periaqueductal gray (PAG) based on its myelin content is described. Using a methacrylate-resin embedding technique for high resolution light microscopy, a myeloarchitectonic map of the normal rat PAG was made. Six main columns were distinguished. Column I is the central thin

  7. Study on the integration of layered water injection technology and subdivision adjustment

    Science.gov (United States)

    Zhang, Yancui

    2018-06-01

    With oil many infillings, thin and poor reservoir exploitation changes gradually to low permeability, thin and poor reservoir development characteristics of multiple layers thickness, low permeability, in the actual development process, the General Department of oil layers of encryption perforation long thin and poor mining, interlayer contradiction more prominent, by conventional layered water injection that can alleviate the contradiction between layers to a certain extent, by the injection interval and other factors can not fundamentally solve the problem, leading to the potential well area key strata or layers is difficult to determine, the layering test and slicing technology is difficult to adapt to the need of tap water control block. This paper through numerical simulation using the conceptual model and the actual block, it has a great influence on the low permeability reservoir of different stratified water permeability combination of permeability technology and application limits, profit and loss balance principle, low oil prices on the lower series of subdivision technical and economic limit, so the reservoir subdivision reorganization, narrow wells mining, reduce the interference between layers, from the maximum fundamental improvement of layered water injection efficiency. At the same time, in order to meet the needs of reservoir subdivision adjustment, subdividing distance with water, a small interlayer wells subdivision technology for further research in the pickup, solved using two ordinary bridge eccentric water regulator with injection of two layers, by throwing exercise distance limit card from the larger problem, the water distribution card size from 7.0m to 1.0m, and the testing efficiency is improved, and provide technical support for further subdivision water injection wells.

  8. Afferent projections to the different medial amygdala subdivisions: a retrograde tracing study in the mouse.

    Science.gov (United States)

    Cádiz-Moretti, Bernardita; Otero-García, Marcos; Martínez-García, Fernando; Lanuza, Enrique

    2016-03-01

    The medial amygdaloid nucleus (Me) is a key node in the socio-sexual brain, composed of anterior (MeA), posteroventral (MePV) and posterodorsal (MePD) subdivisions. These subdivisions have been suggested to play a different role in reproductive and defensive behaviours. In the present work we analyse the afferents of the three Me subdivisions using restricted injections of fluorogold in female outbred CD1 mice. The results reveal that the MeA, MePV and MePD share a common pattern of afferents, with some differences in the density of retrograde labelling in several nuclei. Common afferents to Me subdivisions include: the accessory olfactory bulbs, piriform cortex and endopiriform nucleus, chemosensory amygdala (receiving direct inputs from the olfactory bulbs), posterior part of the medial bed nucleus of the stria terminalis (BSTM), CA1 in the ventral hippocampus and posterior intralaminar thalamus. Minor projections originate from the basolateral amygdala and amygdalo-hippocampal area, septum, ventral striatum, several allocortical and periallocortical areas, claustrum, several hypothalamic structures, raphe and parabrachial complex. MeA and MePV share minor inputs from the frontal cortex (medial orbital, prelimbic, infralimbic and dorsal peduncular cortices), but differ in the lack of main olfactory projections to the MePV. By contrast, the MePD receives preferential projections from the rostral accessory olfactory bulb, the posteromedial BSTM and the ventral premammillary nucleus. In summary, the common pattern of afferents to the Me subdivisions and their interconnections suggest that they play cooperative instead of differential roles in the various behaviours (e.g., sociosexual, defensive) in which the Me has been shown to be involved.

  9. A Cross-Layer, Anomaly-Based IDS for WSN and MANET.

    Science.gov (United States)

    Amouri, Amar; Morgera, Salvatore D; Bencherif, Mohamed A; Manthena, Raju

    2018-02-22

    Intrusion detection system (IDS) design for mobile adhoc networks (MANET) is a crucial component for maintaining the integrity of the network. The need for rapid deployment of IDS capability with minimal data availability for training and testing is an important requirement of such systems, especially for MANETs deployed in highly dynamic scenarios, such as battlefields. This work proposes a two-level detection scheme for detecting malicious nodes in MANETs. The first level deploys dedicated sniffers working in promiscuous mode. Each sniffer utilizes a decision-tree-based classifier that generates quantities which we refer to as correctly classified instances (CCIs) every reporting time. In the second level, the CCIs are sent to an algorithmically run supernode that calculates quantities, which we refer to as the accumulated measure of fluctuation (AMoF) of the received CCIs for each node under test (NUT). A key concept that is used in this work is that the variability of the smaller size population which represents the number of malicious nodes in the network is greater than the variance of the larger size population which represents the number of normal nodes in the network. A linear regression process is then performed in parallel with the calculation of the AMoF for fitting purposes and to set a proper threshold based on the slope of the fitted lines. As a result, the malicious nodes are efficiently and effectively separated from the normal nodes. The proposed scheme is tested for various node velocities and power levels and shows promising detection performance even at low-power levels. The results presented also apply to wireless sensor networks (WSN) and represent a novel IDS scheme for such networks.

  10. Commissioning of the IDS Neutron Detector and $\\beta$-decay fast-timing studies at IDS

    CERN Document Server

    Piersa, Monika

    2016-01-01

    The following report describes my scientific activities performed during the Summer Student Programme at ISOLDE. The main part of my project was focused on commissioning the neutron detector dedicated to nuclear decay studies at ISOLDE Decay Station (IDS). I have participated in all the steps needed to make it operational for the IS609 experiment. In the testing phase, we obtained expected detector response and calibrations confirmed its successful commissioning. The detector was mounted in the desired geometry at IDS and used in measurements of the beta-delayed neutron emission of $^8$He. After completing aforementioned part of my project, I became familiar with the fast-timing method. This technique was applied at IDS in the IS610 experiment performed in June 2016 to explore the structure of neutron-rich $^{130-134}$Sn nuclei. Since the main part of my PhD studies will be the analysis of data collected in this experiment, the second part of my project was dedicated to acquiring knowledge about technical de...

  11. Robust anonymous authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  12. Guide for subdivision of spent fuel pool. Project UNESA MAAP5-SFP; Guia para subdivision de la piscina de combustible gastado. Proyecto UNESA MAAP5-SFP

    Energy Technology Data Exchange (ETDEWEB)

    Martinez Barrios, M.; Garcia Gonzalez, M.; Perez Martin, F. J.

    2013-07-01

    The main goal of the UNESA MAAP5-SFP project is to analyze the capabilities of MAAP5 code and, particularly, the Spent Fuel Pool (SFP) module in order to tackle its modeling and facilitate the development of specific SFP models of Spanish NPPs. Within the project, Empresarios Agrupados (EEAA) is the responsible for the development of the Guide for the subdivision of the Spent Fuel Pool (SFP). This Guide includes a theoretical description of the model that is used by the code and a sequence of practical cases with the aim to evaluate the influence of specific parameters.

  13. ACR BI-RADS Assessment Category 4 Subdivisions in Diagnostic Mammography: Utilization and Outcomes in the National Mammography Database.

    Science.gov (United States)

    Elezaby, Mai; Li, Geng; Bhargavan-Chatfield, Mythreyi; Burnside, Elizabeth S; DeMartini, Wendy B

    2018-05-01

    Purpose To determine the utilization and positive predictive value (PPV) of the American College of Radiology (ACR) Breast Imaging Data and Reporting System (BI-RADS) category 4 subdivisions in diagnostic mammography in the National Mammography Database (NMD). Materials and Methods This study involved retrospective review of diagnostic mammography data submitted to the NMD from January 1, 2008 to December 30, 2014. Utilization rates of BI-RADS category 4 subdivisions were compared by year, facility (type, location, census region), and examination (indication, finding type) characteristics. PPV3 (positive predictive value for biopsies performed) was calculated overall and according to category 4 subdivision. The χ 2 test was used to test for significant associations. Results Of 1 309 950 diagnostic mammograms, 125 447 (9.6%) were category 4, of which 33.3% (41 841 of 125 447) were subdivided. Subdivision utilization rates were higher (P use, subdivisions were utilized in the minority (33.3% [41 841 of 125 447]) of category 4 diagnostic mammograms, with variability based on facility and examination characteristics. When subdivisions were used, PPV3s were in BI-RADS-specified malignancy ranges. This analysis supports the use of subdivisions in broad practice and, given benefits for patient care, should motivate increased utilization. © RSNA, 2018 Online supplemental material is available for this article.

  14. Extending and implementing the Persistent ID pillars

    Science.gov (United States)

    Car, Nicholas; Golodoniuc, Pavel; Klump, Jens

    2017-04-01

    The recent double decade anniversary of scholarly persistent identifier use has triggered journal special editions such as "20 Years of Persistent Identifiers". For such a publication, it is apt to consider the longevity of some persistent identifier (PID) mechanisms (Digital Object Identifiers) and the partial disappearance of others (Life Sciences IDs). We have previously postulated a set of "PID Pillars" [1] which are design principles aimed at ensuring PIDs can survive technology and social change and thus persist for the long term that we have drawn from our observations of PIDs at work over many years. The principles: describe how to ensure identifiers' system and organisation independence; codify the delivery of essential PID system functions; mandate a separation of PID functions from data delivery mechanisms; and require generation of policies detailing how change is handled. In this presentation, first we extend on our previous work of introducing the pillars by refining their descriptions, giving specific suggestions for each and presenting some work that addresses them. Second, we propose a baseline data model for persistent identifiers that, if used, would assist the separation of PID metadata and PID system functioning. This would allow PID system function specifics to change over time (e.g. resolver services or even resolution protocols) and yet preserve the PIDs themselves. Third, we detail our existing PID system — the PID Service [2] — that partially implements the pillars and describe both its successes and shortcomings. Finally, we describe our planned next-generation system that will aim to use the baseline data model and fully implement the pillars.

  15. Best practices for the implementation of the REAL ID Act.

    Science.gov (United States)

    2015-10-01

    The REAL ID Act specifies the minimum standards that must be used to produce and issue drivers license and : identification cards that are REAL ID compliant. Beginning in 2020, if a person does not possess a form of : identification that meets REA...

  16. IMI's CANCER-ID: Status of liquid biopsy standardization

    NARCIS (Netherlands)

    Pantel, Klaus; Terstappen, Leon W. M. M.; Baggiani, Barbara; Krahn, Thomas; Schlange, Thomas

    The CANCER-ID (www.cancer-id.eu) consortium was established in early 2015 with more than 30 partners as part of the Innovative Medicines Initiative (IMI), Europe's largest public-private partnership funded in equal parts by the European Union and the European Federation of Pharmaceutical Industries

  17. Evaluation of ID-PaGIA syphilis antibody test.

    Science.gov (United States)

    Naaber, Paul; Makoid, Ene; Aus, Anneli; Loivukene, Krista; Poder, Airi

    2009-01-01

    Laboratory diagnosis of syphilis is usually accomplished by serology. There are currently a large number of different commercial treponemal tests available that vary in format, sensitivity and specificity. To evaluate the ID-PaGIA Syphilis Antibody Test as an alternative to other specific treponemal tests for primary screening or confirmation of diagnosis. Serum samples from healthy adults (n = 100) were used for detection of specificity of ID-PaGIA. To evaluate sensitivity of ID-PaGIA serum samples (n = 101) from patients with confirmed or suspected syphilis were tested for syphilis antibodies with FTA-Abs IgM, ID-PaGIA, ELISA IgM and TPHA tests. No false-positive results were found with ID-PaGIA. Sensitivity of various treponemal tests was the following: FTA-Abs IgM: 95.5%, ID-PaGIA and ELISA IgM: 94%, and TPHA 75%. The positive and negative predictive values of ID-PaGIA were 100 and 89.5%, respectively. Compared with other treponemal tests ID-PaGIA has excellent sensitivity and specificity.

  18. Security analysis for biometric data in ID documents

    NARCIS (Netherlands)

    Schimke, S.; Kiltz, S.; Vielhauer, C.; Kalker, A.A.C.M.

    2005-01-01

    In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents

  19. A Contextual Model for Identity Management (IdM) Interfaces

    Science.gov (United States)

    Fuller, Nathaniel J.

    2014-01-01

    The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…

  20. 78 FR 65555 - Establishment of Class E Airspace; Salmon, ID

    Science.gov (United States)

    2013-11-01

    ...-0531; Airspace Docket No. 13-ANM-20] Establishment of Class E Airspace; Salmon, ID AGENCY: Federal... at the Salmon VHF Omni-Directional Radio Range/Distance Measuring Equipment (VOR/DME) navigation aid, Salmon, ID, to facilitate vectoring of Instrument Flight Rules (IFR) aircraft under control of Salt Lake...

  1. A decade of user operation on the macromolecular crystallography MAD beamline ID14-4 at the ESRF

    International Nuclear Information System (INIS)

    McCarthy, Andrew A.; Brockhauser, Sandor; Nurizzo, Didier; Theveneau, Pascal; Mairs, Trevor; Spruce, Darren; Guijarro, Matias; Lesourd, Marc; Ravelli, Raimond B. G.; McSweeney, Sean

    2009-01-01

    The improvement of the X-ray beam quality achieved on ID14-4 by the installation of new X-ray optical elements is described. ID14-4 at the ESRF is the first tunable undulator-based macromolecular crystallography beamline that can celebrate a decade of user service. During this time ID14-4 has not only been instrumental in the determination of the structures of biologically important molecules but has also contributed significantly to the development of various instruments, novel data collection schemes and pioneering radiation damage studies on biological samples. Here, the evolution of ID14-4 over the last decade is presented, and some of the major improvements that were carried out in order to maintain its status as one of the most productive macromolecular crystallography beamlines are highlighted. The experimental hutch has been upgraded to accommodate a high-precision diffractometer, a sample changer and a large CCD detector. More recently, the optical hutch has been refurbished in order to improve the X-ray beam quality on ID14-4 and to incorporate the most modern and robust optical elements used at other ESRF beamlines. These new optical elements will be described and their effect on beam stability discussed. These studies may be useful in the design, construction and maintenance of future X-ray beamlines for macromolecular crystallography and indeed other applications, such as those planned for the ESRF upgrade

  2. Cyclin D1, Id1 and EMT in breast cancer

    International Nuclear Information System (INIS)

    Tobin, Nicholas P; Sims, Andrew H; Lundgren, Katja L; Lehn, Sophie; Landberg, Göran

    2011-01-01

    Cyclin D1 is a well-characterised cell cycle regulator with established oncogenic capabilities. Despite these properties, studies report contrasting links to tumour aggressiveness. It has previously been shown that silencing cyclin D1 increases the migratory capacity of MDA-MB-231 breast cancer cells with concomitant increase in 'inhibitor of differentiation 1' (ID1) gene expression. Id1 is known to be associated with more invasive features of cancer and with the epithelial-mesenchymal transition (EMT). Here, we sought to determine if the increase in cell motility following cyclin D1 silencing was mediated by Id1 and enhanced EMT-features. To further substantiate these findings we aimed to delineate the link between CCND1, ID1 and EMT, as well as clinical properties in primary breast cancer. Protein and gene expression of ID1, CCND1 and EMT markers were determined in MDA-MB-231 and ZR75 cells by western blot and qPCR. Cell migration and promoter occupancy were monitored by transwell and ChIP assays, respectively. Gene expression was analysed from publicly available datasets. The increase in cell migration following cyclin D1 silencing in MDA-MB-231 cells was abolished by Id1 siRNA treatment and we observed cyclin D1 occupancy of the Id1 promoter region. Moreover, ID1 and SNAI2 gene expression was increased following cyclin D1 knock-down, an effect reversed with Id1 siRNA treatment. Similar migratory and SNAI2 increases were noted for the ER-positive ZR75-1 cell line, but in an Id1-independent manner. In a meta-analysis of 1107 breast cancer samples, CCND1 low /ID1 high tumours displayed increased expression of EMT markers and were associated with reduced recurrence free survival. Finally, a greater percentage of CCND1 low /ID1 high tumours were found in the EMT-like 'claudin-low' subtype of breast cancer than in other subtypes. These results indicate that increased migration of MDA-MB-231 cells following cyclin D1 silencing can be mediated by Id

  3. [Genetic structure, subdivision, and population differentiation in Stankewiczii pine Pinus stankewiczii (Sukacz.) Fomin from Mountain Crimea].

    Science.gov (United States)

    Korshikov, I I; Gorlova, E M

    2006-06-01

    In order to analyze the genetic structure, subdivision and differentiation within and between two small isolated populations of the Crimea relict endemic, Pinus stankewiczii (Sukacz.) Fomin, electrophoretic analysis of the isozyme variation at nine enzymatic systems was carried out using 183 oldest trees. It was demonstrated that in populations of P. stankewiczii, 80% of the genes were in polymorphic state. Each tree was heterozygous at 19.1% loci, and at 21.6% loci in artificial 50-year-old plantation. The genetic structure of two populations was less differentiated (DN = 0.006), compared to their individual localities (DN = 0.008-0.009). Within-population subdivision of the diffusely dispersed populations was higher (FST-GST = 1.8-2.0%) than that of the populations themselves (0.8%).

  4. Investigation of grain subdivision at very low plastic strains in a magnesium alloy

    Energy Technology Data Exchange (ETDEWEB)

    Hong, X. [Key Laboratory of Advanced Materials (MOE), School of Materials Science and Engineering, Tsinghua University, Beijing 100084 (China); Godfrey, A., E-mail: awgodfrey@mail.tsinghua.edu.cn [Key Laboratory of Advanced Materials (MOE), School of Materials Science and Engineering, Tsinghua University, Beijing 100084 (China); Zhang, C.L.; Liu, W. [Key Laboratory of Advanced Materials (MOE), School of Materials Science and Engineering, Tsinghua University, Beijing 100084 (China); Chapuis, A. [College of Materials Science and Engineering, Chongqing University, Chongqing 400044 (China)

    2017-05-02

    In-situ tensile loading combined with electron backscatter diffraction (EBSD) measurements has been used to investigate the plastic deformation of a magnesium alloy. A novel EBSD mapping is presented, based on construction of maps showing the rotation axis component in the sample coordinate frame of the misorientation from each pixel to the average grain orientation in the deformed sample. Using this mapping it is shown that the pattern of grain subdivision, even at very low plastic strains, can be revealed simultaneously in a large number of grains. In addition, it is demonstrated how maps of the rotation axis corresponding to the misorientation between each pixel and the initial grain orientation provide complimentary information directly useful for crystal plasticity analysis. A detailed slip system analysis shows that the grain subdivision can be accounted for according to the low energy dislocation structures (LEDS) model of work-hardening by differences in the slip amplitudes within different parts of each grain.

  5. Investigating the mixture and subdivision of perceptual and conceptual processing in Japanese memory tests.

    Science.gov (United States)

    Gabeza, R

    1995-03-01

    The dual nature of the Japanese writing system was used to investigate two assumptions of the processing view of memory transfer: (1) that both perceptual and conceptual processing can contribute to the same memory test (mixture assumption) and (2) that both can be broken into more specific processes (subdivision assumption). Supporting the mixture assumption, a word fragment completion test based on ideographic kanji characters (kanji fragment completion test) was affected by both perceptual (hiragana/kanji script shift) and conceptual (levels-of-processing) study manipulations kanji fragments, because it did not occur with the use of meaningless hiragana fragments. The mixture assumption is also supported by an effect of study script on an implicit conceptual test (sentence completion), and the subdivision assumption is supported by a crossover dissociation between hiragana and kanji fragment completion as a function of study script.

  6. A new subdivision of the central Sesia Zone (Aosta Valley, Italy)

    Science.gov (United States)

    Giuntoli, Francesco; Engi, Martin; Manzotti, Paola; Ballèvre, Michel

    2015-04-01

    The Sesia Zone in the Western Alps is a continental terrane probably derived from the NW-Adriatic margin and polydeformed at HP conditions during Alpine convergence. Subdivisions of the Sesia Zone classically have been based on the dominant lithotypes: Eclogitic Micaschist Complex, Seconda Zona Diorito-Kinzigitica, and Gneiss Minuti Complex. However, recent work (Regis et al., 2014) on what was considered a single internal unit has revealed that it comprises two or more tectonic slices that experienced substantially different PTDt-evolutions. Therefore, detailed regional petrographic and structural mapping (1:3k to 1:10k) was undertaken and combined with extensive sampling for petrochronological analysis. Results allow us to propose a first tectonic scheme for the Sesia Zone between the Aosta Valley and Val d'Ayas. A set of field criteria was developed and applied, aiming to recognize and delimit the first order tectonic units in this complex structural and metamorphic context. The approach rests on three criteria used in the field: (1) Discontinuously visible metasedimentary trails (mostly carbonates) considered to be monocyclic (Permo-Mesozoic protoliths); (2) mappable high-strain zones; and (3) visible differences in the metamorphic imprint. None of these key features used are sufficient by themselves, but in combination they allow us to propose a new map that delimits main units. We propose an Internal Complex with three eclogitic sheets, each 0.5-3 km thick. Dominant lithotypes include micaschists associated with mafic rocks and minor orthogneiss. The main foliation is of HP, dipping moderately NW. Each of these sheets is bounded by (most likely monometamorphic) sediments, <10-50 m thick. HP-relics (of eclogite facies) are widespread, but a greenschist facies overprint locally is strong close to the tectonic contact to neighbouring sheets. An Intermediate Complex lies NW of the Internal Complex and comprises two thinner, wedge-shaped units termed slices. These

  7. Expression of Id2 in the Second Heart Field and Cardiac Defects in Id2 Knock-Out Mice

    NARCIS (Netherlands)

    Jongbloed, M. R. M.; Vicente-Steijn, R.; Douglas, Y. L.; Wisse, L. J.; Mori, K.; Yokota, Y.; Bartelings, M. M.; Schalij, M. J.; Mahtab, E. A.; Poelmann, R. E.; Gittenberger-De Groot, A. C.

    2011-01-01

    The inhibitor of differentiation Id2 is expressed in mesoderm of the second heart field, which contributes myocardial and mesenchymal cells to the primary heart tube. The role of Id2 in cardiac development is insufficiently known. Heart development was studied in sequential developmental stages in

  8. Modelling research on determining shape coefficients for subdivision interpretation in γ-ray spectral logging

    International Nuclear Information System (INIS)

    Yin Wangming; She Guanjun; Tang Bin

    2011-01-01

    This paper first describes the physical meaning of the shape coefficients in the subdivision interpretation of γ-ray logging; then discusses the theory, method to determine the practical shape coefficients with logging model and defines the formula to approximately calculate the coefficients. A great deal of experimental work has been preformed with a HPGe γ-ray spectrometer and reached satisfied result which has validated the effeciency of the modelling method. (authors)

  9. A Subdivision Method to Unify the Existing Latitude and Longitude Grids

    Directory of Open Access Journals (Sweden)

    Chengqi Cheng

    2016-09-01

    Full Text Available As research on large regions of earth progresses, many geographical subdivision grids have been established for various spatial applications by different industries and disciplines. However, there is no clear relationship between the different grids and no consistent spatial reference grid that allows for information exchange and comprehensive application. Sharing and exchange of data across departments and applications are still at a bottleneck. It would represent a significant step forward to build a new grid model that is inclusive of or compatible with most of the existing geodesic grids and that could support consolidation and exchange within existing data services. This study designs a new geographical coordinate global subdividing grid with one dimension integer coding on a 2n tree (GeoSOT that has 2n coordinate subdivision characteristics (global longitude and latitude subdivision and can form integer hierarchies at degree, minute, and second levels. This grid has the multi-dimensional quadtree hierarchical characteristics of a digital earth grid, but also provides good consistency with applied grids, such as those used in mapping, meteorology, oceanography and national geographical, and three-dimensional digital earth grids. No other existing grid codes possess these characteristics.

  10. Performance improvement of haptic collision detection using subdivision surface and sphere clustering.

    Directory of Open Access Journals (Sweden)

    A Ram Choi

    Full Text Available Haptics applications such as surgery simulations require collision detections that are more precise than others. An efficient collision detection method based on the clustering of bounding spheres was proposed in our prior study. This paper analyzes and compares the applied effects of the five most common subdivision surface methods on some 3D models for haptic collision detection. The five methods are Butterfly, Catmull-Clark, Mid-point, Loop, and LS3 (Least Squares Subdivision Surface. After performing a number of experiments, we have concluded that LS3 method is the most appropriate for haptic simulations. The more we applied surface subdivision, the more the collision detection results became precise. However, it is observed that the performance becomes better until a certain threshold and degrades afterward. In order to reduce the performance degradation, we adopted our prior work, which was the fast and precise collision detection method based on adaptive clustering. As a result, we obtained a notable improvement of the speed of collision detection.

  11. Stability of class II subdivision malocclusion treatment with 3 and 4 premolar extractions.

    Science.gov (United States)

    Janson, Guilherme; Araki, Janine; Estelita, Sérgio; Camardella, Leonardo T

    2014-12-30

    The purpose of this study was to compare the occlusal stability of class II subdivision malocclusion treatment with 3 and 4 first premolar extractions. A sample of 156 dental casts from 52 patients with class II subdivision malocclusion was divided into two groups according to the extraction protocol. Group 1 comprised 24 patients treated with 3 premolar extractions and group 2 included 28 patients treated with 4 premolar extractions. Peer assessment rating (PAR) indexes were measured on the dental casts obtained before (T1) and after treatment (T2) and at a mean of 6.9 years after the end of treatment (T3). The groups were matching regarding sex distribution, pretreatment, posttreatment and long-term posttreatment ages, and treatment and long-term posttreatment times. They were also comparable concerning the initial malocclusion severity and the occlusal results at the end of treatment. Stability evaluation was calculated by subtracting the posttreatment from the long-term posttreatment index values (T3 - T2). T tests were used to compare the amount and percentage of long-term posttreatment changes. There were no intergroup differences regarding the amount and percentage of long-term posttreatment changes. Treatment of class II subdivision malocclusion with 3 and 4 premolar extractions have a similar long-term posttreatment occlusal stability.

  12. TIGER/Line Shapefile, 2014, Series Information File for the Current County Subdivision State-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — County subdivisions are the primary divisions of counties and their equivalent entities for the reporting of Census Bureau data. They include legally-recognized...

  13. Brainstem projections of neurons located in various subdivisions of the dorsolateral hypothalamic area – an anterograde tract-tracing study

    OpenAIRE

    Rege Sugárka Papp; Rege Sugárka Papp; Miklos ePalkovits; Miklos ePalkovits

    2014-01-01

    The projections from the dorsolateral hypothalamic area (DLH) to the lower brainstem have been investigated by using biotinylated dextran amine (BDA), an anterograde tracer in rats. The DLH can be divided into 3 areas (dorsomedial hypothalamus, perifornical area, lateral hypothalamic area), and further subdivided into 8 subdivisions. After unilateral stereotaxic injections of BDA into individual DLH subdivisions, the correct sites of injections were controlled histologically, and the distribu...

  14. Brainstem projections of neurons located in various subdivisions of the dorsolateral hypothalamic area—an anterograde tract-tracing study

    OpenAIRE

    Papp, Rege S.; Palkovits, Miklós

    2014-01-01

    The projections from the dorsolateral hypothalamic area (DLH) to the lower brainstem have been investigated by using biotinylated dextran amine (BDA), an anterograde tracer in rats. The DLH can be divided into 3 areas (dorsomedial hypothalamus, perifornical area, lateral hypothalamic area), and further subdivided into 8 subdivisions. After unilateral stereotaxic injections of BDA into individual DLH subdivisions, the correct sites of injections were controlled histologically, and the distribu...

  15. Id-1 and Id-2 genes and products as therapeutic targets for treatment of breast cancer and other types of carcinoma

    Science.gov (United States)

    Desprez, Pierre-Yves; Campisi, Judith

    2014-09-30

    A method for treatment and amelioration of breast, cervical, ovarian, endometrial, squamous cells, prostate cancer and melanoma in a patient comprising targeting Id-1 or Id-2 gene expression with a delivery vehicle comprising a product which modulates Id-1 or Id-2 expression.

  16. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  17. FDIC Institution Directory (ID) -- Insured Insitution Download File

    Data.gov (United States)

    Federal Deposit Insurance Corporation — The FDIC's Institution Directory (ID) download file provides a list of all FDIC-insured institutions. The file includes demographic information related to the...

  18. ID card number detection algorithm based on convolutional neural network

    Science.gov (United States)

    Zhu, Jian; Ma, Hanjie; Feng, Jie; Dai, Leiyan

    2018-04-01

    In this paper, a new detection algorithm based on Convolutional Neural Network is presented in order to realize the fast and convenient ID information extraction in multiple scenarios. The algorithm uses the mobile device equipped with Android operating system to locate and extract the ID number; Use the special color distribution of the ID card, select the appropriate channel component; Use the image threshold segmentation, noise processing and morphological processing to take the binary processing for image; At the same time, the image rotation and projection method are used for horizontal correction when image was tilting; Finally, the single character is extracted by the projection method, and recognized by using Convolutional Neural Network. Through test shows that, A single ID number image from the extraction to the identification time is about 80ms, the accuracy rate is about 99%, It can be applied to the actual production and living environment.

  19. Identity Management ToolKit (IdM TK)

    Data.gov (United States)

    Department of Veterans Affairs — With the IdM TK, authorized users can search and view identity and exception information from the Administrative Data Repository (ADR). Specifically, users can view...

  20. A Good IDS Response Protocol of MANET Containment Strategies

    Science.gov (United States)

    Cheng, Bo-Chao; Chen, Huan; Tseng, Ryh-Yuh

    Much recent research concentrates on designing an Intrusion Detection System (IDS) to detect the misbehaviors of the malicious node in MANET with ad-hoc and mobility natures. However, without rapid and appropriate IDS response mechanisms performing follow-up management services, even the best IDS cannot achieve the desired primary goal of the incident response. A competent containment strategy is needed to limit the extent of an attack in the Incident Response Life Cycle. Inspired by the T-cell mechanisms in the human immune system, we propose an efficient MANET IDS response protocol (T-SecAODV) that can rapidly and accurately disseminate alerts of the malicious node attacks to other nodes so as to modify their AODV routing tables to isolate the malicious nodes. Simulations are conducted by the network simulator (Qualnet), and the experiment results indicate that T-SecAODV is able to spread alerts steadily while greatly reduce faulty rumors under simultaneous multiple malicious node attacks.

  1. The Antibody Response of Pregnant Cameroonian Women to VAR2CSA ID1-ID2a, a Small Recombinant Protein Containing the CSA-Binding Site

    Science.gov (United States)

    Babakhanyan, Anna; Leke, Rose G. F.; Salanti, Ali; Bobbili, Naveen; Gwanmesia, Philomina; Leke, Robert J. I.; Quakyi, Isabella A.; Chen, John J.; Taylor, Diane Wallace

    2014-01-01

    In pregnant women, Plasmodium falciparum-infected erythrocytes expressing the VAR2CSA antigen bind to chondroitin sulfate A in the placenta causing placental malaria. The binding site of VAR2CSA is present in the ID1-ID2a region. This study sought to determine if pregnant Cameroonian women naturally acquire antibodies to ID1-ID2a and if antibodies to ID1-ID2a correlate with absence of placental malaria at delivery. Antibody levels to full-length VAR2CSA and ID1-ID2a were measured in plasma samples from 745 pregnant Cameroonian women, 144 Cameroonian men, and 66 US subjects. IgM levels and IgG avidity to ID1-ID2a were also determined. As expected, antibodies to ID1-ID2a were absent in US controls. Although pregnant Cameroonian women developed increasing levels of antibodies to full-length VAR2CSA during pregnancy, no increase in either IgM or IgG to ID1-ID2a was observed. Surprisingly, no differences in antibody levels to ID1-ID2a were detected between Cameroonian men and pregnant women. For example, in rural settings only 8–9% of males had antibodies to full-length VAR2CSA, but 90–96% had antibodies to ID1-ID2a. In addition, no significant difference in the avidity of IgG to ID1-ID2a was found between pregnant women and Cameroonian men, and no correlation between antibody levels at delivery and absence of placental malaria was found. Thus, the response to ID1-ID2a was not pregnancy specific, but predominantly against cross-reactivity epitopes, which may have been induced by other PfEMP1 antigens, malarial antigens, or microbes. Currently, ID1-ID2a is a leading vaccine candidate, since it binds to the CSA with the same affinity as the full-length molecule and elicits binding-inhibitory antibodies in animals. Further studies are needed to determine if the presence of naturally acquired cross-reactive antibodies in women living in malaria endemic countries will alter the response to ID1-ID2a following vaccination with ID1-ID2a. PMID:24505415

  2. The antibody response of pregnant Cameroonian women to VAR2CSA ID1-ID2a, a small recombinant protein containing the CSA-binding site.

    Directory of Open Access Journals (Sweden)

    Anna Babakhanyan

    Full Text Available In pregnant women, Plasmodium falciparum-infected erythrocytes expressing the VAR2CSA antigen bind to chondroitin sulfate A in the placenta causing placental malaria. The binding site of VAR2CSA is present in the ID1-ID2a region. This study sought to determine if pregnant Cameroonian women naturally acquire antibodies to ID1-ID2a and if antibodies to ID1-ID2a correlate with absence of placental malaria at delivery. Antibody levels to full-length VAR2CSA and ID1-ID2a were measured in plasma samples from 745 pregnant Cameroonian women, 144 Cameroonian men, and 66 US subjects. IgM levels and IgG avidity to ID1-ID2a were also determined. As expected, antibodies to ID1-ID2a were absent in US controls. Although pregnant Cameroonian women developed increasing levels of antibodies to full-length VAR2CSA during pregnancy, no increase in either IgM or IgG to ID1-ID2a was observed. Surprisingly, no differences in antibody levels to ID1-ID2a were detected between Cameroonian men and pregnant women. For example, in rural settings only 8-9% of males had antibodies to full-length VAR2CSA, but 90-96% had antibodies to ID1-ID2a. In addition, no significant difference in the avidity of IgG to ID1-ID2a was found between pregnant women and Cameroonian men, and no correlation between antibody levels at delivery and absence of placental malaria was found. Thus, the response to ID1-ID2a was not pregnancy specific, but predominantly against cross-reactivity epitopes, which may have been induced by other PfEMP1 antigens, malarial antigens, or microbes. Currently, ID1-ID2a is a leading vaccine candidate, since it binds to the CSA with the same affinity as the full-length molecule and elicits binding-inhibitory antibodies in animals. Further studies are needed to determine if the presence of naturally acquired cross-reactive antibodies in women living in malaria endemic countries will alter the response to ID1-ID2a following vaccination with ID1-ID2a.

  3. La certificazione professionale I&D in Europa

    OpenAIRE

    Franco, Augusta

    2003-01-01

    The statement points out the activity of I&D European associations in the field of competences' certification, in ECIA federation's area as well as in the national one. In the statement there are references on history and outcomes of DECIDoc project; objectives and operative stages of CERTIDoc project, promoted by ECIA; and enterprises of I&D associations in France, Spain, Germany and Italy. Secondly, it is illustrated the activity of Italian librarians and archivists associatio...

  4. Application of information technology in the process analysis of structural subdivisions of light industry enterprises

    Directory of Open Access Journals (Sweden)

    Тарана Тахир кызы Мусаева

    2016-02-01

    Full Text Available The problems of application of information technologies in the process analysis of structural subdivisions of the enterprises of light industry enterprises are considered. For the functional cost analysis in the company it was prepared a computerized structure of the workplace and its principle of operation is described. The functionality of the computerized workplace is tested for textile enterprises. The results showed that the use of information technology has good prospects at the implementation of the quality management system at the textile enterprises

  5. Guide for subdivision of spent fuel pool. Project UNESA MAAP5-SFP

    International Nuclear Information System (INIS)

    Martinez Barrios, M.; Garcia Gonzalez, M.; Perez Martin, F. J.

    2013-01-01

    The main goal of the UNESA MAAP5-SFP project is to analyze the capabilities of MAAP5 code and, particularly, the Spent Fuel Pool (SFP) module in order to tackle its modeling and facilitate the development of specific SFP models of Spanish NPPs. Within the project, Empresarios Agrupados (EEAA) is the responsible for the development of the Guide for the subdivision of the Spent Fuel Pool (SFP). This Guide includes a theoretical description of the model that is used by the code and a sequence of practical cases with the aim to evaluate the influence of specific parameters

  6. Treatment of Class II subdivision malocclusion with congenitally missing upper lateral incisors: A case report

    Directory of Open Access Journals (Sweden)

    Siddharth Mehta

    2014-01-01

    Full Text Available Orthodontic treatment for patients with unilateral or bilateral congenitally missing lateral incisor poses a challenge mainly with regard to treatment planning. The use of a diagnostic setup is one of the most important aids in the decision-making process. Two alternatives, orthodontic space closure or space opening for prosthetic replacement exist. The present case report shows use of the microimplant for unilateral upper molar distalization and space closure in a Class-II division 1 subdivision malocclusion case with bilateral congenitally missing upper lateral incisors.

  7. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  8. Radiation-induced grain subdivision and bubble formation in U3Si2 at LWR temperature

    Science.gov (United States)

    Yao, Tiankai; Gong, Bowen; He, Lingfeng; Harp, Jason; Tonks, Michael; Lian, Jie

    2018-01-01

    U3Si2, an advanced fuel form proposed for light water reactors (LWRs), has excellent thermal conductivity and a high fissile element density. However, limited understanding of the radiation performance and fission gas behavior of U3Si2 is available at LWR conditions. This study explores the irradiation behavior of U3Si2 by 300 keV Xe+ ion beam bombardment combining with in-situ transmission electron microscopy (TEM) observation. The crystal structure of U3Si2 is stable against radiation-induced amorphization at 350 °C even up to a very high dose of 64 displacements per atom (dpa). Grain subdivision of U3Si2 occurs at a relatively low dose of 0.8 dpa and continues to above 48 dpa, leading to the formation of high-density nanoparticles. Nano-sized Xe gas bubbles prevail at a dose of 24 dpa, and Xe bubble coalescence was identified with the increase of irradiation dose. The volumetric swelling resulting from Xe gas bubble formation and coalescence was estimated with respect to radiation dose, and a 2.2% volumetric swelling was observed for U3Si2 irradiated at 64 dpa. Due to extremely high susceptibility to oxidation, the nano-sized U3Si2 grains upon radiation-induced grain subdivision were oxidized to nanocrystalline UO2 in a high vacuum chamber for TEM observation, eventually leading to the formation of UO2 nanocrystallites stable up to 80 dpa.

  9. Functional subdivision of group-ICA results of fMRI data collected during cinema viewing.

    Directory of Open Access Journals (Sweden)

    Siina Pamilo

    Full Text Available Independent component analysis (ICA can unravel functional brain networks from functional magnetic resonance imaging (fMRI data. The number of the estimated components affects both the spatial pattern of the identified networks and their time-course estimates. Here group-ICA was applied at four dimensionalities (10, 20, 40, and 58 components to fMRI data collected from 15 subjects who viewed a 15-min silent film ("At land" by Maya Deren. We focused on the dorsal attention network, the default-mode network, and the sensorimotor network. The lowest dimensionalities demonstrated most prominent activity within the dorsal attention network, combined with the visual areas, and in the default-mode network; the sensorimotor network only appeared with ICA comprising at least 20 components. The results suggest that even very low-dimensional ICA can unravel the most prominent functionally-connected brain networks. However, increasing the number of components gives a more detailed picture and functionally feasible subdivision of the major networks. These results improve our understanding of the hierarchical subdivision of brain networks during viewing of a movie that provides continuous stimulation embedded in an attention-directing narrative.

  10. Functional subdivision of group-ICA results of fMRI data collected during cinema viewing.

    Science.gov (United States)

    Pamilo, Siina; Malinen, Sanna; Hlushchuk, Yevhen; Seppä, Mika; Tikka, Pia; Hari, Riitta

    2012-01-01

    Independent component analysis (ICA) can unravel functional brain networks from functional magnetic resonance imaging (fMRI) data. The number of the estimated components affects both the spatial pattern of the identified networks and their time-course estimates. Here group-ICA was applied at four dimensionalities (10, 20, 40, and 58 components) to fMRI data collected from 15 subjects who viewed a 15-min silent film ("At land" by Maya Deren). We focused on the dorsal attention network, the default-mode network, and the sensorimotor network. The lowest dimensionalities demonstrated most prominent activity within the dorsal attention network, combined with the visual areas, and in the default-mode network; the sensorimotor network only appeared with ICA comprising at least 20 components. The results suggest that even very low-dimensional ICA can unravel the most prominent functionally-connected brain networks. However, increasing the number of components gives a more detailed picture and functionally feasible subdivision of the major networks. These results improve our understanding of the hierarchical subdivision of brain networks during viewing of a movie that provides continuous stimulation embedded in an attention-directing narrative.

  11. Functional Subdivision of Group-ICA Results of fMRI Data Collected during Cinema Viewing

    Science.gov (United States)

    Pamilo, Siina; Malinen, Sanna; Hlushchuk, Yevhen; Seppä, Mika; Tikka, Pia; Hari, Riitta

    2012-01-01

    Independent component analysis (ICA) can unravel functional brain networks from functional magnetic resonance imaging (fMRI) data. The number of the estimated components affects both the spatial pattern of the identified networks and their time-course estimates. Here group-ICA was applied at four dimensionalities (10, 20, 40, and 58 components) to fMRI data collected from 15 subjects who viewed a 15-min silent film (“At land” by Maya Deren). We focused on the dorsal attention network, the default-mode network, and the sensorimotor network. The lowest dimensionalities demonstrated most prominent activity within the dorsal attention network, combined with the visual areas, and in the default-mode network; the sensorimotor network only appeared with ICA comprising at least 20 components. The results suggest that even very low-dimensional ICA can unravel the most prominent functionally-connected brain networks. However, increasing the number of components gives a more detailed picture and functionally feasible subdivision of the major networks. These results improve our understanding of the hierarchical subdivision of brain networks during viewing of a movie that provides continuous stimulation embedded in an attention-directing narrative. PMID:22860044

  12. Geologic and geotechnical investigation of the Windsor Park subdivision North Las Vegas, Nevada

    International Nuclear Information System (INIS)

    Linnert, L.M.; Werle, J.L.; Stilley, A.N.; Olsen, B.L.

    1994-01-01

    The Windsor Park subdivision in North Las Vegas, Nevada has received widespread attention for damage to the homes and infrastructure from fissures, land subsidence and adverse soil conditions. Between March and July, 1992, Converse Consultants Southwest, Inc. conducted a geologic and geotechnical investigation for the Windsor Park Revitalization Project. The purpose of the work was to investigate the probable factors contributing to the reported damage and distress in the area, evaluate the potential for future damage, and assess the feasibility of possible mitigation and repair. The site is constructed on the juncture of at least two subsidence-related fault scarps, and earth fissures have been extensively mapped in the Windsor Park and surrounding area. A total of twenty-one trenches and fifteen borings were located within the subdivision and around the perimeter to observe subsurface geologic features and to collect samples for laboratory testing. The primary causes of damage within the development were found to be (1) earth fissuring and (2) expansive clays. The risk of future damage to structures at the Windsor Park site was also evaluated. A high potential for fissuring was found at the site, and future structural distress in the area will likely be similar to past damage. Although engineering upgrades will reduce the risk posed by underlying expansive clays, they cannot totally eliminate the risk from fissuring. 10 refs., 8 figs., 1 tab

  13. Multiple approaches to valuation of conservation design and low-impact development features in residential subdivisions.

    Science.gov (United States)

    Bowman, Troy; Tyndall, John C; Thompson, Janette; Kliebenstein, James; Colletti, Joe P

    2012-08-15

    Residents, developers and civic officials are often faced with difficult decisions about appropriate land uses in and around metropolitan boundaries. Urban expansion brings with it the potential for negative environmental impacts, but there are alternatives, such as conservation subdivision design (CSD) or low-impact development (LID), which offer the possibility of mitigating some of these effects at the development site. Many urban planning jurisdictions across the Midwest do not currently have any examples of these designs and lack information to identify public support or barriers to use of these methods. This is a case study examining consumer value for conservation and low-impact design features in one housing market by using four different valuation techniques to estimate residents' willingness to pay for CSD and LID features in residential subdivisions. A contingent valuation survey of 1804 residents in Ames, IA assessed familiarity with and perceptions of subdivision development and used an ordered value approach to estimate willingness to pay for CSD and LID features. A majority of residents were not familiar with CSD or LID practices. Residents indicated a willingness to pay for most CSD and LID features with the exception of clustered housing. Gender, age, income, familiarity with LID practices, perceptions of attractiveness of features and the perceived effect of CSD and LID features on ease of future home sales were important factors influencing residents' willingness to pay. A hypothetical referendum measured willingness to pay for tax-funded conservation land purchases and estimated that a property tax of around $50 would be the maximum increase that would pass. Twenty-seven survey respondents participated in a subsequent series of experimental real estate negotiations that used an experimental auction mechanism to estimate willingness to pay for CSD and LID features. Participants indicated that clustered housing (with interspersed preserved forest

  14. Aliénation et idéologie

    OpenAIRE

    Kanabus, Benoît; Popa, Délia

    2017-01-01

    Dès lors, on entend mieux la question sur laquelle se referment les mille pages du Marx : « La pensée de Marx nous place devant la question abyssale : qu’est-ce que la vie » ? Cette question peut être reposée à nouveaux frais à l’âge du capitalisme avancé, où, comme le notait Adorno, la vie est devenue « l’idéologie de sa propre absence ». La recherche d’un autre rapport à l’idéologie vient alors prendre le relais de la lutte anti-idéologique de la théorie critique. Cette recherche part du po...

  15. Robust Fourier Watermarking for ID Images on Smart Card Plastic Supports

    Directory of Open Access Journals (Sweden)

    RIAD, R.

    2016-11-01

    Full Text Available Security checking can be improved by watermarking identity (ID images printed on smart cards plastic supports. The major challenge is resistance to attacks: printing the images on the plastic cards, durability and other attacks then scanning the image from the plastic card. In this work, a robust watermarking technique is presented in this context. It is composed of three main mechanisms. The first is a watermarking algorithm based on the Fourier transform to cope with global geometric distortions. The second comprises a filter that reduces image blurring. The third attenuates color degradations. Experiments on 400 ID images show that the Wiener filter strongly improves the detection rate and outperforms competitive algorithms (blind deconvolution and unsharp filter. Color corrections also enhance the watermarking score. The whole scheme has a high efficiency and a low computational cost. It makes it compatible with the desired industrial constraints, i.e. the watermark is to be invisible, the error rate must be lower than 1%, and the detection of the mark should be fast and simple for the user.

  16. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    Full Text Available With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  17. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    Science.gov (United States)

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  18. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Science.gov (United States)

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  19. Subdivisions of the adult zebrafish pallium based on molecular marker analysis [version 2; referees: 2 approved, 1 approved with reservations

    Directory of Open Access Journals (Sweden)

    Julia Ganz

    2015-11-01

    Full Text Available Background: The telencephalon shows a remarkable structural diversity among vertebrates. In particular, the everted telencephalon of ray-finned fishes has a markedly different morphology compared to the evaginated telencephalon of all other vertebrates. This difference in development has hampered the comparison between different areas of the pallium of ray-finned fishes and the pallial nuclei of all other vertebrates. Various models of homology between pallial subdivisions in ray-finned fishes and the pallial nuclei in tetrapods have been proposed based on connectional, neurochemical, gene expression and functional data. However, no consensus has been reached so far. In recent years, the analysis of conserved developmental marker genes has assisted the identification of homologies for different parts of the telencephalon among several tetrapod species. Results: We have investigated the gene expression pattern of conserved marker genes in the adult zebrafish (Danio rerio pallium to identify pallial subdivisions and their homology to pallial nuclei in tetrapods. Combinatorial expression analysis of ascl1a, eomesa, emx1, emx2, emx3, and Prox1 identifies four main divisions in the adult zebrafish pallium. Within these subdivisions, we propose that Dm is homologous to the pallial amygdala in tetrapods and that the dorsal subdivision of Dl is homologous to part of the hippocampal formation in mouse. We have complemented this analysis be examining the gene expression of emx1, emx2 and emx3 in the zebrafish larval brain. Conclusions: Based on our gene expression data, we propose a new model of subdivisions in the adult zebrafish pallium and their putative homologies to pallial nuclei in tetrapods. Pallial nuclei control sensory, motor, and cognitive functions, like memory, learning and emotion. The identification of pallial subdivisions in the adult zebrafish and their homologies to pallial nuclei in tetrapods will contribute to the use of the zebrafish

  20. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  1. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  2. Identification of Staphylococcus species and subspecies with the MicroScan Pos ID and Rapid Pos ID panel systems.

    Science.gov (United States)

    Kloos, W E; George, C G

    1991-01-01

    The accuracies of the MicroScan Pos ID and Rapid Pos ID panel systems (Baxter Diagnostic Inc., MicroScan Division, West Sacramento, Calif.) were compared with each other and with the accuracies of conventional methods for the identification of 25 Staphylococcus species and 4 subspecies. Conventional methods included those used in the original descriptions of species and subspecies and DNA-DNA hybridization. The Pos ID panel uses a battery of 18 tests, and the Rapid Pos ID panel uses a battery of 42 tests for the identification of Staphylococcus species. The Pos ID panel has modified conventional and chromogenic tests that can be read after 15 to 48 h of incubation; the Rapid Pos ID panel has tests that use fluorogenic substrates or fluorometric indicators, and test results can be read after 2 h of incubation in the autoSCAN-W/A. Results indicated that both MicroScan systems had a high degree of congruence (greater than or equal to 90%) with conventional methods for the species S. capitis, S. aureus, S. auricularis, S. saprophyticus, S. cohnii, S. arlettae, S. carnosus, S. lentus, and S. sciuri and, in particular, the subspecies S. capitis subsp. capitis and S. cohnii subsp. cohnii. The Rapid Pos ID panel system also had greater than or equal to 90% congruence with conventional methods for S. epidermidis, S. caprae, S. warneri subsp. 2, S. xylosus, S. kloosii, and S. caseolyticus. For both MicroScan systems, congruence with conventional methods was 80 to 90% for S. haemolyticus subsp. 1, S. equorum, S. intermedius, and S. hyicus; and in addition, with the Rapid Pos ID panel system congruence was 80 to 89% for S. capitis subsp. ureolyticus, S. warneri subsp. 1, S. hominis, S. cohnii subsp. urealyticum, and S. simulans. The MicroScan systems identified a lower percentage (50 to 75%) of strains of S. lugdunensis, S. gallinarum, S. schleiferi, and S. chromogenes, although the addition of specific tests to the systems might increase the accuracy of identification

  3. Comparison of the optimized conditions for genotyping of ACE ID ...

    African Journals Online (AJOL)

    STORAGESEVER

    2009-10-19

    Oct 19, 2009 ... variants (Koyama et al., 2008). This method removed the chances of mistyping and gave 100% accuracy in the confirmation of ID heterozygotes but expenses of chromatography did not prove it to be cost effective. Normally, genomic DNA is used as template DNA for. PCR based studies. It is very difficult to ...

  4. Screening of Lactobacillus plantarum isolated from fermented idli ...

    African Journals Online (AJOL)

    Probiotics are defined as live microorganisms which when administered in adequate amounts confer a health benefit on the host. The objective of this study was to screen eight potential probiotic Lactobacillus plantarum strains from fermented idli batter using in vitro assays such as bile tolerance, acid tolerance, transit ...

  5. Comparison of the optimized conditions for genotyping of ACE ID ...

    African Journals Online (AJOL)

    ACE ID polymorphism is inevitable for genetic epidemiology of several cardiovascular and non cardiovascular diseases due to its direct influence on ACE activity level. In the present work, conditions were optimized for its analysis using conventional and direct blood PCR (DB PCR). Blood samples from nine normotensive ...

  6. Anmeldung in ILIAS ohne Uni-Login-ID

    OpenAIRE

    Schanz, Nadja

    2016-01-01

    Gewusst wie...! Online-Tutorial der Universitätsbibliothek Tübingen. Erklärt die Anmeldung in Ilias zu Führungen ohne Uni-Login-ID Online Tutorial from university library tuebingen. teaches how to register in Ilias for courses and guided tours without university login

  7. idRHa+ProMod - Rail Hardening Control System

    International Nuclear Information System (INIS)

    Ferro, L

    2016-01-01

    idRHa+ProMod is the process control system developed by Primetals Technologies to foresee the thermo-mechanical evolution and micro-structural composition of rail steels subjected to slack quenching into idRHa+ Rail Hardening equipments in a simulation environment. This tool can be used both off-line or in-line, giving the user the chance to test and study the best cooling strategies or letting the automatic control system free to adjust the proper cooling recipe. Optimization criteria have been tailored in order to determine the best cooling conditions according to the metallurgical requirements imposed by the main rail standards and also taking into account the elastoplastic bending phenomena occurring during all stages of the head hardening process. The computational core of idRHa+ProMod is a thermal finite element procedure coupled with special algorithms developed to work out the main thermo-physical properties of steel, to predict the non-isothermal austenite decomposition into all the relevant phases and subsequently to evaluate the amount of latent heat of transformation released, the compound thermal expansion coefficient and the amount of plastic deformation in the material. Air mist and air blades boundary conditions have been carefully investigated by means of pilot plant tests aimed to study the jet impingement on rail surfaces and the cooling efficiency at all working conditions. Heat transfer coefficients have been further checked and adjusted directly on field during commissioning. idRHa+ is a trademark of Primetals Technologies Italy Srl (paper)

  8. The Danish eID Case: Twenty years of Delay

    DEFF Research Database (Denmark)

    Hoff, Jens Villiam; Hoff, Frederik Villiam

    2010-01-01

    the technological, organizational and legal dimensions of eID in Denmark, and comparing these with a number of other European countries made it possible to explain this paradox. Thus, the three main reasons for the special route development has taken in Denmark seems to be concerns over privacy, lack...

  9. idRHa+ProMod - Rail Hardening Control System

    Science.gov (United States)

    Ferro, L.

    2016-03-01

    idRHa+ProMod is the process control system developed by Primetals Technologies to foresee the thermo-mechanical evolution and micro-structural composition of rail steels subjected to slack quenching into idRHa+ Rail Hardening equipments in a simulation environment. This tool can be used both off-line or in-line, giving the user the chance to test and study the best cooling strategies or letting the automatic control system free to adjust the proper cooling recipe. Optimization criteria have been tailored in order to determine the best cooling conditions according to the metallurgical requirements imposed by the main rail standards and also taking into account the elastoplastic bending phenomena occurring during all stages of the head hardening process. The computational core of idRHa+ProMod is a thermal finite element procedure coupled with special algorithms developed to work out the main thermo-physical properties of steel, to predict the non-isothermal austenite decomposition into all the relevant phases and subsequently to evaluate the amount of latent heat of transformation released, the compound thermal expansion coefficient and the amount of plastic deformation in the material. Air mist and air blades boundary conditions have been carefully investigated by means of pilot plant tests aimed to study the jet impingement on rail surfaces and the cooling efficiency at all working conditions. Heat transfer coefficients have been further checked and adjusted directly on field during commissioning. idRHa+ is a trademark of Primetals Technologies Italy Srl

  10. Student ID Cards: What You Should Know About Them

    Science.gov (United States)

    Hoffman, Jonathan; McGuire, Agnes C.

    1973-01-01

    Discusses the usefulness of photo ID cards for school security purposes, library control, student activities, and bus transportation control. Examines ways in which card costs can be reduced and the pros and cons of producing the cards at the school or of letting the work out. Problems involving card abuse and student rights are also considered.…

  11. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  12. Intersection Group Dynamic Subdivision and Coordination at Intraregional Boundaries in Sudden Disaster

    Directory of Open Access Journals (Sweden)

    Ciyun Lin

    2015-01-01

    Full Text Available This paper aims at the traffic flow agglomeration effect characteristics and rapid evacuation requirement in sudden disaster; operation time of intraregional boundaries traffic signal coordination was presented firstly. Then intraregional boundaries intersection group dynamic subdivision and consolidation method based on relative similarity degree and similarity coefficient of adjacent intersections was put forward. As to make the traffic control strategy adapt to traffic condition of different intraregional boundaries intersection groups, this paper proposes an intraregional boundaries traffic signal coordination and optimization technology based on organic computing theory. Finally, this paper uses Delphi 7.0, MapX, and Oracle developing a software package, combined with Paramics V6 Simulator to validate the methods of this paper. The result shows that it can obviously improve disaster affected regional traffic signal control efficiency which reduces average traffic delay by 30–35%, decreases vehicle queue by more than 20% and reduces evacuation time more than 13.06%.

  13. A contribution to the subdivision of the precambrian in South America

    International Nuclear Information System (INIS)

    Brito Neves, B.B. de; Teixeira, W.; Tassinari, C.C.G.; Kawashita, K.

    1990-01-01

    On the shield areas of the South America continent (about 5,000,000 km 2 large) there are about 17,000 geochronological determinations available. More than 75% of this amount has been carried out in the Centro de Pesquisas Geocronologicas da Universidade de Sao Paulo, CPGeo-USP, in the last 25 years. The majority of these data were accomplished through Rb-Sr (ca.60%) and K-Ar (ca.40%) methods. The author tried to work this amount of data on a coherent way according to the progress observed in the geologic and geotectonic knowledge during the last two decades. One of the fundamental goals was to outline an up-to-date subdivision for the Precambrian of this continent, having in mind a contribution to the International Commission on Stratigraphy (ICS), Subcommission of Precambrian Stratigraphy (SPS) of the IUGS. (author)

  14. Assessment of Water Pollution in Tipparthy Revenue Sub-Division, Nalgonda (District, Andhra Pradesh, India

    Directory of Open Access Journals (Sweden)

    Medikondu Kishore

    2010-01-01

    Full Text Available A systematic study has been carried out to explore the physicochemical characteristics of drinking water sources of Tipparthy revenue sub-division, Nalgonda (District, Andhra Pradesh, India. Totally 49 water samples were collected from the different locations (22 villages of the study area including bore well, open well and hand pump water and analyzed for pH, EC, TDS, turbidity, total hardness, fluoride, chloride, nitrate, nitrite, sulphate, phosphates, calcium, magnesium, sodium, potassium, Iron and dissolved oxygen. On an average, in almost all the samples, one or the other chemical constituent was beyond the permissible limits it was also concluded that water sources in the study area not fit for potability. Sodium absorption ratio (SAR and water quality (WQI studies indicate water available from all sources not fit for irrigation also. The study indicates the need for periodic monitoring of ground water in the study area.

  15. Sexual risk behaviours of high school female learners in Mbonge subdivision of rural Cameroon.

    Science.gov (United States)

    Tarkang, Elvis Enowbeyang

    2015-01-01

    Since female learners in high schools in Cameroon fall within the age group hardest hit by HIV/AIDS, it is assumed that these learners might be exposed to sexual risk behaviours. However, little has been explored on the sexual risk behaviours of high school female learners in Cameroon. This study aimed at examining the sexual risk behaviours of high school female learners in Mbonge subdivision of rural Cameroon. A cross sectional design was adopted, using a self-administered questionnaire for data collection. Respondents were selected through disproportional stratified simple random sampling resulting in 210 female grade 10 to grade 12 learners from three participating high schools in Mbonge subdivision, Cameroon. Descriptive and inferential statistics were calculated using SPSS version 20 software program. Majority of the respondents, 54.0% reported being sexually active, of whom only 39.8% used condoms during first sex; 49.5% used condoms during last sex and 29.6% used condoms consistently. Up to 32% of the sexually active respondents had multiple sexual partners in the past one year before the study, while 9.3% had multiple sexual partners during the study period. The mean age of first sex was 15.6 years. Lack of parental control, religion, academic profile, poverty, place of residence and perception of risk of HIV infection were the main factors significantly associated with sexual risk behaviours. The findings indicate that sexual risk behaviours exist among high school female learners in Mbonge, Cameroon. There is need for campaigns and interventions to bring about sexual behaviour change.

  16. The Jurassic of Denmark and Greenland: The Upper Jurassic of Europe: its subdivision and correlation

    Directory of Open Access Journals (Sweden)

    Zeiss, Arnold

    2003-10-01

    Full Text Available In the last 40 years, the stratigraphy of the Upper Jurassic of Europe has received much attention and considerable revision; much of the impetus behind this endeavour has stemmed from the work of the International Subcommission on Jurassic Stratigraphy. The Upper Jurassic Series consists of three stages, the Oxfordian, Kimmeridgian and Tithonian which are further subdivided into substages, zones and subzones, primarily on the basis of ammonites. Regional variations between the Mediterranean, Submediterranean and Subboreal provinces are discussed and correlation possibilities indicated. The durations of the Oxfordian, Kimmeridgian and Tithonian Stages are reported to have been 5.3, 3.4 and 6.5 Ma, respectively. This review of the present status of Upper Jurassic stratigraphy aids identification of a number of problems of subdivision and definition of Upper Jurassic stages; in particular these include correlation of the base of the Kimmeridgian and the top of the Tithonian between Submediterranean and Subboreal Europe. Although still primarily based on ammonite stratigraphy, subdivision of the Upper Jurassic is increasingly being refined by the incorporation of other fossil groups; these include both megafossils, such as aptychi, belemnites, bivalves, gastropods, brachiopods, echinoderms, corals, sponges and vertebrates, and microfossils such as foraminifera, radiolaria, ciliata, ostracodes, dinoflagellates, calcareous nannofossils, charophyaceae, dasycladaceae, spores and pollen. Important future developments will depend on the detailed integration of these disparate biostratigraphic data and their precise combination with the abundant new data from sequence stratigraphy, utilising the high degree of stratigraphic resolution offered by certain groups of fossils. This article also contains some notes on the recent results of magnetostratigraphy and sequence chronostratigraphy.

  17. Differential Functional Connectivity Alterations of Two Subdivisions within the Right dlPFC in Parkinson's Disease

    Directory of Open Access Journals (Sweden)

    Julian Caspers

    2017-05-01

    Full Text Available Patients suffering from Parkinson's disease (PD often show impairments in executive function (EF like decision-making and action control. The right dorsolateral prefrontal cortex (dlPFC has been strongly implicated in EF in healthy subjects and has repeatedly been reported to show alterations related to EF impairment in PD. Recently, two key regions for cognitive action control have been identified within the right dlPFC by co-activation based parcellation. While the posterior region is engaged in rather basal EF like stimulus integration and working memory, the anterior region has a more abstract, supervisory function. To investigate whether these functionally distinct subdivisions of right dlPFC are differentially affected in PD, we analyzed resting-state functional connectivity (FC in 39 PD patients and 44 age- and gender-matched healthy controls. Patients were examined both after at least 12 h withdrawal of dopaminergic drugs (OFF and under their regular dopaminergic medication (ON. We found that only the posterior right dlPFC subdivision shows FC alterations in PD, while the anterior part remains unaffected. PD-related decreased FC with posterior right dlPFC was found in the bilateral medial posterior parietal cortex (mPPC and left dorsal premotor region (PMd in the OFF state. In the medical ON, FC with left PMd normalized, while decoupling with bilateral mPPC remained. Furthermore, we observed increased FC between posterior right dlPFC and the bilateral dorsomedial prefrontal cortex (dmPFC in PD in the ON state. Our findings point to differential disturbances of right dlPFC connectivity in PD, which relate to its hierarchical organization of EF processing by stronger affecting the functionally basal posterior aspect than the hierarchically higher anterior part.

  18. Differential reward coding in the subdivisions of the primate caudate during an oculomotor task.

    Science.gov (United States)

    Nakamura, Kae; Santos, Gustavo S; Matsuzaki, Ryuichi; Nakahara, Hiroyuki

    2012-11-07

    The basal ganglia play a pivotal role in reward-oriented behavior. The striatum, an input channel of the basal ganglia, is composed of subdivisions that are topographically connected with different cortical and subcortical areas. To test whether reward information is differentially processed in the different parts of the striatum, we compared reward-related neuronal activity along the dorsolateral-ventromedial axis in the caudate nucleus of monkeys performing an asymmetrically rewarded oculomotor task. In a given block, a target in one position was associated with a large reward, whereas the other target was associated with a small reward. The target position-reward value contingency was switched between blocks. We found the following: (1) activity that reflected the block-wise reward contingency emerged before the appearance of a visual target, and it was more prevalent in the dorsal, rather than central and ventral, caudate; (2) activity that was positively related to the reward size of the current trial was evident, especially after reward delivery, and it was more prevalent in the ventral and central, rather than dorsal, caudate; and (3) activity that was modulated by the memory of the outcomes of the previous trials was evident in the dorsal and central caudate. This multiple reward information, together with the target-direction information, was represented primarily by individual caudate neurons, and the different reward information was represented in caudate subpopulations with distinct electrophysiological properties, e.g., baseline firing and spike width. These results suggest parallel processing of different reward information by the basal ganglia subdivisions defined by extrinsic connections and intrinsic properties.

  19. Differential structural and resting state connectivity between insular subdivisions and other pain-related brain regions.

    Science.gov (United States)

    Wiech, K; Jbabdi, S; Lin, C S; Andersson, J; Tracey, I

    2014-10-01

    Functional neuroimaging studies suggest that the anterior, mid, and posterior division of the insula subserve different functions in the perception of pain. The anterior insula (AI) has predominantly been associated with cognitive-affective aspects of pain, while the mid and posterior divisions have been implicated in sensory-discriminative processing. We examined whether this functional segregation is paralleled by differences in (1) structural and (2) resting state connectivity and (3) in correlations with pain-relevant psychological traits. Analyses were restricted to the 3 insular subdivisions and other pain-related brain regions. Both type of analyses revealed largely overlapping results. The AI division was predominantly connected to the ventrolateral prefrontal cortex (structural and resting state connectivity) and orbitofrontal cortex (structural connectivity). In contrast, the posterior insula showed strong connections to the primary somatosensory cortex (SI; structural connectivity) and secondary somatosensory cortex (SII; structural and resting state connectivity). The mid insula displayed a hybrid connectivity pattern with strong connections with the ventrolateral prefrontal cortex, SII (structural and resting state connectivity) and SI (structural connectivity). Moreover, resting state connectivity revealed strong connectivity of all 3 subdivisions with the thalamus. On the behavioural level, AI structural connectivity was related to the individual degree of pain vigilance and awareness that showed a positive correlation with AI-amygdala connectivity and a negative correlation with AI-rostral anterior cingulate cortex connectivity. In sum, our findings show a differential structural and resting state connectivity for the anterior, mid, and posterior insula with other pain-relevant brain regions, which might at least partly explain their different functional profiles in pain processing. Copyright © 2014 The Authors. Published by Elsevier B.V. All

  20. Towards an improved lithostratigraphic subdivision of the chalk group in the Netherlands North Sea area - A seismic stratigraphic approach

    NARCIS (Netherlands)

    Molen, A.S. van der; Wong, Th.E.

    2007-01-01

    In the Netherlands North Sea area, the Chalk Group has thus far been subdivided into the Cenomanian Texel Formation, the Turonian to Maastrichtian Ommelanden Formation and the Danian Ekofisk Formation. This paper describes the attempt to arrive at a more detailed lithostratigraphic subdivision for

  1. 75 FR 57327 - GNP Rly, Inc.-Acquisition and Operation Exemption-Redmond Spur and Woodinville Subdivision

    Science.gov (United States)

    2010-09-20

    ... subdivision of the State of Washington. The Port of Seattle (Port) owns the real estate associated with the... provisions of 49 U.S.C. 10902 to acquire and resume rail service over 2 segments of railbanked railroad right... acquire the ``residual common carrier rights and obligations,'' including the right to reinstate rail...

  2. Acidicapsa borealis gen. nov., sp. nov. and Acidicapsa ligni sp. nov., subdivision 1 Acidobacteria from Sphagnum peat and decaying wood

    NARCIS (Netherlands)

    Kulichevskaya, I.S.; Kostina, L.A.; Valášková, V.; Rijpstra, I.C.; Sinninghe Damsté, J.S.; De Boer, W.; Dedysh, S.N.

    2012-01-01

    Two strains of subdivision 1 Acidobacteria, namely the pink-pigmented bacterium KA1T and the colorless isolate WH120T, were obtained from acidic Sphagnum peat and wood under decay by the white-rot fungus Hyploma fasciculare, respectively. Cells of these isolates are Gram-negative, non-motile, short

  3. Subdivision of the Lochkovian Stage based on conodont faunas from the stratotype area (Prague Synform, Czech Republic)

    Czech Academy of Sciences Publication Activity Database

    Slavík, Ladislav; Carls, P.; Hladil, Jindřich; Koptíková, Leona

    2012-01-01

    Roč. 47, č. 6 (2012), s. 616-631 ISSN 0072-1050 R&D Projects: GA ČR GA205/09/0703 Institutional research plan: CEZ:AV0Z30130516 Keywords : Lochkovian subdivision * conodont biostratigraphy * Lower Devonian * stratigraphic correlation * Barrandian area * conodont zonation Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.659, year: 2012

  4. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  5. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  6. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  7. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  8. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  9. Epigenetic inactivation of inhibitor of differentiation 4 (Id4) correlates with prostate cancer

    International Nuclear Information System (INIS)

    Sharma, Pankaj; Chinaranagari, Swathi; Patel, Divya; Carey, Jason; Chaudhary, Jaideep

    2012-01-01

    The inhibitor of DNA-binding (Id) proteins, Id1–4 are negative regulators of basic helix-loop-helix (bHLH) transcription factors. As key regulators of cell cycle and differentiation, expression of Id proteins are increasingly observed in many cancers and associated with aggressiveness of the disease. Of all the four Id proteins, the expression of Id1, Id2, and to a lesser extent, Id3 in prostate cancer and the underlying molecular mechanism is relatively well known. On the contrary, our previous results demonstrated that Id4 acts as a potential tumor suppressor in prostate cancer. In the present study, we extend these observations and demonstrate that Id4 is down-regulated in prostate cancer due to promoter hypermethylation. We used prostate cancer tissue microarrays to investigate Id4 expression. Methylation specific PCR on bisulfite treated DNA was used to determine methylation status of Id4 promoter in laser capture micro-dissected normal, stroma and prostate cancer regions. High Id4 expression was observed in the normal prostate epithelial cells. In prostate cancer, a stage-dependent decrease in Id4 expression was observed with majority of high grade cancers showing no Id4 expression. Furthermore, Id4 expression progressively decreased in prostate cancer cell line LNCaP and with no expression in androgen-insensitive LNCaP-C81 cell line. Conversely, Id4 promoter hypermethylation increased in LNCaP-C81 cells suggesting epigenetic silencing. In prostate cancer samples, loss of Id4 expression was also associated with promoter hypermethylation. Our results demonstrate loss of Id4 expression in prostate cancer due to promoter hypermethylation. The data strongly support the role of Id4 as a tumor suppressor

  10. Brainstem projections of neurons located in various subdivisions of the dorsolateral hypothalamic area – an anterograde tract-tracing study

    Directory of Open Access Journals (Sweden)

    Rege Sugárka Papp

    2014-05-01

    Full Text Available The projections from the dorsolateral hypothalamic area (DLH to the lower brainstem have been investigated by using biotinylated dextran amine (BDA, an anterograde tracer in rats. The DLH can be divided into 3 areas (dorsomedial hypothalamus, perifornical area, lateral hypothalamic area, and further subdivided into 8 subdivisions. After unilateral stereotaxic injections of BDA into individual DLH subdivisions, the correct sites of injections were controlled histologically, and the distribution patterns of BDA-positive fibers were mapped on serial sections between the hypothalamus and spinal cord in 22 rats. BDA-labeled fibers were observable over 100 different brainstem areas, nuclei or subdivisions. Injections into the 8 DLH subdivisions established distinct topographical patterns. In general, the density of labeled fibers was low in the lower brainstem. High density of fibers was seen only 4 of the 116 areas: in the lateral and ventrolateral parts of the periaqueductal gray, the Barrington’s and the pedunculopontine tegmental nuclei. All of the biogenic amine cell groups in the lower brainstem (9 noradrenaline, 3 adrenaline and 9 serotonin cell groups received labeled fibers, some of them from all, or at least 7 DLH subdivisions, mainly from perifornical and ventral lateral hypothalamic neurons. Some of the tegmental nuclei and nuclei of the reticular formation were widely innervated, although the density of the BDA-labeled fibers was generally low. No definitive descending BDA-positive pathway, but long-run solitaire BDA-labeled fibers were seen in the lower brainstem. These descending fibers joined some of the large tracts or fasciculi in the brainstem. The distribution pattern of BDA-positive fibers of DLH origin throughout the lower brainstem was comparable to patterns of previously published orexin- or melanin-concentrating hormone-immunoreactive fibers with somewhat differences.

  11. Determination of local chromatin composition by CasID.

    Science.gov (United States)

    Schmidtmann, Elisabeth; Anton, Tobias; Rombaut, Pascaline; Herzog, Franz; Leonhardt, Heinrich

    2016-09-02

    Chromatin structure and function are determined by a plethora of proteins whose genome-wide distribution is typically assessed by immunoprecipitation (ChIP). Here, we developed a novel tool to investigate the local chromatin environment at specific DNA sequences. We combined the programmable DNA binding of dCas9 with the promiscuous biotin ligase BirA* (CasID) to biotinylate proteins in the direct vicinity of specific loci. Subsequent streptavidin-mediated precipitation and mass spectrometry identified both known and previously unknown chromatin factors associated with repetitive telomeric, major satellite and minor satellite DNA. With super-resolution microscopy, we confirmed the localization of the putative transcription factor ZNF512 at chromocenters. The versatility of CasID facilitates the systematic elucidation of functional protein complexes and locus-specific chromatin composition.

  12. Zircaloy cladding ID/OD oxidation studies. Final report

    International Nuclear Information System (INIS)

    Westerman, R.E.; Hesson, G.M.

    1977-11-01

    The ID/OD oxide ratio that forms on Zircaloy tubing at temperatures relevant to postulated LOCA conditions was measured as a function of time, temperature, and distance from the rupture. The average ratio at the rupture position was less than unity, and decreased with decreasing test time and increasing distance from the point of rupture. The maximum observed ID/OD oxide ratio was 1.4. Ratios in excess of unity were typically found to be a consequence of the OD oxide being thinner than would have been anticipated from the nominal test conditions. Confirmatory data were also obtained on the isothermal oxidation kinetics of Zircaloy. These data are in good agreement with those obtained by other investigators and confirm the conservative nature of the Baker-Just equation that is required for use in licensing calculations

  13. ID-kaart on mugav ja praktiline dokument / Heiki Raudla

    Index Scriptorium Estoniae

    Raudla, Heiki, 1949-

    2001-01-01

    Ilmunud ka: Severnoje Poberezhje 12. okt., lk. 2; Lääne Elu 13. okt., lk. 2; Hiiumaa 13. okt., lk. 2; Koit 16. okt., lk. 6; Nädaline 16. okt., lk. 4; Sakala 18. okt., lk. 2; Valgamaalane 18. okt., lk. 2; Pjarnuskii Ekspress 12. okt., lk. 2; Meie Maa 19. okt., lk. 2; Hiiu Leht 23. okt., lk. 2; Järva Teataja 30. okt., lk. 2. Siseministri nõunik Heiki Raudla ID-kaardist

  14. Guinea pig ID-like families of SINEs.

    Science.gov (United States)

    Kass, David H; Schaetz, Brian A; Beitler, Lindsey; Bonney, Kevin M; Jamison, Nicole; Wiesner, Cathy

    2009-05-01

    Previous studies have indicated a paucity of SINEs within the genomes of the guinea pig and nutria, representatives of the Hystricognathi suborder of rodents. More recent work has shown that the guinea pig genome contains a large number of B1 elements, expanding to various levels among different rodents. In this work we utilized A-B PCR and screened GenBank with sequences from isolated clones to identify potentially uncharacterized SINEs within the guinea pig genome, and identified numerous sequences with a high degree of similarity (>92%) specific to the guinea pig. The presence of A-tails and flanking direct repeats associated with these sequences supported the identification of a full-length SINE, with a consensus sequence notably distinct from other rodent SINEs. Although most similar to the ID SINE, it clearly was not derived from the known ID master gene (BC1), hence we refer to this element as guinea pig ID-like (GPIDL). Using the consensus to screen the guinea pig genomic database (Assembly CavPor2) with Ensembl BlastView, we estimated at least 100,000 copies, which contrasts markedly to just over 100 copies of ID elements. Additionally we provided evidence of recent integrations of GPIDL as two of seven analyzed conserved GPIDL-containing loci demonstrated presence/absence variants in Cavia porcellus and C. aperea. Using intra-IDL PCR and sequence analyses we also provide evidence that GPIDL is derived from a hystricognath-specific SINE family. These results demonstrate that this SINE family continues to contribute to the dynamics of genomes of hystricognath rodents.

  15. ID'ing innate and innate-like lymphoid cells.

    Science.gov (United States)

    Verykokakis, Mihalis; Zook, Erin C; Kee, Barbara L

    2014-09-01

    The immune system can be divided into innate and adaptive components that differ in their rate and mode of cellular activation, with innate immune cells being the first responders to invading pathogens. Recent advances in the identification and characterization of innate lymphoid cells have revealed reiterative developmental programs that result in cells with effector fates that parallel those of adaptive lymphoid cells and are tailored to effectively eliminate a broad spectrum of pathogenic challenges. However, activation of these cells can also be associated with pathologies such as autoimmune disease. One major distinction between innate and adaptive immune system cells is the constitutive expression of ID proteins in the former and inducible expression in the latter. ID proteins function as antagonists of the E protein transcription factors that play critical roles in lymphoid specification as well as B- and T-lymphocyte development. In this review, we examine the transcriptional mechanisms controlling the development of innate lymphocytes, including natural killer cells and the recently identified innate lymphoid cells (ILC1, ILC2, and ILC3), and innate-like lymphocytes, including natural killer T cells, with an emphasis on the known requirements for the ID proteins. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  16. Internal validation of the RapidHIT® ID system.

    Science.gov (United States)

    Wiley, Rachel; Sage, Kelly; LaRue, Bobby; Budowle, Bruce

    2017-11-01

    Traditionally, forensic DNA analysis has required highly skilled forensic geneticists in a dedicated laboratory to generate short tandem repeat (STR) profiles. STR profiles are routinely used either to associate or exclude potential donors of forensic biological evidence. The typing of forensic reference samples has become more demanding, especially with the requirement in some jurisdictions to DNA profile arrestees. The Rapid DNA (RDNA) platform, the RapidHIT ® ID (IntegenX ® , Pleasanton, CA), is a fully automated system capable of processing reference samples in approximately 90min with minimal human intervention. Thus, the RapidHIT ID instrument can be deployed to non-laboratory environments (e.g., booking stations) and run by trained atypical personnel such as law enforcement. In order to implement the RapidHIT ID platform, validation studies are needed to define the performance and limitations of the system. Internal validation studies were undertaken with four early-production RapidHIT ID units. Reliable and concordant STR profiles were obtained from reference buccal swabs. Throughout the study, no contamination was observed. The overall first-pass success rate with an "expert-like system" was 72%, which is comparable to another current RDNA platform commercially available. The system's second-pass success rate (involving manual interpretation on first-pass inconclusive results) increased to 90%. Inhibitors (i.e., coffee, smoking tobacco, and chewing tobacco) did not appear to affect typing by the instrument system; however, substrate (i.e., swab type) did impact typing success. Additionally, one desirable feature not available with other Rapid systems is that in the event of a system failed run, a swab can be recovered and subsequently re-analyzed in a new sample cartridge. Therefore, rarely should additional sampling or swab consumption be necessary. The RapidHIT ID system is a robust and reliable tool capable of generating complete STR profiles within

  17. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  18. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  19. ID3 contributes to cerebrospinal fluid seeding and poor prognosis in medulloblastoma

    International Nuclear Information System (INIS)

    Phi, Ji Hoon; Choi, Seung Ah; Lim, Sang-Hee; Lee, Joongyub; Wang, Kyu-Chang; Park, Sung-Hye; Kim, Seung-Ki

    2013-01-01

    The inhibitor of differentiation (ID) genes have been implicated as promoters of tumor progression and metastasis in many human cancers. The current study investigated the expression and functional roles of ID genes in seeding and prognosis of medulloblastoma. ID gene expression was screened in human medulloblastoma tissues. Knockdown of ID3 gene was performed in medulloblastoma cells in vitro. The expression of metastasis-related genes after ID3 knockdown was assessed. The effect of ID3 knockdown on tumor seeding was observed in an animal model in vivo. The survival of medulloblastoma patients was plotted according to the ID3 expression levels. Significantly higher ID3 expression was observed in medulloblastoma with cerebrospinal fluid seeding than tumors without seeding. Knockdown of ID3 decreased proliferation, increased apoptosis, and suppressed the migration of D283 medulloblastoma cells in vitro. In a seeding model of medulloblastoma, ID3 knockdown in vivo with shRNA inhibited the growth of primary tumors, prevented the development of leptomeningeal seeding, and prolonged animal survival. High ID3 expression was associated with shorter survival of medulloblastoma patients, especially in Group 4 medulloblastomas. High ID3 expression is associated with medullolbastoma seeding and is a poor prognostic factor, especially in patients with Group 4 tumors. ID3 may represent the metastatic/ aggressive phenotype of a subgroup of medulloblastoma

  20. Staffing Levels at National Collegiate Athletic Association Football Bowl Subdivision-Level Institutions.

    Science.gov (United States)

    Ms, Suzie Aparicio; Welch Bacon, Cailee E; Parsons, John T; Bay, R Curtis; Cohen, Randy P; DeZeeuw, Terry; McLeod, Tamara C Valovich

    2015-12-01

    The "Appropriate Medical Coverage for Intercollegiate Athletics" (AMCIA) document was created to support assessment and calculation of athletic training personnel requirements. However, little is known regarding disparities between current and recommended staffing practices. To identify the staffing and employment characteristics of athletic health care services at Football Bowl Subdivision-level institutions. Cross-sectional study. Web-based survey. Head athletic trainers and athletic training staff members who were knowledgeable about budget and staff. The survey, Assessment of Staffing Levels at National Collegiate Athletic Association Football Bowl Subdivision-Level Institutions, was used to evaluate personal, university, and staff demographics; staffing and employment topics; and AMCIA variables and use. The survey was accessed and partially completed by 104 individuals (response rate = 84.6%). A total of 79 athletic trainers (response rate = 76%) completed the entire survey. One-third of the respondents (34.2%, n = 26) met the recommended number of full-time equivalents (FTEs) for football, two-thirds of the respondents (65.7%, n = 50) failed to meet the recommendation, and 26.2% (n = 27) were missing data needed for FTE calculation. Among those who did not meet the recommended FTEs (n = 50), 38.0% (n = 19) were within 1 FTE of being compliant, 26.0% (n = 13) were within 2 FTEs, and 24.0% (n = 12) were within 3 FTEs. About one-third of respondents (35.9%, n = 37) reported not using the AMCIA, citing lack of funding (29.7%, n = 11), lack of administrative support (21.6%, n = 8), and other reasons (37.8%, n = 14). The majority of institutions that used the AMCIA were able to provide justification for staffing. For most of the institutions that failed to meet their recommendation, adding 1-3 FTE athletic trainers for football would change their compliance status. A uniform definition of the term FTE within collegiate athletics is needed to allow for structured

  1. Staffing Levels at National Collegiate Athletic Association Football Bowl Subdivision-Level Institutions

    Science.gov (United States)

    MS, Suzie Aparicio; Welch Bacon, Cailee E.; Parsons, John T.; Bay, R. Curtis; Cohen, Randy P.; DeZeeuw, Terry; McLeod, Tamara C. Valovich

    2015-01-01

    Context The “Appropriate Medical Coverage for Intercollegiate Athletics” (AMCIA) document was created to support assessment and calculation of athletic training personnel requirements. However, little is known regarding disparities between current and recommended staffing practices. Objective To identify the staffing and employment characteristics of athletic health care services at Football Bowl Subdivision-level institutions. Design Cross-sectional study. Setting Web-based survey. Patients or Other Participants Head athletic trainers and athletic training staff members who were knowledgeable about budget and staff. Main Outcome Measure(s) The survey, Assessment of Staffing Levels at National Collegiate Athletic Association Football Bowl Subdivision-Level Institutions, was used to evaluate personal, university, and staff demographics; staffing and employment topics; and AMCIA variables and use. Results The survey was accessed and partially completed by 104 individuals (response rate = 84.6%). A total of 79 athletic trainers (response rate = 76%) completed the entire survey. One-third of the respondents (34.2%, n = 26) met the recommended number of full-time equivalents (FTEs) for football, two-thirds of the respondents (65.7%, n = 50) failed to meet the recommendation, and 26.2% (n = 27) were missing data needed for FTE calculation. Among those who did not meet the recommended FTEs (n = 50), 38.0% (n = 19) were within 1 FTE of being compliant, 26.0% (n = 13) were within 2 FTEs, and 24.0% (n = 12) were within 3 FTEs. About one-third of respondents (35.9%, n = 37) reported not using the AMCIA, citing lack of funding (29.7%, n = 11), lack of administrative support (21.6%, n = 8), and other reasons (37.8%, n = 14). Conclusions The majority of institutions that used the AMCIA were able to provide justification for staffing. For most of the institutions that failed to meet their recommendation, adding 1–3 FTE athletic trainers for football would change their

  2. 'Combined reflectance stratigraphy' - subdivision of loess successions by diffuse reflectance spectrometry (DRS)

    Science.gov (United States)

    Szeberényi, Jozsef; Bradak-Hayashi, Balázs; Kiss, Klaudia; Kovács, József; Varga, György; Balázs, Réka; Szalai, Zoltán; Viczián, István

    2016-04-01

    The different varieties of loess (and intercalated paleosol layers) together constitute one of the most widespread terrestrial sediments, which was deposited, altered, and redeposited in the course of the changing climatic conditions of the Pleistocene. To reveal more information about Pleistocene climate cycles and/or environments the detailed lithostratigraphical subdivision and classification of the loess variations and paleosols are necessary. Beside the numerous method such as various field measurements, semi-quantitative tests and laboratory investigations, diffuse reflectance spectroscopy (DRS) is one of the well applied method on loess/paleosol sequences. Generally, DRS has been used to separate the detrital and pedogenic mineral component of the loess sections by the hematite/goethite ratio. DRS also has been applied as a joint method of various environmental magnetic investigations such as magnetic susceptibility- and isothermal remanent magnetization measurements. In our study the so-called "combined reflectance stratigraphy method" were developed. At First, complex mathematical method was applied to compare the results of the spectral reflectance measurements. One of the most preferred multivariate methods is cluster analysis. Its scope is to group and compare the loess variations and paleosol based on the similarity and common properties of their reflectance curves. In the Second, beside the basic subdivision of the profiles by the different reflectance curves of the layers, the most characteristic wavelength section of the reflectance curve was determined. This sections played the most important role during the classification of the different materials of the section. The reflectance value of individual samples, belonged to the characteristic wavelength were depicted in the function of depth and well correlated with other proxies like grain size distribution and magnetic susceptibility data. The results of the correlation showed the significance of

  3. New analytic unitarization schemes

    International Nuclear Information System (INIS)

    Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.

    2009-01-01

    We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.

  4. 78 FR 25406 - Proposed Modification of Class E Airspace; Twin Falls, ID

    Science.gov (United States)

    2013-05-01

    ...) Global Positioning System (GPS) and the Instrument Landing System (ILS) or Localizer (LOC) standard... the earth. * * * * * ANM ID E5 Twin Falls, ID [Modified] Twin Falls Joslin Field-Magic Valley Regional...

  5. 78 FR 40382 - Modification of Class D and E Airspace; Twin Falls, ID

    Science.gov (United States)

    2013-07-05

    ... using the Navigation (RNAV) Global Positioning System (GPS) and the Instrument Landing System (ILS) or... or more above the surface of the earth. * * * * * ANM ID E5 Twin Falls, ID [Modified] Twin Falls...

  6. 77 FR 68065 - Amendment of Class D and Class E Airspace; Lewiston, ID

    Science.gov (United States)

    2012-11-15

    ... Measuring Equipment (VOR/ DME), and the Lewiston-Nez Perce Instrument Landing System (ILS) Localizer... feet or more above the surface of the earth. * * * * * ANM ID E5 Lewiston, ID [Modified] Lewiston-Nez...

  7. ID.alistic: identificatie met een touch voor de patiënt

    NARCIS (Netherlands)

    M. Wilschut; M. Zijlmans; Dr. L.S.G.L Wauben

    2017-01-01

    ID.alistic is een conceptuele patiëntidentificatie methode (middels een vingerafdrukscanner), ter vervanging van het polsbandjessysteem van het Albert Schweitzer ziekenhuis (ASz) dialysecentrum. Dit onderzoek bepaalt de implementeerbaarheid van ID.alistic binnen het dialysecentrum door

  8. Ekspert : mobiil-ID kasutamine valimistel turvariske ei tekita / Holger Roonemaa

    Index Scriptorium Estoniae

    Roonemaa, Holger

    2008-01-01

    E-valimiste projektijuhi Taavi Martensi väitel pole põhjust kahelda mobiil-ID turvalisuses. Valimiskomisjoni esimehe Heiki Sibula meelest peaks m-ID kaarte välja andma kodakondsus- ja migratsiooniamet

  9. 78 FR 773 - Hartford Financial Services Group, Inc., Commercial/Actuarial/Information Delivery Services (IDS...

    Science.gov (United States)

    2013-01-04

    ... Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS)/Corporate & Financial... Assistance (TAA) applicable to workers and former workers of Hartford Financial Services Group, Inc., Commercial/ Actuarial/Information Delivery Services (IDS)/Corporate & Financial Reporting group, Hartford...

  10. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  11. Contract saving schemes

    NARCIS (Netherlands)

    Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.

    2012-01-01

    Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free

  12. Alternative reprocessing schemes evaluation

    International Nuclear Information System (INIS)

    1979-02-01

    This paper reviews the parameters which determine the inaccessibility of the plutonium in reprocessing plants. Among the various parameters, the physical and chemical characteristics of the materials, the various processing schemes and the confinement are considered. The emphasis is placed on that latter parameter, and the advantages of an increased confinement in the socalled PIPEX reprocessing plant type are presented

  13. Introduction to association schemes

    NARCIS (Netherlands)

    Seidel, J.J.

    1991-01-01

    The present paper gives an introduction to the theory of association schemes, following Bose-Mesner (1959), Biggs (1974), Delsarte (1973), Bannai-Ito (1984) and Brouwer-Cohen-Neumaier (1989). Apart from definitions and many examples, also several proofs and some problems are included. The paragraphs

  14. Reaction schemes of immunoanalysis

    International Nuclear Information System (INIS)

    Delaage, M.; Barbet, J.

    1991-01-01

    The authors apply a general theory for multiple equilibria to the reaction schemes of immunoanalysis, competition and sandwich. This approach allows the manufacturer to optimize the system and provide the user with interpolation functions for the standard curve and its first derivative as well, thus giving access to variance [fr

  15. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  16. Hepatitis A outbreak in Ba subdivision, Fiji, October-December 2013.

    Science.gov (United States)

    Getahun, Aneley; Rafai, Eric; Tolosa, Maria Ximena; Dawainavesi, Akanisi; Tabua, Anaseini Maisema; Tabua, Josefa

    2015-01-01

    A cluster of suspected hepatitis A cases was notified to the Fiji Ministry of Health on 22 October 2013. An outbreak investigation team was mobilized to confirm the existence of an outbreak of hepatitis A and advise appropriate public health interventions. A case definition for the outbreak investigation was established, and standardized data collection tools were used to collect information on clinical presentation and risk factors. An environmental assessment was also conducted. There were 160 clinical cases of hepatitis A of which 15 were laboratory-confirmed. The attack rate was 349 per 10,000 population in the Nukuloa nursing zone; there were no reported deaths. Residents of the Nukuloa settlement were 6.6 times more likely to present with symptomatic hepatitis A infection (95% confidence interval: 3.8-12.6) compared with residents of another village with a different water supply. This is the first significant hepatitis A outbreak documented in Ba subdivision and possibly in Fiji. Enhanced surveillance of hepatitis A may reveal other clusters in the country. Improving the primary water source dramatically reduced the occurance of disease in the affected community and adjacent areas.

  17. Hepatitis A outbreak in Ba subdivision, Fiji, October–December 2013

    Directory of Open Access Journals (Sweden)

    Aneley Getahun

    2015-06-01

    Full Text Available Objective: A cluster of suspected hepatitis A cases was notified to the Fiji Ministry of Health on 22 October 2013. An outbreak investigation team was mobilized to confirm the existence of an outbreak of hepatitis A and advise appropriate public health interventions. Methods: A case definition for the outbreak investigation was established, and standardized data collection tools were used to collect information on clinical presentation and risk factors. An environmental assessment was also conducted. Results: There were 160 clinical cases of hepatitis A of which 15 were laboratory-confirmed. The attack rate was 349 per 10 000 population in the Nukuloa nursing zone; there were no reported deaths. Residents of the Nukuloa settlement were 6.6 times more likely to present with symptomatic hepatitis A infection (95% confidence interval: 3.8–12.6 compared with residents of another village with a different water supply. Discussion: This is the first significant hepatitis A outbreak documented in Ba subdivision and possibly in Fiji. Enhanced surveillance of hepatitis A may reveal other clusters in the country. Improving the primary water source dramatically reduced the occurance of disease in the affected community and adjacent areas.

  18. Medically Important Parasites Carried by Cockroaches in Melong Subdivision, Littoral, Cameroon

    Directory of Open Access Journals (Sweden)

    R. J. Atiokeng Tatang

    2017-01-01

    Full Text Available Cockroaches have been recognized as mechanical vectors of pathogens that can infest humans or animals. A total of 844 adult cockroaches (436 males and 408 females were caught. In the laboratory, cockroaches were first washed in saturated salt solution to remove ectoparasites and then rinsed with 70% alcohol, dried, and dissected for endoparasites. An overall transport rate of 47.39% was recorded. Six genera of parasites were identified. These were Ascaris (33.76%, Trichuris (11.97%, Capillaria (6.16%, Toxocara (4.86%, Hook Worm (4.86%, and Eimeria (2.73%. The parasites were more recorded on the external surface (54.27% of cockroaches than in the internal surface (GIT, 38.51%. The same tendency was obtained between sexes with female cockroaches having a higher transport rate (36.69%. Cockroaches caught in toilets carried more parasites (31.99% as compared to those from kitchens (22.63% and houses (11.14%. Almost all encountered parasites were recognized as responsible of zoonosis and they can be consequently released in nature by hosts and easily disseminated by cockroaches as mechanical vectors. Sanitary education, reenforcement of worms’ eradication programs, and the fight against these insects remain a necessity in the Mélong Subdivision.

  19. The Tools of Financial Policy in the Dairy Products Subdivision of the Agroindustrial Complex

    Directory of Open Access Journals (Sweden)

    Bielosviet Oleksandr. V.

    2017-03-01

    Full Text Available The article is aimed at definition and classification of tools of the State financial policy in the dairy products subdivision of the agroindustrial complex (DPS of AIC. The article considers the financial policy tools used in terms of targeted programs of the State support for the DPS of AIC: the State target program for development of Ukrainian villages, sectoral program for dairy breeding and the project of the conception of the State target program for development of dairy breeding in Ukraine for the period up to 2020. The existing tools are divided into direct and indirect action tools. As of 2016, the tasks that were relevant to the corresponding targeted programs have not been implemented on any item, except for the milk productivity of cows. Still the productivity indicator of 4500 kg/year of milk from a cow is low enough and does not correspond to the general world-wide tendencies. This suggests the need for further assessment of the existing list of tools with a view to adjusting them and defining priorities for the State support of the DPS of AIC.

  20. Buffer zone monitoring plan for the Dos Rios subdivision, Gunnison, Colorado

    International Nuclear Information System (INIS)

    1996-02-01

    This report presents a plan for water quality monitoring at the Dos Rios subdivision (Units 2, 3, and the Island Unit) that is intended to satisfy the informational needs of residents who live southwest (downgradient) of the former Gunnison processing site. Water quality monitoring activities described in this report are designed to protect the public from residual contamination that entered the ground water as a result of previous uranium milling operations. Requirements presented in this monitoring plan are also included in the water sampling and analysis plan (WSAP) for the Gunnison Uranium Mill Tailings Remedial Action (UMTRA) Project site. The Gunnison WSAP is a site-specific document prepared by the U.S. Department of Energy (DOE) that provides background, guidance, and justification for future ground water sampling and analysis activities for the UMTRA Project Gunnison processing and disposal sites. The WSAP will be updated annually, as additional water quality data are collected and interpreted, to provide ongoing protection for public health and the environment

  1. Adaptive subdivision and the length and energy of Bézier curves

    DEFF Research Database (Denmark)

    Gravesen, Jens

    1997-01-01

    It is an often used fact that the control polygon of a Bézier curve approximates the curve and that the approximation gets better when the curve is subdivided. In particular, if a Bézier curve is subdivided into some number of pieces, then the arc-length of the original curve is greater than...... the sum of the chord-lengths of the pieces, and less than the sum of the polygon-lengths of the pieces. Under repeated subdivisions, the difference between this lower and upper bound gets arbitrarily small.If $L_c$ denotes the total chord-length of the pieces and $L_p$ denotes the total polygon...... combination, and it forms the basis for a fast adaptive algorithm, which determines the arc-length of a Bézier curve.The energy of a curve is half the square of the curvature integrated with respect to arc-length. Like in the case of the arc-length, it is possible to use the chord-length and polygon...

  2. People with ID as interviewers and co-researchers: experiences and reflection.

    NARCIS (Netherlands)

    Lieshout, H. van

    2012-01-01

    Aim: To share the experience of working with people with intellectual disabilities (ID) as interviewers in a qualitative study about community participation of people with ID. We reflect on two perspectives: the interviewers and the researchers. Method: Eighteen people with ID were interviewed by

  3. 78 FR 8596 - Hartford Financial Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS...

    Science.gov (United States)

    2013-02-06

    ... Services Group, Inc., Commercial/Actuarial/ Information Delivery Services (IDS)/Corporate & Financial... workers and former workers of Hartford Financial Services Group, Inc., Commercial/Actuarial/Information Delivery Services (IDS)/Corporate & Financial Reporting group, Hartford, Connecticut (The Hartford-IDS...

  4. Picture This: How to Establish an Effective School ID Card Program

    Science.gov (United States)

    Finkelstein, David

    2013-01-01

    Most school districts do not have an ID card policy that everyone knows and follows, yet. many school districts are implementing ID card programs to address concerns about safety, efficiency, and convenience. A well-thought-out ID card program leads to greater security and smoother operations throughout the school and should thus be a priority.…

  5. The extent of population genetic subdivision differs among four co-distributed shark species in the Indo-Australian archipelago

    Directory of Open Access Journals (Sweden)

    Giles Jenny

    2009-02-01

    Full Text Available Abstract Background The territorial fishing zones of Australia and Indonesia are contiguous to the north of Australia in the Timor and Arafura Seas and in the Indian Ocean to the north of Christmas Island. The area surrounding the shared boundary consists of a variety of bio-diverse marine habitats including shallow continental shelf waters, oceanic trenches and numerous offshore islands. Both countries exploit a variety of fisheries species, including whaler (Carcharhinus spp. and hammerhead sharks (Sphyrna spp.. Despite their differences in social and financial arrangements, the two countries are motivated to develop complementary co-management practices to achieve resource sustainability. An essential starting point is knowledge of the degree of population subdivision, and hence fisheries stock status, in exploited species. Results Populations of four commercially harvested shark species (Carcharhinus obscurus, Carcharhinus sorrah, Prionace glauca, Sphyrna lewini were sampled from northern Australia and central Indonesia. Neutral genetic markers (mitochondrial DNA control region sequence and allelic variation at co-dominant microsatellite loci revealed genetic subdivision between Australian and Indonesian populations of C. sorrah. Further research is needed to address the possibility of genetic subdivision among C. obscurus populations. There was no evidence of genetic subdivision for P. glauca and S. lewini populations, but the sampling represented a relatively small part of their distributional range. For these species, more detailed analyses of population genetic structure is recommended in the future. Conclusion Cooperative management between Australia and Indonesia is the best option at present for P. glauca and S. lewini, while C. sorrah and C. obscurus should be managed independently. On-going research on these and other exploited shark and ray species is strongly recommended. Biological and ecological similarity between species may

  6. Applying risk management strategies to strengthen an IDS's investment policy.

    Science.gov (United States)

    Fine, R P

    1998-11-01

    The increased financial risk that not-for-profit integrated delivery systems have assumed to function under managed care has required them to become increasingly reliant on income and gains from their investment portfolios. This reliance underscores the need for these organizations to take steps to effectively manage their investment risk. Not-for-profit IDSs should establish a systematic approach to investment risk management that is based on maintaining a sound fiduciary infrastructure and having a clear understanding of risk exposures, the most important of which are policy and market risk. Applying reasonable and common-sense risk management strategies to investment policy will enhance an IDS's overall financial and competitive strength.

  7. RFID and Auto-ID in planning and logistics

    CERN Document Server

    Jones, Erick C

    2011-01-01

    As RFID technology is becoming increasingly popular, the need has arisen to address the challenges and approaches to successful implementation. RFID and Auto-ID in Planning and Logistics: A Practical Guide for Military UID Applications presents the concepts for students, military personnel and contractors, and corporate managers to learn about RFID and other automatic information capture technologies, and their integration into planning and logistics functions. The text includes comparisons of RFID with technologies such as bar codes, satellite tags, and global positioning systems and provides

  8. Labelling IDS clusters by means of the silhouette index

    OpenAIRE

    Petrovic, Slovodan; Álvarez, Gonzalo; Orfila, Agustín; Carbó, Javier

    2006-01-01

    Proceeding of: IX Reunión Española sobre Criptología y Seguridad de la Información. Barcelona, 2006 One of the most difficult problems in the design of an anomaly based intrusion detection system (IDS) that uses clustering is that of labelling the ob- tained clusters, i.e. determining which of them correspond to ”good” behaviour on the network/host and which to ”bad” behaviour. In this paper, a new clusters’ labelling strategy, which makes use of the Silhouette clustering quality index is ...

  9. Predicting Students’ Performance using Modified ID3 Algorithm

    OpenAIRE

    Ramanathan L; Saksham Dhanda; Suresh Kumar D

    2013-01-01

    The ability to predict performance of students is very crucial in our present education system. We can use data mining concepts for this purpose. ID3 algorithm is one of the famous algorithms present today to generate decision trees. But this algorithm has a shortcoming that it is inclined to attributes with many values. So , this research aims to overcome this shortcoming of the algorithm by using gain ratio(instead of information gain) as well as by giving weights to each attribute at every...

  10. A filled duration illusion in music: Effects of metrical subdivision on the perception and production of beat tempo.

    Science.gov (United States)

    Repp, Bruno H; Bruttomesso, Meijin

    2010-01-13

    This study replicates and extends previous findings suggesting that metrical subdivision slows the perceived beat tempo (Repp, 2008). Here, musically trained participants produced the subdivisions themselves and were found to speed up, thus compensating for the perceived slowing. This was shown in a synchronization-continuation paradigm (Experiment 1) and in a reproduction task (Experiment 2a). Participants also judged the tempo of a subdivided sequence as being slower than that of a preceding simple beat sequence (Experiment 2b). Experiment 2 also included nonmusician participants, with similar results. Tempo measurements of famous pianists' recordings of two variation movements from Beethoven sonatas revealed a strong tendency to play the first variation (subdivided beats) faster than the theme (mostly simple beats). A similar tendency was found in musicians' laboratory performances of a simple theme and variations, despite instruc-tions to keep the tempo constant (Experiment 3a). When playing melodic sequences in which only one of three beats per measure was subdivided, musicians tended to play these beats faster and to perceive them as longer than adjacent beats, and they played the whole sequence faster than a sequence without any subdivisions (Experiments 3b and 3c). The results amply demonstrate a filled duration illusion in rhythm perception and music performance: Intervals containing events seem longer than empty intervals and thus must be shortened to be perceived as equal in duration.

  11. The spatial scale of genetic subdivision in populations of Ifremeria nautilei, a hydrothermal-vent gastropod from the southwest Pacific

    Directory of Open Access Journals (Sweden)

    Thaler Andrew D

    2011-12-01

    Full Text Available Abstract Background Deep-sea hydrothermal vents provide patchy, ephemeral habitats for specialized communities of animals that depend on chemoautotrophic primary production. Unlike eastern Pacific hydrothermal vents, where population structure has been studied at large (thousands of kilometres and small (hundreds of meters spatial scales, population structure of western Pacific vents has received limited attention. This study addresses the scale at which genetic differentiation occurs among populations of a western Pacific vent-restricted gastropod, Ifremeria nautilei. Results We used mitochondrial and DNA microsatellite markers to infer patterns of gene flow and population subdivision. A nested sampling strategy was employed to compare genetic diversity in discrete patches of Ifremeria nautilei separated by a few meters within a single vent field to distances as great as several thousand kilometres between back-arc basins that encompass the known range of the species. No genetic subdivisions were detected among patches, mounds, or sites within Manus Basin. Although I. nautilei from Lau and North Fiji Basins (~1000 km apart also exhibited no evidence for genetic subdivision, these populations were genetically distinct from the Manus Basin population. Conclusions An unknown process that restricts contemporary gene flow isolates the Manus Basin population of Ifremeria nautilei from widespread populations that occupy the North Fiji and Lau Basins. A robust understanding of the genetic structure of hydrothermal vent populations at multiple spatial scales defines natural conservation units and can help minimize loss of genetic diversity in situations where human activities are proposed and managed.

  12. Planning Framework for Mesolevel Optimization of Urban Runoff Control Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Qianqian; Blohm, Andrew; Liu, Bo

    2017-04-01

    A planning framework is developed to optimize runoff control schemes at scales relevant for regional planning at an early stage. The framework employs less sophisticated modeling approaches to allow a practical application in developing regions with limited data sources and computing capability. The methodology contains three interrelated modules: (1)the geographic information system (GIS)-based hydrological module, which aims at assessing local hydrological constraints and potential for runoff control according to regional land-use descriptions; (2)the grading module, which is built upon the method of fuzzy comprehensive evaluation. It is used to establish a priority ranking system to assist the allocation of runoff control targets at the subdivision level; and (3)the genetic algorithm-based optimization module, which is included to derive Pareto-based optimal solutions for mesolevel allocation with multiple competing objectives. The optimization approach describes the trade-off between different allocation plans and simultaneously ensures that all allocation schemes satisfy the minimum requirement on runoff control. Our results highlight the importance of considering the mesolevel allocation strategy in addition to measures at macrolevels and microlevels in urban runoff management. (C) 2016 American Society of Civil Engineers.

  13. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  14. A hybrid-drive nonisobaric-ignition scheme for inertial confinement fusion

    Energy Technology Data Exchange (ETDEWEB)

    He, X. T., E-mail: xthe@iapcm.ac.cn [Institute of Applied Physics and Computational Mathematics, P. O. Box 8009, Beijing 100094 (China); Center for Applied Physics and Technology, HEDPS, Peking University, Beijing 100871 (China); IFSA Collaborative Innovation Center of MoE, Shanghai Jiao-Tong University, Shanghai 200240 (China); Institute of Fusion Theory and Simulation, Zhejiang University, Hangzhou 310027 (China); Li, J. W.; Wang, L. F.; Liu, J.; Lan, K.; Ye, W. H. [Institute of Applied Physics and Computational Mathematics, P. O. Box 8009, Beijing 100094 (China); Center for Applied Physics and Technology, HEDPS, Peking University, Beijing 100871 (China); IFSA Collaborative Innovation Center of MoE, Shanghai Jiao-Tong University, Shanghai 200240 (China); Fan, Z. F.; Wu, J. F. [Institute of Applied Physics and Computational Mathematics, P. O. Box 8009, Beijing 100094 (China)

    2016-08-15

    A new hybrid-drive (HD) nonisobaric ignition scheme of inertial confinement fusion (ICF) is proposed, in which a HD pressure to drive implosion dynamics increases via increasing density rather than temperature in the conventional indirect drive (ID) and direct drive (DD) approaches. In this HD (combination of ID and DD) scheme, an assembled target of a spherical hohlraum and a layered deuterium-tritium capsule inside is used. The ID lasers first drive the shock to perform a spherical symmetry implosion and produce a large-scale corona plasma. Then, the DD lasers, whose critical surface in ID corona plasma is far from the radiation ablation front, drive a supersonic electron thermal wave, which slows down to a high-pressure electron compression wave, like a snowplow, piling up the corona plasma into high density and forming a HD pressurized plateau with a large width. The HD pressure is several times the conventional ID and DD ablation pressure and launches an enhanced precursor shock and a continuous compression wave, which give rise to the HD capsule implosion dynamics in a large implosion velocity. The hydrodynamic instabilities at imploding capsule interfaces are suppressed, and the continuous HD compression wave provides main pdV work large enough to hotspot, resulting in the HD nonisobaric ignition. The ignition condition and target design based on this scheme are given theoretically and by numerical simulations. It shows that the novel scheme can significantly suppress implosion asymmetry and hydrodynamic instabilities of current isobaric hotspot ignition design, and a high-gain ICF is promising.

  15. Secure OpenID Authentication Model by Using Trusted Computing

    Directory of Open Access Journals (Sweden)

    E. Ghazizadeh

    2014-01-01

    Full Text Available The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. This paper proposes a model in which One Time Password (OTP, TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment.

  16. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  17. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  18. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.

    Science.gov (United States)

    Nirmal Raja, K; Maraline Beno, M

    2017-07-01

    In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.

  19. Id1 represses osteoclast-dependent transcription and affects bone formation and hematopoiesis.

    Directory of Open Access Journals (Sweden)

    April S Chan

    2009-11-01

    Full Text Available The bone-bone marrow interface is an area of the bone marrow microenvironment in which both bone remodeling cells, osteoblasts and osteoclasts, and hematopoietic cells are anatomically juxtaposed. The close proximity of these cells naturally suggests that they interact with one another, but these interactions are just beginning to be characterized.An Id1(-/- mouse model was used to assess the role of Id1 in the bone marrow microenvironment. Micro-computed tomography and fracture tests showed that Id1(-/- mice have reduced bone mass and increased bone fragility, consistent with an osteoporotic phenotype. Osteoclastogenesis and pit formation assays revealed that loss of Id1 increased osteoclast differentiation and resorption activity, both in vivo and in vitro, suggesting a cell autonomous role for Id1 as a negative regulator of osteoclast differentiation. Examination by flow cytometry of the hematopoietic compartment of Id1(-/- mice showed an increase in myeloid differentiation. Additionally, we found increased expression of osteoclast genes, TRAP, Oscar, and CTSK in the Id1(-/- bone marrow microenvironment. Lastly, transplantation of wild-type bone marrow into Id1(-/- mice repressed TRAP, Oscar, and CTSK expression and activity and rescued the hematopoietic and bone phenotype in these mice.In conclusion, we demonstrate an osteoporotic phenotype in Id1(-/- mice and a mechanism for Id1 transcriptional control of osteoclast-associated genes. Our results identify Id1 as a principal player responsible for the dynamic cross-talk between bone and bone marrow hematopoietic cells.

  20. Preliminary Study on Hybrid Computational Phantom for Radiation Dosimetry Based on Subdivision Surface

    International Nuclear Information System (INIS)

    Jeong, Jong Hwi; Choi, Sang Hyoun; Cho, Sung Koo; Kim, Chan Hyeong

    2007-01-01

    phantom by using the subdivision surfaces

  1. Differential efferent projections of the anterior, posteroventral and posterodorsal subdivisions of the medial amygdala in mice

    Directory of Open Access Journals (Sweden)

    Cecília ePardo-Bellver

    2012-08-01

    Full Text Available The medial amygdaloid nucleus (Me is a key structure in the control of sociosexual behaviour in mice. It receives direct projections from the main and accessory olfactory bulbs, as well as an important hormonal input. To better understand its behavioural role, in this work we investigate the structures receiving information from the Me, by analysing the efferent projections from its anterior (MeA, posterodorsal (MePD and posteroventral (MePV subdivisions, using anterograde neuronal tracing with biotinylated and tetrametylrhodamine-conjugated dextranamines.The Me is strongly interconnected with the rest of the chemosensory amygdala, but shows only moderate projections to the central nucleus and light projections to the associative nuclei of the basolateral amygdaloid complex. In addition, the MeA originates a strong feedback projection to the deep mitral cell layer of the accessory olfactory bulb, whereas the MePV projects to its granule cell layer. The medial amygdaloid nucleus (especially the MeA has also moderate projections to different olfactory structures, including the piriform cortex. The densest outputs of the Me target the bed nucleus of the stria terminalis (BST and the hypothalamus. The MeA and MePV project to key structures of the circuit involved in the defensive response against predators (medial posterointermediate BST, anterior hypothalamic area, dorsomedial aspect of the ventromedial hypothalamic nucleus, although less dense projections also innervate reproductive-related nuclei. In contrast, the MePD projects mainly to structures that control reproductive behaviours (medial posteromedial BST, medial preoptic nucleus, and ventrolateral aspect of the ventromedial hypothalamic nucleus, although less dense projections to defensive-related nuclei also exist. These results confirm and extend previous results in other rodents and suggest that the medial amygdala is anatomically and functionally compartmentalized.

  2. Sex, subdivision, and domestic dispersal of Trypanosoma cruzi lineage I in southern Ecuador.

    Science.gov (United States)

    Ocaña-Mayorga, Sofía; Llewellyn, Martin S; Costales, Jaime A; Miles, Michael A; Grijalva, Mario J

    2010-12-14

    Molecular epidemiology at the community level has an important guiding role in zoonotic disease control programmes where genetic markers are suitably variable to unravel the dynamics of local transmission. We evaluated the molecular diversity of Trypanosoma cruzi, the etiological agent of Chagas disease, in southern Ecuador (Loja Province). This kinetoplastid parasite has traditionally been a paradigm for clonal population structure in pathogenic organisms. However, the presence of naturally occurring hybrids, mitochondrial introgression, and evidence of genetic exchange in the laboratory question this dogma. Eighty-one parasite isolates from domiciliary, peridomiciliary, and sylvatic triatomines and mammals were genotyped across 10 variable microsatellite loci. Two discrete parasite populations were defined: one predominantly composed of isolates from domestic and peridomestic foci, and another predominantly composed of isolates from sylvatic foci. Spatial genetic variation was absent from the former, suggesting rapid parasite dispersal across our study area. Furthermore, linkage equilibrium between loci, Hardy-Weinberg allele frequencies at individual loci, and a lack of repeated genotypes are indicative of frequent genetic exchange among individuals in the domestic/peridomestic population. These data represent novel population-level evidence of an extant capacity for sex among natural cycles of T. cruzi transmission. As such they have dramatic implications for our understanding of the fundamental genetics of this parasite. Our data also elucidate local disease transmission, whereby passive anthropogenic domestic mammal and triatomine dispersal across our study area is likely to account for the rapid domestic/peridomestic spread of the parasite. Finally we discuss how this, and the observed subdivision between sympatric sylvatic and domestic/peridomestic foci, can inform efforts at Chagas disease control in Ecuador.

  3. Sex, subdivision, and domestic dispersal of Trypanosoma cruzi lineage I in southern Ecuador.

    Directory of Open Access Journals (Sweden)

    Sofía Ocaña-Mayorga

    2010-12-01

    Full Text Available Molecular epidemiology at the community level has an important guiding role in zoonotic disease control programmes where genetic markers are suitably variable to unravel the dynamics of local transmission. We evaluated the molecular diversity of Trypanosoma cruzi, the etiological agent of Chagas disease, in southern Ecuador (Loja Province. This kinetoplastid parasite has traditionally been a paradigm for clonal population structure in pathogenic organisms. However, the presence of naturally occurring hybrids, mitochondrial introgression, and evidence of genetic exchange in the laboratory question this dogma.Eighty-one parasite isolates from domiciliary, peridomiciliary, and sylvatic triatomines and mammals were genotyped across 10 variable microsatellite loci. Two discrete parasite populations were defined: one predominantly composed of isolates from domestic and peridomestic foci, and another predominantly composed of isolates from sylvatic foci. Spatial genetic variation was absent from the former, suggesting rapid parasite dispersal across our study area. Furthermore, linkage equilibrium between loci, Hardy-Weinberg allele frequencies at individual loci, and a lack of repeated genotypes are indicative of frequent genetic exchange among individuals in the domestic/peridomestic population.These data represent novel population-level evidence of an extant capacity for sex among natural cycles of T. cruzi transmission. As such they have dramatic implications for our understanding of the fundamental genetics of this parasite. Our data also elucidate local disease transmission, whereby passive anthropogenic domestic mammal and triatomine dispersal across our study area is likely to account for the rapid domestic/peridomestic spread of the parasite. Finally we discuss how this, and the observed subdivision between sympatric sylvatic and domestic/peridomestic foci, can inform efforts at Chagas disease control in Ecuador.

  4. Differential efferent projections of the anterior, posteroventral, and posterodorsal subdivisions of the medial amygdala in mice.

    Science.gov (United States)

    Pardo-Bellver, Cecília; Cádiz-Moretti, Bernardita; Novejarque, Amparo; Martínez-García, Fernando; Lanuza, Enrique

    2012-01-01

    The medial amygdaloid nucleus (Me) is a key structure in the control of sociosexual behavior in mice. It receives direct projections from the main and accessory olfactory bulbs (AOB), as well as an important hormonal input. To better understand its behavioral role, in this work we investigate the structures receiving information from the Me, by analysing the efferent projections from its anterior (MeA), posterodorsal (MePD) and posteroventral (MePV) subdivisions, using anterograde neuronal tracing with biotinylated and tetrametylrhodamine-conjugated dextranamines. The Me is strongly interconnected with the rest of the chemosensory amygdala, but shows only moderate projections to the central nucleus and light projections to the associative nuclei of the basolateral amygdaloid complex. In addition, the MeA originates a strong feedback projection to the deep mitral cell layer of the AOB, whereas the MePV projects to its granule cell layer. The Me (especially the MeA) has also moderate projections to different olfactory structures, including the piriform cortex (Pir). The densest outputs of the Me target the bed nucleus of the stria terminalis (BST) and the hypothalamus. The MeA and MePV project to key structures of the circuit involved in the defensive response against predators (medial posterointermediate BST, anterior hypothalamic area, dorsomedial aspect of the ventromedial hypothalamic nucleus), although less dense projections also innervate reproductive-related nuclei. In contrast, the MePD projects mainly to structures that control reproductive behaviors [medial posteromedial BST, medial preoptic nucleus, and ventrolateral aspect of the ventromedial hypothalamic nucleus], although less dense projections to defensive-related nuclei also exist. These results confirm and extend previous results in other rodents and suggest that the medial amygdala is anatomically and functionally compartmentalized.

  5. Population subdivision of hydrothermal vent polychaete Alvinella pompejana across equatorial and Easter Microplate boundaries.

    Science.gov (United States)

    Jang, Sook-Jin; Park, Eunji; Lee, Won-Kyung; Johnson, Shannon B; Vrijenhoek, Robert C; Won, Yong-Jin

    2016-10-28

    The Equator and Easter Microplate regions of the eastern Pacific Ocean exhibit geomorphological and hydrological features that create barriers to dispersal for a number of animals associated with deep-sea hydrothermal vent habitats. This study examined effects of these boundaries on geographical subdivision of the vent polychaete Alvinella pompejana. DNA sequences from one mitochondrial and eleven nuclear genes were examined in samples collected from ten vent localities that comprise the species' known range from 23°N latitude on the East Pacific Rise to 38°S latitude on the Pacific Antarctic Ridge. Multi-locus genotypes inferred from these sequences clustered the individual worms into three metapopulation segments - the northern East Pacific Rise (NEPR), southern East Pacific Rise (SEPR), and northeastern Pacific Antarctic Ridge (PAR) - separated by the Equator and Easter Microplate boundaries. Genetic diversity estimators were negatively correlated with tectonic spreading rates. Application of the isolation-with-migration (IMa2) model provided information about divergence times and demographic parameters. The PAR and NEPR metapopulation segments were estimated to have split roughly 4.20 million years ago (Mya) (2.42-33.42 Mya, 95 % highest posterior density, (HPD)), followed by splitting of the SEPR and NEPR segments about 0.79 Mya (0.07-6.67 Mya, 95 % HPD). Estimates of gene flow between the neighboring regions were mostly low (2 Nm  SEPR > PAR. Highly effective dispersal capabilities allow A. pompejana to overcome the temporal instability and intermittent distribution of active hydrothermal vents in the eastern Pacific Ocean. Consequently, the species exhibits very high levels of genetic diversity compared with many co-distributed vent annelids and mollusks. Nonetheless, its levels of genetic diversity in partially isolated populations are inversely correlated with tectonic spreading rates. As for many other vent taxa, this pioneering colonizer is

  6. The generation of chromosomal deletions to provide extensive coverage and subdivision of the Drosophila melanogaster genome.

    Science.gov (United States)

    Cook, R Kimberley; Christensen, Stacey J; Deal, Jennifer A; Coburn, Rachel A; Deal, Megan E; Gresens, Jill M; Kaufman, Thomas C; Cook, Kevin R

    2012-01-01

    Chromosomal deletions are used extensively in Drosophila melanogaster genetics research. Deletion mapping is the primary method used for fine-scale gene localization. Effective and efficient deletion mapping requires both extensive genomic coverage and a high density of molecularly defined breakpoints across the genome. A large-scale resource development project at the Bloomington Drosophila Stock Center has improved the choice of deletions beyond that provided by previous projects. FLP-mediated recombination between FRT-bearing transposon insertions was used to generate deletions, because it is efficient and provides single-nucleotide resolution in planning deletion screens. The 793 deletions generated pushed coverage of the euchromatic genome to 98.4%. Gaps in coverage contain haplolethal and haplosterile genes, but the sizes of these gaps were minimized by flanking these genes as closely as possible with deletions. In improving coverage, a complete inventory of haplolethal and haplosterile genes was generated and extensive information on other haploinsufficient genes was compiled. To aid mapping experiments, a subset of deletions was organized into a Deficiency Kit to provide maximal coverage efficiently. To improve the resolution of deletion mapping, screens were planned to distribute deletion breakpoints evenly across the genome. The median chromosomal interval between breakpoints now contains only nine genes and 377 intervals contain only single genes. Drosophila melanogaster now has the most extensive genomic deletion coverage and breakpoint subdivision as well as the most comprehensive inventory of haploinsufficient genes of any multicellular organism. The improved selection of chromosomal deletion strains will be useful to nearly all Drosophila researchers.

  7. The antibody response of pregnant Cameroonian women to VAR2CSA ID1-ID2a, a small recombinant protein containing the CSA-binding site

    DEFF Research Database (Denmark)

    Babakhanyan, Anna; Leke, Rose G F; Salanti, Ali

    2014-01-01

    In pregnant women, Plasmodium falciparum-infected erythrocytes expressing the VAR2CSA antigen bind to chondroitin sulfate A in the placenta causing placental malaria. The binding site of VAR2CSA is present in the ID1-ID2a region. This study sought to determine if pregnant Cameroonian women natura...

  8. Comparison of Perinatal Risk Factors Associated with Autism Spectrum Disorder (ASD), Intellectual Disability (ID), and Co-Occurring ASD and ID

    Science.gov (United States)

    Schieve, Laura A.; Clayton, Heather B.; Durkin, Maureen S.; Wingate, Martha S.; Drews-Botsch, Carolyn

    2015-01-01

    While studies report associations between perinatal outcomes and both autism spectrum disorder (ASD) and intellectual disability (ID), there has been little study of ASD with versus without co-occurring ID. We compared perinatal risk factors among 7547 children in the 2006-2010 Autism and Developmental Disability Monitoring Network classified as…

  9. ID4 promotes AR expression and blocks tumorigenicity of PC3 prostate cancer cells

    International Nuclear Information System (INIS)

    Komaragiri, Shravan Kumar; Bostanthirige, Dhanushka H.; Morton, Derrick J.; Patel, Divya; Joshi, Jugal; Upadhyay, Sunil; Chaudhary, Jaideep

    2016-01-01

    Deregulation of tumor suppressor genes is associated with tumorigenesis and the development of cancer. In prostate cancer, ID4 is epigenetically silenced and acts as a tumor suppressor. In normal prostate epithelial cells, ID4 collaborates with androgen receptor (AR) and p53 to exert its tumor suppressor activity. Previous studies have shown that ID4 promotes tumor suppressive function of AR whereas loss of ID4 results in tumor promoter activity of AR. Previous study from our lab showed that ectopic ID4 expression in DU145 attenuates proliferation and promotes AR expression suggesting that ID4 dependent AR activity is tumor suppressive. In this study, we examined the effect of ectopic expression of ID4 on highly malignant prostate cancer cell, PC3. Here we show that stable overexpression of ID4 in PC3 cells leads to increased apoptosis and decreased cell proliferation and migration. In addition, in vivo studies showed a decrease in tumor size and volume of ID4 overexpressing PC3 cells, in nude mice. At the molecular level, these changes were associated with increased androgen receptor (AR), p21, and AR dependent FKBP51 expression. At the mechanistic level, ID4 may regulate the expression or function of AR through specific but yet unknown AR co-regulators that may determine the final outcome of AR function. - Highlights: • ID4 expression induces AR expression in PC3 cells, which generally lack AR. • ID4 expression increased apoptosis and decreased cell proliferation and invasion. • Overexpression of ID4 reduces tumor growth of subcutaneous xenografts in vivo. • ID4 induces p21 and FKBP51 expression- co-factors of AR tumor suppressor activity.

  10. ID4 promotes AR expression and blocks tumorigenicity of PC3 prostate cancer cells

    Energy Technology Data Exchange (ETDEWEB)

    Komaragiri, Shravan Kumar; Bostanthirige, Dhanushka H.; Morton, Derrick J.; Patel, Divya; Joshi, Jugal; Upadhyay, Sunil; Chaudhary, Jaideep, E-mail: jchaudhary@cau.edu

    2016-09-09

    Deregulation of tumor suppressor genes is associated with tumorigenesis and the development of cancer. In prostate cancer, ID4 is epigenetically silenced and acts as a tumor suppressor. In normal prostate epithelial cells, ID4 collaborates with androgen receptor (AR) and p53 to exert its tumor suppressor activity. Previous studies have shown that ID4 promotes tumor suppressive function of AR whereas loss of ID4 results in tumor promoter activity of AR. Previous study from our lab showed that ectopic ID4 expression in DU145 attenuates proliferation and promotes AR expression suggesting that ID4 dependent AR activity is tumor suppressive. In this study, we examined the effect of ectopic expression of ID4 on highly malignant prostate cancer cell, PC3. Here we show that stable overexpression of ID4 in PC3 cells leads to increased apoptosis and decreased cell proliferation and migration. In addition, in vivo studies showed a decrease in tumor size and volume of ID4 overexpressing PC3 cells, in nude mice. At the molecular level, these changes were associated with increased androgen receptor (AR), p21, and AR dependent FKBP51 expression. At the mechanistic level, ID4 may regulate the expression or function of AR through specific but yet unknown AR co-regulators that may determine the final outcome of AR function. - Highlights: • ID4 expression induces AR expression in PC3 cells, which generally lack AR. • ID4 expression increased apoptosis and decreased cell proliferation and invasion. • Overexpression of ID4 reduces tumor growth of subcutaneous xenografts in vivo. • ID4 induces p21 and FKBP51 expression- co-factors of AR tumor suppressor activity.

  11. Radikal konservativ idédebat og højreautoritær fascination i Danmark, ca. 1928-1940

    DEFF Research Database (Denmark)

    Holm, Adam

    1999-01-01

    Historie, Højreradikalisme, Konservatisme, Fascisme, Mellemkrigstid, Idéhistorie, Intellektuelle......Historie, Højreradikalisme, Konservatisme, Fascisme, Mellemkrigstid, Idéhistorie, Intellektuelle...

  12. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  13. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  14. Towards a unified scheme of cortical lamination for primary visual cortex of primates: insights from NeuN and VGLUT2 immunoreactivity

    Directory of Open Access Journals (Sweden)

    Pooja eBalaram

    2014-08-01

    Full Text Available Primary visual cortex (V1 is clearly distinguishable from other cortical areas by its distinctive pattern of neocortical lamination across mammalian species. In some mammals, primates in particular, the layers of V1 are further divided into a number of sublayers based on their anatomical and functional characteristics. While these sublayers are easily recognizable across a range of primates, the exact number of divisions in each layer and their relative position within the depth of V1 has been inconsistently reported, largely due to conflicting schemes of nomenclature for the V1 layers. This conflict centers on the definition of layer 4 in primate V1, and the subdivisions of layer 4 that can be consistently identified across primate species. Brodmann’s (1909 laminar scheme for V1 delineates three subdivisions of layer 4 in primates, based on cellular morphology and geniculate inputs in anthropoid monkeys. In contrast, Hässler’s (1967 laminar scheme delineates a single layer 4 and multiple subdivisions of layer 3, based on comparisons of V1 lamination across the primate lineage. In order to clarify laminar divisions in primate visual cortex, we performed NeuN and VGLUT2 immunohistochemistry in V1 of chimpanzees, Old World macaque monkeys, New World squirrel, owl, and marmoset monkeys, prosimian galagos and mouse lemurs, and nonprimate, but highly visual, tree shrews. By comparing the laminar divisions identified by each method across species, we find that Hässler’s (1967 laminar scheme for V1 provides a more consistent representation of neocortical layers across all primates, including humans, and facilitates comparisons of V1 lamination with nonprimate species. These findings, along with many others, support the consistent use of Hässler’s laminar scheme in V1 research.

  15. ESCAP mobile training scheme.

    Science.gov (United States)

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  16. Forensic validation of the SNPforID 52-plex assay

    DEFF Research Database (Denmark)

    Musgrave-Brown, Esther; Ballard, David; Balogh, Kinga

    2007-01-01

    The advantages of single nucleotide polymorphism (SNP) typing in forensic genetics are well known and include a wider choice of high-throughput typing platforms, lower mutation rates, and improved analysis of degraded samples. However, if SNPs are to become a realistic supplement to current short...... tandem repeat (STR) typing methods, they must be shown to successfully and reliably analyse the challenging samples commonly encountered in casework situations. The European SNPforID consortium, supported by the EU GROWTH programme, has developed a multiplex of 52 SNPs for forensic analysis...... in forensic casework. A total of 40 extracts were used in the study, each of which was sent to two of the five participating laboratories for typing in duplicate or triplicate. Laboratories were instructed to carry out their analyses as if they were dealing with normal casework samples. Results were reported...

  17. Applying Open Researchers and Contributors ID in scholarly journals

    Directory of Open Access Journals (Sweden)

    Jeonghee Im

    2015-02-01

    Full Text Available Open Researchers and Contributors ID (ORCID launched its registry services in October 2012. Consequently, adding personal information to the ORCID registry became routine work for researchers. To add ORCID to an online article, the tag needs to be included in the Journal Article Tag Suite extensible markup language file, if such a file has been produced by the publisher. Subsequently, all co-authors’ ORCID can be easily and conveniently collected and then integrated into the manuscript management system. In the current age of information and the Internet, journals need to keep pace with the surge of new standards and technologies. Editors should be able to accept and apply these new systems rapidly.

  18. International Decommissioning Symposium 2000 (IDS 2000). Final Report

    International Nuclear Information System (INIS)

    Ebadian, M.A.

    2001-01-01

    The purpose of IDS 2000 was to deliver a world-class conference on applicable global environmental issues. The objective of this conference was to publicize environmental progress of individual countries, to provide a forum for technology developer and problem-holder interaction, to facilitate environmental and technology discussions between the commercial and financial communities, and to accommodate information and education exchange between governments, industries, universities, and scientists. The scope of this project included the planning and execution of an international conference on the decommissioning of nuclear facilities, and the providing of a business forum for vendors and participants sufficient to attract service providers, technology developers, and the business and financial communities. These groups, when working together with attendees from regulatory organizations and government decision-maker groups, provide an opportunity to more effectively and efficiently expedite the decommissioning projects

  19. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications. © 2015 American Academy of Forensic Sciences.

  20. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  1. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    . In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...

  2. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  3. Underground Storage Tank Integrated Demonstration (UST-ID)

    International Nuclear Information System (INIS)

    1994-02-01

    The DOE complex currently has 332 underground storage tanks (USTs) that have been used to process and store radioactive and chemical mixed waste generated from weapon materials production. Very little of the over 100 million gallons of high-level and low-level radioactive liquid waste has been treated and disposed of in final form. Two waste storage tank design types are prevalent across the DOE complex: single-shell wall and double-shell wall designs. They are made of stainless steel, concrete, and concrete with carbon steel liners, and their capacities vary from 5000 gallons (19 m 3 ) to 10 6 gallons (3785 m 3 ). The tanks have an overburden layer of soil ranging from a few feet to tens of feet. Responding to the need for remediation of tank waste, driven by Federal Facility Compliance Agreements (FFCAs) at all participating sites, the Underground Storage Tank Integrated Demonstration (UST-ID) Program was created by the US DOE Office of Technology Development in February 1991. Its mission is to focus the development, testing, and evaluation of remediation technologies within a system architecture to characterize, retrieve, treat to concentrate, and dispose of radioactive waste stored in USTs at DOE facilities. The ultimate goal is to provide safe and cost-effective solutions that are acceptable to the public and the regulators. The UST-ID has focused on five DOE locations: the Hanford Site, which is the host site, in Richland, Washington; the Fernald Site in Fernald, Ohio; the Idaho National Engineering Laboratory near Idaho Falls, Idaho; the Oak Ridge Reservation in Oak Ridge, Tennessee, and the Savannah River Site in Savannah River, South Carolina

  4. Automatic ID heat load generation in ANSYS code

    International Nuclear Information System (INIS)

    Wang, Zhibi.

    1992-01-01

    Detailed power density profiles are critical in the execution of a thermal analysis using a finite element (FE) code such as ANSYS. Unfortunately, as yet there is no easy way to directly input the precise power profiles into ANSYS. A straight-forward way to do this is to hand-calculate the power of each node or element and then type the data into the code. Every time a change is made to the FE model, the data must be recalculated and reentered. One way to solve this problem is to generate a set of discrete data, using another code such as PHOTON2, and curve-fit the data. Using curve-fitted formulae has several disadvantages. It is time consuming because of the need to run a second code for generation of the data, curve-fitting, and doing the data check, etc. Additionally, because there is no generality for different beamlines or different parameters, the above work must be repeated for each case. And, errors in the power profiles due to curve-fitting result in errors in the analysis. To solve the problem once and for all and with the capability to apply to any insertion device (ID), a program for ED power profile was written in ANSYS Parametric Design Language (APDL). This program is implemented as an ANSYS command with input parameters of peak magnetic field, deflection parameter, length of ID, and distance from the source. Once the command is issued, all the heat load will be automatically generated by the code

  5. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  6. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  7. Inhibitor of differentiation 4 (Id4) is a potential tumor suppressor in prostate cancer

    International Nuclear Information System (INIS)

    Carey, Jason PW; Asirvatham, Ananthi J; Galm, Oliver; Ghogomu, Tandeih A; Chaudhary, Jaideep

    2009-01-01

    Inhibitor of differentiation 4 (Id4), a member of the Id gene family is also a dominant negative regulator of basic helix loop helix (bHLH) transcription factors. Some of the functions of Id4 appear to be unique as compared to its other family members Id1, Id2 and Id3. Loss of Id4 gene expression in many cancers in association with promoter hypermethylation has led to the proposal that Id4 may act as a tumor suppressor. In this study we provide functional evidence that Id4 indeed acts as a tumor suppressor and is part of a cancer associated epigenetic re-programming. Data mining was used to demonstrate Id4 expression in prostate cancer. Methylation specific polymerase chain reaction (MSP) analysis was performed to understand molecular mechanisms associated with Id4 expression in prostate cancer cell lines. The effect of ectopic Id4 expression in DU145 cells was determined by cell cycle analysis (3H thymidine incorporation and FACS), expression of androgen receptor, p53 and cyclin dependent kinase inhibitors p27 and p21 by a combination of RT-PCR, real time-PCR, western blot and immuno-cytochemical analysis. Id4 expression was down-regulated in prostate cancer. Id4 expression was also down-regulated in prostate cancer line DU145 due to promoter hyper-methylation. Ectopic Id4 expression in DU145 prostate cancer cell line led to increased apoptosis and decreased cell proliferation due in part by an S-phase arrest. In addition to S-phase arrest, ectopic Id4 expression in PC3 cells also resulted in prolonged G2/M phase. At the molecular level these changes were associated with increased androgen receptor (AR), p21, p27 and p53 expression in DU145 cells. The results suggest that Id4 acts directly as a tumor suppressor by influencing a hierarchy of cellular processes at multiple levels that leads to a decreased cell proliferation and change in morphology that is possibly mediated through induction of previously silenced tumor suppressors

  8. Inhibitor of differentiation 4 (Id4 is a potential tumor suppressor in prostate cancer

    Directory of Open Access Journals (Sweden)

    Carey Jason PW

    2009-06-01

    Full Text Available Abstract Background Inhibitor of differentiation 4 (Id4, a member of the Id gene family is also a dominant negative regulator of basic helix loop helix (bHLH transcription factors. Some of the functions of Id4 appear to be unique as compared to its other family members Id1, Id2 and Id3. Loss of Id4 gene expression in many cancers in association with promoter hypermethylation has led to the proposal that Id4 may act as a tumor suppressor. In this study we provide functional evidence that Id4 indeed acts as a tumor suppressor and is part of a cancer associated epigenetic re-programming. Methods Data mining was used to demonstrate Id4 expression in prostate cancer. Methylation specific polymerase chain reaction (MSP analysis was performed to understand molecular mechanisms associated with Id4 expression in prostate cancer cell lines. The effect of ectopic Id4 expression in DU145 cells was determined by cell cycle analysis (3H thymidine incorporation and FACS, expression of androgen receptor, p53 and cyclin dependent kinase inhibitors p27 and p21 by a combination of RT-PCR, real time-PCR, western blot and immuno-cytochemical analysis. Results Id4 expression was down-regulated in prostate cancer. Id4 expression was also down-regulated in prostate cancer line DU145 due to promoter hyper-methylation. Ectopic Id4 expression in DU145 prostate cancer cell line led to increased apoptosis and decreased cell proliferation due in part by an S-phase arrest. In addition to S-phase arrest, ectopic Id4 expression in PC3 cells also resulted in prolonged G2/M phase. At the molecular level these changes were associated with increased androgen receptor (AR, p21, p27 and p53 expression in DU145 cells. Conclusion The results suggest that Id4 acts directly as a tumor suppressor by influencing a hierarchy of cellular processes at multiple levels that leads to a decreased cell proliferation and change in morphology that is possibly mediated through induction of previously

  9. Hydrologic, ecologic, and geomorphic responses of Brewery Creek to construction of a residential subdivision, Dane County, Wisconsin, 1999-2002

    Science.gov (United States)

    Selbig, William R.; Jopke, Peter L.; Marhshall, David W.; Sorge, Michael J.

    2004-01-01

    The U.S. Geological Survey (USGS), in cooperation with the Dane County Land Conservation Department (LCD) and the Wisconsin Department of Natural Resources (DNR), investigated the instream effects from construction of a residential subdivision on Brewery Creek in Dane County, Wisconsin. The purpose of the investigation was to determine whether a variety of storm-runoff and erosion-control best-management practices (BMPs) would effectively control the overall sediment load, as well as minimize any hydrologic, ecologic, and geomorphic stresses to Brewery Creek.

  10. Psychometrics and latent structure of the IDS and QIDS with young adult students.

    Science.gov (United States)

    González, David Andrés; Boals, Adriel; Jenkins, Sharon Rae; Schuler, Eric R; Taylor, Daniel

    2013-07-01

    Students and young adults have high rates of suicide and depression, thus are a population of interest. To date, there is no normative psychometric information on the IDS and QIDS in these populations. Furthermore, there is equivocal evidence on the factor structure and subscales of the IDS. Two samples of young adult students (ns=475 and 1681) were given multiple measures to test the psychometrics and dimensionality of the IDS and QIDS. The IDS, its subscales, and QIDS had acceptable internal consistencies (αs=.79-90) and favorable convergent and divergent validity correlations. A three-factor structure and two Rasch-derived subscales best fit the IDS. The samples were collected from one university, which may influence generalizability. The IDS and QIDS are desirable measures of depressive symptoms when studying young adult students. Copyright © 2013 Elsevier B.V. All rights reserved.

  11. Id2 reinforces TH1 differentiation and inhibits E2A to repress TFH differentiation.

    Science.gov (United States)

    Shaw, Laura A; Bélanger, Simon; Omilusik, Kyla D; Cho, Sunglim; Scott-Browne, James P; Nance, J Philip; Goulding, John; Lasorella, Anna; Lu, Li-Fan; Crotty, Shane; Goldrath, Ananda W

    2016-07-01

    The differentiation of helper T cells into effector subsets is critical to host protection. Transcription factors of the E-protein and Id families are important arbiters of T cell development, but their role in the differentiation of the TH1 and TFH subsets of helper T cells is not well understood. Here, TH1 cells showed more robust Id2 expression than that of TFH cells, and depletion of Id2 via RNA-mediated interference increased the frequency of TFH cells. Furthermore, TH1 differentiation was blocked by Id2 deficiency, which led to E-protein-dependent accumulation of effector cells with mixed characteristics during viral infection and severely impaired the generation of TH1 cells following infection with Toxoplasma gondii. The TFH cell-defining transcriptional repressor Bcl6 bound the Id2 locus, which provides a mechanism for the bimodal Id2 expression and reciprocal development of TH1 cells and TFH cells.

  12. The Implementation of C-ID, R2D2 Model on Learning Reading Comprehension

    Science.gov (United States)

    Rayanto, Yudi Hari; Rusmawan, Putu Ngurah

    2016-01-01

    The purposes of this research are to find out, (1) whether C-ID, R2D2 model is effective to be implemented on learning Reading comprehension, (2) college students' activity during the implementation of C-ID, R2D2 model on learning Reading comprehension, and 3) college students' learning achievement during the implementation of C-ID, R2D2 model on…

  13. Regulation of Id2 expression in EL4 T lymphoma cells overexpressing growth hormone.

    Science.gov (United States)

    Weigent, Douglas A

    2009-01-01

    In previous studies, we have shown that overexpression of growth hormone (GH) in cells of the immune system upregulates proteins involved in cell growth and protects from apoptosis. Here, we report that overexpression of GH in EL4 T lymphoma cells (GHo) also significantly increased levels of the inhibitor of differentiation-2 (Id2). The increase in Id2 was suggested in both Id2 promoter luciferase assays and by Western analysis for Id2 protein. To identify the regulatory elements that mediate transcriptional activation by GH in the Id2 promoter, promoter deletion analysis was performed. Deletion analysis revealed that transactivation involved a 301-132bp region upstream to the Id2 transcriptional start site. The pattern in the human GHo Jurkat T lymphoma cell line paralleled that found in the mouse GHo EL4 T lymphoma cell line. Significantly less Id2 was detected in the nucleus of GHo EL4 T lymphoma cells compared to vector alone controls. Although serum increased the levels of Id2 in control vector alone cells, no difference was found in the total levels of Id2 in GHo EL4 T lymphoma cells treated with or without serum. The increase in Id2 expression in GHo EL4 T lymphoma cells measured by Id2 promoter luciferase expression and Western blot analysis was blocked by the overexpression of a dominant-negative mutant of STAT5. The results suggest that in EL4 T lymphoma cells overexpressing GH, there is an upregulation of Id2 protein that appears to involve STAT protein activity.

  14. ID-pilet teeb Tallinnas võidukäiku / Anneli Lepp

    Index Scriptorium Estoniae

    Lepp, Anneli

    2006-01-01

    Vt. ka Postimees : na russkom jazõke 12. jaan. lk 3. Tallinna transpordiameti peaökonomisti Mart Moosuse sõnul moodustas ID-pilet 60,7% ühistranspordi piletituludest, Tartus oli vastav näitaja aga alla 1%. Tartut teenindava bussifirma AS Connex Eesti finantsjuht Tiina Telling peab suure erinevuse põhjuseks asjaolu, et Tallinnas on ID-pilet paberpiletist 40-88% soodsam, Tartus hinnavahe aga puudub või on lausa negatiivne ID-pileti kahjuks. Lisa: ID-pilet

  15. A brief review of revocable ID-based public key cryptosystem

    Directory of Open Access Journals (Sweden)

    Tsu-Yang Wu

    2016-03-01

    Full Text Available The design of ID-based cryptography has received much attention from researchers. However, how to revoke the misbehaviour/compromised user in ID-based public key cryptosystem becomes an important research issue. Recently, Tseng and Tsai proposed a novel public key cryptosystem called revocable ID-based public key cryptosystem (RIBE to solve the revocation problem. Later on, numerous research papers based on the Tseng-Tsai key RIBE were proposed. In this paper, we brief review Tseng and Tsai's RIBE. We hope this review can help the readers to understand the Tseng and Tsai's revocable ID-based public key cryptosystem.

  16. Achieving Payoffs from an Industry Cloud Ecosystem at BankID

    DEFF Research Database (Denmark)

    Eaton, Ben; Hallingby, Hanne Kristine; Nesse, Per-Jonny

    2014-01-01

    BankID is an industry cloud owned by Norwegian banks. It provides electronic identity, authentication and electronic signing capabilities for banking, merchant and government services. More than 60% of the population uses BankID services. As the broader ecosystem around BankID evolved, challenges......—arising from tensions between different parts of the ecosystem—had to be resolved. The four lessons learned from the BankID case will help others to build an industry cloud and establish a healthy ecosystem to service a broad user base....

  17. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    Energy Technology Data Exchange (ETDEWEB)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  18. Id-1 is not expressed in the luminal epithelial cells of mammary glands

    International Nuclear Information System (INIS)

    Uehara, Norihisa; Chou, Yu-Chien; Galvez, Jose J; Candia, Paola de; Cardiff, Robert D; Benezra, Robert; Shyamala, Gopalan

    2003-01-01

    The family of inhibitor of differentiation/DNA binding (Id) proteins is known to regulate development in several tissues. One member of this gene family, Id-1, has been implicated in mammary development and carcinogenesis. Mammary glands contain various cell types, among which the luminal epithelial cells are primarily targeted for proliferation, differentiation and carcinogenesis. Therefore, to assess the precise significance of Id-1 in mammary biology and carcinogenesis, we examined its cellular localization in vivo using immunohistochemistry. Extracts of whole mammary glands from wild type and Id-1 null mutant mice, and tissue sections from paraffin-embedded mouse mammary glands from various developmental stages and normal human breast were subjected to immunoblot and immunohistochemical analyses, respectively. In both these procedures, an anti-Id-1 rabbit polyclonal antibody was used for detection of Id-1. In immunoblot analyses, using whole mammary gland extracts, Id-1 was detected. In immunohistochemical analyses, however, Id-1 was not detected in the luminal epithelial cells of mammary glands during any stage of development, but it was detected in vascular endothelial cells. Id-1 is not expressed in the luminal epithelial cells of mammary glands

  19. Generating unique IDs from patient identification data using security models

    Directory of Open Access Journals (Sweden)

    Emad A Mohammed

    2016-01-01

    Full Text Available Background: The use of electronic health records (EHRs has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. Method: We describe the usage of the message digest-5 (MD5 and secure hashing algorithm (SHA as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. Results: The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. Conclusion: The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data.

  20. Generating unique IDs from patient identification data using security models.

    Science.gov (United States)

    Mohammed, Emad A; Slack, Jonathan C; Naugler, Christopher T

    2016-01-01

    The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. We describe the usage of the message digest-5 (MD5) and secure hashing algorithm (SHA) as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data.

  1. Molecular characterization of lactobacilli isolated from fermented idli batter

    Directory of Open Access Journals (Sweden)

    Perumal Jayaprabha Agaliya

    2013-12-01

    Full Text Available Lactic acid bacteria are non pathogenic organism widely distributed in nature typically involved in a large number of spontaneous food fermentation. The purpose of this study was to characterize the bacteriocinogenic lactobacilli from fermented idli batter which can find application in biopreservation and biomedicine. Eight most promising lactobacilli were chosen from twenty two isolates based on their spectrum of activity against other lactic acid bacteria and pathogens. The eight lactobacilli were characterized based on the various classical phenotypic tests, physiological tests and biochemical tests including various carbohydrate utilization profiles. All isolates were homo fermentative, catalase, and gelatin negative. Molecular characterization was performed by RAPD, 16S rRNA analysis, 16S ARDRA, and Multiplex PCR for species identification. RAPD was carried out using the primer R2 and M13. Five different clusters were obtained based on RAPD indicating strain level variation. 16S rRNA analysis showed 99 to 100% homology towards Lactobacillus plantarum. The restriction digestion pattern was similar for all the isolates with the restriction enzyme AluI. The subspecies were identified by performing Multiplex PCR using species specific primer. Among the five clusters, three clusters were clearly identified as Lactobacillus plantarum subsp. plantarum, Lactobacillus pentosus, and Lactobacillus plantarum subsp. argentoratensis.

  2. Protocol for VOC-Arid ID remediation performance characterization

    International Nuclear Information System (INIS)

    Tegner, B.J.; Hassig, N.L.; Last, G.V.

    1994-09-01

    The Volatile Organic Compound-Arid Integrated Demonstration (VOC-Arid ID) is a technology development program sponsored by the US Department of Energy's Office of Technology Development that is targeted to acquire, develop, demonstrate, and deploy new technologies for the remediation of VOC contaminants in the soils and groundwaters of arid DOE sites. Technologies cannot be adequately evaluated unless sufficient site characterization and technology performance data have been collection and analyzed. The responsibility for identifying these data needs has been placed largely on the Principal Investigators (PIs) developing the remediation technology, who usually are not experts in site characterization or in identification of appropriate sampling, analysis, and monitoring techniques to support the field testing. This document provides a protocol for planning the collection of data before, during, and after a test of a new technology. This generic protocol provides the PIs and project managers with a set of steps to follow. The protocol is based on a data collection planning process called the Data Quality Objectives (DQO) process, which was originally developed by the US Environmental Protection Agency and has been expanded by DOE to support site cleanup decisions. The DQO process focuses on the quality and quantity of data required to make decision. Stakeholders to the decisions must negotiate such key inputs to the process as the decision rules that will be used and the acceptable probabilities of making decision errors

  3. Improvement of the ID model for quantitative network data

    DEFF Research Database (Denmark)

    Sørensen, Peter Borgen; Damgaard, Christian Frølund; Dupont, Yoko Luise

    2015-01-01

    Many interactions are often poorly registered or even unobserved in empirical quantitative networks. Hence, the output of the statistical analyses may fail to differentiate between patterns that are statistical artefacts and those which are real characteristics of ecological networks. Such artefa......Many interactions are often poorly registered or even unobserved in empirical quantitative networks. Hence, the output of the statistical analyses may fail to differentiate between patterns that are statistical artefacts and those which are real characteristics of ecological networks......)1. This presentation will illustrate the application of the ID method based on a data set which consists of counts of visits by 152 pollinator species to 16 plant species. The method is based on two definitions of the underlying probabilities for each combination of pollinator and plant species: (1), pi...... reproduce the high number of zero valued cells in the data set and mimic the sampling distribution. 1 Sørensen et al, Journal of Pollination Ecology, 6(18), 2011, pp129-139...

  4. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  5. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  6. The Role of Quench-back in the Passive Quench Protection of Long Solenoids with Coil Sub-division

    International Nuclear Information System (INIS)

    Green, Michael A.; Guo, XingLong; Wang, Li; Pan, Heng; Wu, Hong

    2009-01-01

    This paper describes how a passive quench protection system can be applied to long superconducting solenoid magnets. When a solenoid coil is long compared to its thickness, the magnet quench process will be dominated by the time needed for uench propagation along the magnet length. Quench-back will permit a long magnet to quench more rapidly in a passive way. Quenchback from a conductive (low resistivity) mandrel is essential for spreading the quench along the length of a magnet. The andrel must be inductively coupled to the magnet circuit that is being quenched. Current induced in the mandrel by di/dt in the magnet produces heat in the mandrel, which in turn causes the superconducting coil wound on the mandrel to quench. Sub-divisions often employed to reduce the voltages to ground within the coil. This paper explores when it is possible for quench-back to be employed for passive quench protection. The role of sub-division of the coil is discussed for long magnets.

  7. A novel authentication scheme using self-certified public keys for telecare medical information systems.

    Science.gov (United States)

    Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2015-06-01

    Telecare medical information systems (TMIS), with the explosive growth of communication technology and physiological monitoring devices, are applied increasingly to enable and support healthcare delivery services. In order to safeguard patients' privacy and tackle the illegal access, authentication schemes for TMIS have been investigated and designed by many researchers. Many of them are promising for adoption in practice, nevertheless, they still have security flaws. In this paper, we propose a novel remote authentication scheme for TMIS using self-certified public keys, which is formally secure in the ID-mBJM model. Besides, the proposed scheme has better computational efficiency. Compared to the related schemes, our protocol is more practical for telemedicine system.

  8. Security and Privacy Improvements for the Belgian eID Technology

    Science.gov (United States)

    Verhaeghe, Pieter; Lapon, Jorn; de Decker, Bart; Naessens, Vincent; Verslype, Kristof

    The Belgian Electronic Identity Card enables Belgian citizens to prove their identity digitally and to sign electronic documents. At the end of 2009, every Belgian citizen older than 12 years will have such an eID card. In the future, usage of the eID card may be mandatory. However, irresponsible use of the card may cause harm to individuals.

  9. Causes of Mortality in Older People with Intellectual Disability: Results from the HA-ID Study

    Science.gov (United States)

    Oppewal, Alyt; Schoufour, Josje D.; van der Maarl, Hanne J. K.; Evenhuis, Heleen M.; Hilgenkamp, Thessa I. M.; Festen, Dederieke A.

    2018-01-01

    We aim to provide insight into the cause-specific mortality of older adults with intellectual disability (ID), with and without Down syndrome (DS), and compare this to the general population. Immediate and primary cause of death were collected through medical files of 1,050 older adults with ID, 5 years after the start of the Healthy Ageing and…

  10. Extending the Intermediate Data Structure (IDS for longitudinal historical databases to include geographic data

    Directory of Open Access Journals (Sweden)

    Finn Hedefalk

    2014-09-01

    Full Text Available The Intermediate Data Structure (IDS is a standardised database structure for longitudinal historical databases. Such a common structure facilitates data sharing and comparative research. In this study, we propose an extended version of IDS, named IDS-Geo, that also includes geographic data. The geographic data that will be stored in IDS-Geo are primarily buildings and/or property units, and the purpose of these geographic data is mainly to link individuals to places in space. When we want to assign such detailed spatial locations to individuals (in times before there were any detailed house addresses available, we often have to create tailored geographic datasets. In those cases, there are benefits of storing geographic data in the same structure as the demographic data. Moreover, we propose the export of data from IDS-Geo using an eXtensible Markup Language (XML Schema. IDS-Geo is implemented in a case study using historical property units, for the period 1804 to 1913, stored in a geographically extended version of the Scanian Economic Demographic Database (SEDD. To fit into the IDS-Geo data structure, we included an object lifeline representation of all of the property units (based on the snapshot time representation of single historical maps and poll-tax registers. The case study verifies that the IDS-Geo model is capable of handling geographic data that can be linked to demographic data.

  11. Demonstrating idAnimate : a multi-touch system for sketching and rapidly manipulating animations

    NARCIS (Netherlands)

    Quevedo Fernandez, Javier; Martens, J.B.O.S.

    2012-01-01

    This demonstration presents idAnimate, a multi-touch application for sketching animations. Thanks to the affordances provided by multitouch interfaces, idAnimate yields a novel, intuitive and easy to use animation technique named transformation-by-example, that allows users to author animations in

  12. Cloning and shake flask expression of hrIDS- Like in Pichia pastoris ...

    African Journals Online (AJOL)

    The human Iduronate-2-sulfate sulfatase (hIDS-Like) was cloned into the methylotrophic yeast Pichia pastoris under the control of alcohol oxidase promoter (AOX1) and the -mating factor signal peptide (a-factor). Six clones were identified by PCR. Using clone IDS28, the enzyme was secreted into the culture medium, ...

  13. The Mathematica package TopoID and its application to the Higgs boson production cross section

    Energy Technology Data Exchange (ETDEWEB)

    Hoff, Jens

    2016-07-15

    We present the Mathematica package TopoID which aims at the automation of several steps in multiloop calculations. The algorithm which lies at the very core of the package is described and illustrated with an example. The main features of TopoID are stated and some of them are briefly demonstrated for NLO or NNLO Higgs boson production.

  14. Rethinking Social Network Assessment for Students with Intellectual Disabilities (ID) in Postsecondary Education

    Science.gov (United States)

    Eisenman, Laura T.; Farley-Ripple, Elizabeth; Culnane, Mary; Freedman, Brian

    2013-01-01

    Social networks of persons with intellectual disabilities (ID) have been characterized as smaller and less diverse than those of typical peers. Advocates have focused on strengthening those social networks by expanding circles of social support, protection, and friendship. As young adults with ID experience increasing levels of community…

  15. Supporting co-creation with software, the idSpace platform

    NARCIS (Netherlands)

    Van Rosmalen, Peter; Boon, Jo; Bitter-Rijpkema, Marlies; Sie, Rory; Sloep, Peter

    2014-01-01

    Innovation, in general, requires teamwork among specialist of different disciplines. The idSpace project developed ideas on how teams of collaborating innovators could best be supported. These ideas were embodied in a platform that the project developed. This idSpace platform allows its users to

  16. 76 FR 46721 - Salmon-Challis National Forest, ID; Upper North Fork HFRA Ecosystem Restoration Project...

    Science.gov (United States)

    2011-08-03

    ...-Challis National Forest, ID; Upper North Fork HFRA Ecosystem Restoration Project Environmental Impact... improve the health of the ecosystem and reach the desired future condition. DATES: Comments concerning the... Ecosystem Restoration Project EIS, P.O. Box 180, 11 Casey Rd., North Fork, ID 83466. Comments may also be...

  17. 78 FR 45478 - Proposed Establishment of Class E Airspace; Salmon, ID

    Science.gov (United States)

    2013-07-29

    ...-0531; Airspace Docket No. 13-ANM-20] Proposed Establishment of Class E Airspace; Salmon, ID AGENCY... action proposes to establish Class E airspace at the Salmon VHF Omni-Directional Radio Range/Distance Measuring Equipment (VOR/DME) navigation aid, Salmon, ID, to facilitate vectoring of Instrument Flight Rules...

  18. Clarté des idées innées ?

    DEFF Research Database (Denmark)

    Schøsler, Jørn

    2013-01-01

    Der gives en analyse af begreberne 'evidens' og 'medfødte idéer' hos Descartes og Locke samt hos de franske oplysningsfilosoffer.......Der gives en analyse af begreberne 'evidens' og 'medfødte idéer' hos Descartes og Locke samt hos de franske oplysningsfilosoffer....

  19. Ubiquitin-SUMO Circuitry Controls Activated Fanconi Anemia ID Complex Dosage in Response to DNA Damage

    DEFF Research Database (Denmark)

    Gibbs-Seymour, Ian; Oka, Yasuyoshi; Rajendra, Eeson

    2015-01-01

    We show that central components of the Fanconi anemia (FA) DNA repair pathway, the tumor suppressor proteins FANCI and FANCD2 (the ID complex), are SUMOylated in response to replication fork stalling. The ID complex is SUMOylated in a manner that depends on the ATR kinase, the FA ubiquitin ligase...

  20. Muon Identification performance: hadron mis-Id measurements and RPC Muon selections

    CERN Document Server

    CMS Collaboration

    2014-01-01

    Pion, kaon, proton mis-identification probabilities as muons have been measured for different Muon ID algorithms. Results from two independent analyses are presented. The performance of a new muon ID algorithm based on matching of inner tracks with hits in muon RPC chambers is also presented.

  1. Overestimation of the 25(OH)D serum concentration with the automated IDS EIA kit.

    Science.gov (United States)

    Cavalier, Etienne; Huberty, Véronique; Cormier, Catherine; Souberbielle, Jean-Claude

    2011-02-01

    We have recently observed an increasing number of patients presenting very high serum levels of 25-hydroxyvitamin D [25(OH)D] (> 150 ng/mL), which, in all cases, had been measured with the IDS EIA kit adapted on different "open" automated platforms. We performed a comparison between the IDS EIA kit adapted on two different "open"automated platforms and the DiaSorin RIA. We found a systematic bias (higher levels with the IDS EIA kit) for concentrations more than 50-60 ng/mL that was less obvious when the IDS EIA was used in its manual procedure. We thus suggest to use the IDS EIA kit in its manual procedure rather than to adapt it on an automated platform, and to interpret cautiously a 25(OH)D greater than 100 ng/mL with this kit. Copyright © 2011 American Society for Bone and Mineral Research.

  2. REFORMASI PEMAHAMAN TEORI MAQᾹṢID SYARIAH Analisis Pendekatan Sistem Jasser Auda

    Directory of Open Access Journals (Sweden)

    Muhammad Iqbal Fasa

    2016-12-01

    Full Text Available This paper attempts to offer reform ideas Jasser Auda thought related reforms theoretical understanding of maqᾱṣid sharia. The systems approach is done by Auda critize the theory of classical maqᾱṣid more likely to hierarchical and narrow mindset. The classical maqᾱṣid pressure a point more on protection and preservation. Whereas the new maqᾱṣid theory emphasizes development (construction, development and rights (rights. Thus, Auda developed the concept of human development as the main target of maslahah (public interest. Auda offers the systems approach, namely: cognitive nature; interrelated; wholeness; openness; multi dimentionality and purposefulness. At the end of the discussion in this paper, the authors develop the idea of Jasser Auda by offering Sharia Maqᾱṣid concept in the context of Islamic Economics

  3. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  4. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  5. PERSONAL BRANDING PRABOWO SUBIANTO (ANALISIS ISI KUANTITATIF PERSONAL BRANDING PRABOWO SUBIANTO DI SITUS BERITA ONLINE REPUBLIKA.CO.ID DAN TEMPO.CO.ID TANGGAL 9 JUNI - 9 JULI 2014

    Directory of Open Access Journals (Sweden)

    Hendro Agus Prakoso

    2016-09-01

    berita kedua media tersebut. Frekuensi berita berjumlah 107 di Republika.co.id dan 51 berita di Tempo.co.id Ragam berita Republika.co.id didominasi konsep Spesialisasi sebesar 22,4% dari 107 berita, sedangkan pada Tempo.co.id didominasi konsep Nama baik sebesar 23,5% dari 51 berita. Sumber berita pada Republika.co.id mayoritas berasal dari Liputan langsung sebesar 42,9% dari 107 berita sedangkan pada Tempo.co.id mayoritas berasal dari Intelektual sebesar 54,9% dari 51 berita.

  6. Promoter methylation-associated loss of ID4 expression is a marker of tumour recurrence in human breast cancer

    International Nuclear Information System (INIS)

    Noetzel, Erik; Veeck, Jürgen; Niederacher, Dieter; Galm, Oliver; Horn, Felicitas; Hartmann, Arndt; Knüchel, Ruth; Dahl, Edgar

    2008-01-01

    Inhibitor of DNA binding/Inhibitor of differentiation 4 (ID4) is a critical factor for cell proliferation and differentiation in normal vertebrate development. ID4 has regulative functions for differentiation and growth of the developing brain. The role of ID1, ID2 and ID3 are expected to be oncogenic due to their overexpression in pancreatic cancer and colorectal adenocarcinomas, respectively. Aside from these findings, loss of ID3 expression was demonstrated in ovarian cancer. The aim of the present study was to reveal the factual role of ID4 in carcinogenesis in more detail, since its role for the pathogenesis of human breast cancer has been discussed controversially, assigning both oncogenic and tumour suppressive functions. ID4 promoter methylation, ID4 mRNA expression and ID4 protein expression were analysed in primary human breast cancer specimens using methylation-specific PCR (MSP) (n=170), semiquantitative realtime RT-PCR (n=46) and immunhistochemistry (n=3), respectively. In order to demonstrate a functional association of ID4 promoter methylation with its gene silencing, we performed DNA demethylation analysis with four human breast cell lines using MSP and semiquantitative realtime RT-PCR. In addition, we performed correlations of ID4 promoter methylation with ID4 mRNA and ID4 protein expression in matched samples of breast tumour and corresponding normal tissue. We carried out statistical analyses in order to find correlations between ID4 promoter methylation and clinicopathological parameters. Frequent ID4 promoter methylation was observed in primary breast cancer samples (69%, 117/170). We found a tight correlation (P<0.0001) between ID4 promoter methylation and loss of ID4 expression in primary breast cancer 3 specimens. Demethylating treatment with breast cancer cell lines was associated with clear ID4 mRNA re-expression. Tumours with ID4 promoter methylation showed distinct loss of ID4 expression on both transcription and protein level

  7. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  8. Geographic information systems based demarcation of risk zones: the case of the Limbe Sub-Division – Cameroon

    Directory of Open Access Journals (Sweden)

    Buh Wung Gaston

    2009-04-01

    Full Text Available In the Limbe Subdivision of Cameroon, landslides and flooding are frequent threats. The worst recorded event occurred in June 2001, when floods and landslides took the lives of some 30 persons, left over 2000 people homeless, and destroyed property and social amenities including roads and telephone lines worth hundred of thousands of US Dollars. The objective of this project was to assist local administrative officers, other decision makers and planners to understand which areas to concentrate their efforts on in order to develop mitigation actions to protect the lives of the population in these zones that are affected by flooding and associated landslides. To meet this objective the project made extensive use of geospatial tools and existing digital spatial datasets. Series of field data collection exercises constituted an integral part of the project. The project focused on the Limbe subdivision in the south-western part of Cameroon. Areas with high (greater than 60% probability of sliding to occur, occupy 23% while areas with medium (greater than 40% and less than 60% probability of sliding to occur occupy 44% and areas with low (less than 40% probability of sliding occupy 33%. Settlements along the Atlantic coast all lie less than ~50m above sea level. These settlements (villages are susceptible to flooding. Again settlements in the town of Llimbe along the Djenguele river, i.e., Animal Farms, Cassava Farms, Lumpsum areas, Church Street, New Town and Down Beach, are more susceptible to inundation during raining periods and therefore have experienced persistent flooding over the years.

  9. Bio-fortification and shelf-life extension of idli batter using curry leaves (Murraya koenigii).

    Science.gov (United States)

    Chelliah, R; Ramakrishnan, S R; Premkumar, D; Antony, U

    2016-06-01

    Among several traditional foods of India, idli is one of the most popular and commonly consumed steamed products. A new method of adding Murraya koenigii (curry leaves) to idli batter as a vehicle for fortification and extension of shelf-life has been developed. Dried curry leaves powder was incorporated with other ingredients like rice and dehusked black gram in different proportions to optimize the most palatable formulation. Rate of fermentation and microbial changes in the batter; nutritional qualities, texture and sensory properties of the prepared product were assessed. Incorporation of curry leaves powder (5 %) in idli batter increased the shelf-life and also increased the flavour, texture and appearance of the idli. The calcium content of the prepared idli was 10 times more than that of the control idli, while dietary fiber content increased by 18.6 %. Anti-microbial activity of the curry leaves in idli batter extended the shelf-life from 2 to 5 days when stored at 30 °C.

  10. An online ID identification system for liquefied-gas cylinder plant

    Science.gov (United States)

    He, Jin; Ding, Zhenwen; Han, Lei; Zhang, Hao

    2017-11-01

    An automatic ID identification system for gas cylinders' online production was developed based on the production conditions and requirements of the Technical Committee for Standardization of Gas Cylinders. A cylinder ID image acquisition system was designed to improve the image contrast of ID regions on gas cylinders against the background. Then the ID digits region was located by the CNN template matching algorithm. Following that, an adaptive threshold method based on the analysis of local average grey value and standard deviation was proposed to overcome defects of non-uniform background in the segmentation results. To improve the single digit identification accuracy, two BP neural networks were trained respectively for the identification of all digits and the easily confusable digits. If the single digit was classified as one of confusable digits by the former BP neural network, it was further tested by the later one, and the later result was taken as the final identification result of this single digit. At last, the majority voting was adopted to decide the final identification result for the 6-digit cylinder ID. The developed system was installed on a production line of a liquefied-petroleum-gas cylinder plant and worked in parallel with the existing weighing step on the line. Through the field test, the correct identification rate for single ID digit was 94.73%, and none of the tested 2000 cylinder ID was misclassified through the majority voting.

  11. Novitates Gabonenses 83. Two new species of Cola (Sterculiaceae s.str.) from Gabon with an introductory note on the subdivision of the genus

    NARCIS (Netherlands)

    Breteler, F.J.

    2014-01-01

    Background and aims The existing subdivisions of the large genus Cola of the Sterculiaceae s.str. are briefly presented and their usefulness as regards the identification of newly acquired material is discussed. Material and methods Normal practices of herbarium taxonomy have been applied to study

  12. Arsenic Removal from Drinking Water by Adsorptive Media - U.S. EPA Demonstration Project at Geneseo Hills Subdivision, in Geneseo, IL Final Performance Evaluation Report

    Science.gov (United States)

    This report documents the activities performed and the results obtained from the arsenic removal treatment technology demonstration project at the Geneseo Hills Subdivision in Geneseo, IL. The main objective of the project was to evaluate the effectiveness of AdEdge Technologies...

  13. 13,16-Dimethyl octacosanedioic acid (iso-diabolic acid), a common membrane-spanning lipid of Acidobacteria subdivisions 1 and 3

    NARCIS (Netherlands)

    Sinninghe Damsté, J.S.; Rijpstra, W.I.C.; Hopmans, E.C.; Weijers, J.W.H.; Foesel, B.U.; Overmann, J.; Dedysh, S.N.

    2011-01-01

    The distribution of membrane lipids of 17 different strains representing 13 species of subdivisions 1 and 3 of the phylum Acidobacteria, a highly diverse phylum of the Bacteria, were examined by hydrolysis and gas chromatography-mass spectrometry (MS) and by high-performance liquid

  14. Role of ID Proteins in BMP4 Inhibition of Profibrotic Effects of TGF-β2 in Human TM Cells.

    Science.gov (United States)

    Mody, Avani A; Wordinger, Robert J; Clark, Abbot F

    2017-02-01

    Increased expression of TGF-β2 in primary open-angle glaucoma (POAG) aqueous humor (AH) and trabecular meshwork (TM) causes deposition of extracellular matrix (ECM) in the TM and elevated IOP. Bone morphogenetic proteins (BMPs) regulate TGF-β2-induced ECM production. The underlying mechanism for BMP4 inhibition of TGF-β2-induced fibrosis remains undetermined. Bone morphogenic protein 4 induces inhibitor of DNA binding proteins (ID1, ID3), which suppress transcription factor activities to regulate gene expression. Our study will determine whether ID1and ID3 proteins are downstream targets of BMP4, which attenuates TGF-β2 induction of ECM proteins in TM cells. Primary human TM cells were treated with BMP4, and ID1 and ID3 mRNA, and protein expression was determined by quantitative PCR (Q-PCR) and Western immunoblotting. Intracellular ID1 and ID3 protein localization was studied by immunocytochemistry. Transformed human TM cells (GTM3 cells) were transfected with ID1 or ID3 expression vectors to determine their potential inhibitory effects on TGF-β2-induced fibronectin and plasminogen activator inhibitor-I (PAI-1) protein expression. Basal expression of ID1-3 was detected in primary human TM cells. Bone morphogenic protein 4 significantly induced early expression of ID1 and ID3 mRNA (P protein in primary TM cells, and a BMP receptor inhibitor blocked this induction. Overexpression of ID1 and ID3 significantly inhibited TGF-β2-induced expression of fibronectin and PAI-1 in TM cells (P protein 4 induced ID1 and ID3 expression suppresses TGF-β2 profibrotic activity in human TM cells. In the future, targeting specific regulators may control the TGF-β2 profibrotic effects on the TM, leading to disease modifying IOP lowering therapies.

  15. The Self-Identity Protein IdsD Is Communicated between Cells in Swarming Proteus mirabilis Colonies.

    Science.gov (United States)

    Saak, Christina C; Gibbs, Karine A

    2016-12-15

    Proteus mirabilis is a social bacterium that is capable of self (kin) versus nonself recognition. Swarming colonies of this bacterium expand outward on surfaces to centimeter-scale distances due to the collective motility of individual cells. Colonies of genetically distinct populations remain separate, while those of identical populations merge. Ids proteins are essential for this recognition behavior. Two of these proteins, IdsD and IdsE, encode identity information for each strain. These two proteins bind in vitro in an allele-restrictive manner. IdsD-IdsE binding is correlated with the merging of populations, whereas a lack of binding is correlated with the separation of populations. Key questions remained about the in vivo interactions of IdsD and IdsE, specifically, whether IdsD and IdsE bind within single cells or whether IdsD-IdsE interactions occur across neighboring cells and, if so, which of the two proteins is exchanged. Here we demonstrate that IdsD must originate from another cell to communicate identity and that this nonresident IdsD interacts with IdsE resident in the recipient cell. Furthermore, we show that unbound IdsD in recipient cells does not cause cell death and instead appears to contribute to a restriction in the expansion radius of the swarming colony. We conclude that P. mirabilis communicates IdsD between neighboring cells for nonlethal kin recognition, which suggests that the Ids proteins constitute a type of cell-cell communication. We demonstrate that self (kin) versus nonself recognition in P. mirabilis entails the cell-cell communication of an identity-encoding protein that is exported from one cell and received by another. We further show that this intercellular exchange affects swarm colony expansion in a nonlethal manner, which adds social communication to the list of potential swarm-related regulatory factors. Copyright © 2016, American Society for Microbiology. All Rights Reserved.

  16. Overexpression of inhibitor of DNA-binding (ID)-1 protein related to angiogenesis in tumor advancement of ovarian cancers

    International Nuclear Information System (INIS)

    Maw, Min Khine; Fujimoto, Jiro; Tamaya, Teruhiko

    2009-01-01

    The inhibitor of DNA-binding (ID) has been involved in cell cycle regulation, apoptosis and angiogenesis. This prompted us to study ID functions in tumor advancement of ovarian cancers. Sixty patients underwent surgery for ovarian cancers. In ovarian cancers, the levels of ID-1, ID-2 and ID-3 mRNAs were determined by real-time reverse transcription-polymerase chain reaction. The histoscore with the localization of ID-1 was determined by immunohistochemistry. Patient prognosis was analyzed with a 36-month survival rate. Microvessel counts were determined by immunohistochemistry for CD34 and factor VIII-related antigen. ID-1 histoscores and mRNA levels both significantly (p < 0.001) increased in ovarian cancers according to clinical stage, regardless of histopathological type. Furthermore, 30 patients with high ID-1 expression had a lower survival rate (53%) compared to patients with low ID-1 expression (80%). ID-1 histoscores and mRNA levels significantly (p < 0.0001) correlated with microvessel counts in ovarian cancers. ID-1 increased in ovarian cancer cells during tumor progression. Moreover, ID-1 expression levels correlated with microvessel counts. Therefore, ID-1 might work on tumor advancement via angiogenesis and is considered to be a candidate for a prognostic indicator in ovarian cancers

  17. Increased Inhibitor of Differentiation 4 (Id4 Expression in Glioblastoma: A Tissue Microarray Study

    Directory of Open Access Journals (Sweden)

    Weifin Zeng, Elisabeth J. Rushing, Daniel P. Hartmann, Norio Azumi

    2010-01-01

    Full Text Available Background: The inhibitor of differentiation/DNA binding protein family (Id1-4 is involved in cell cycle control, tumorigenesis and angiogenesis through the negative regulation of helix-loop-helix transcription factors. Of these proteins, Id4 is known to play an important role in neural stem cell differentiation, and deregulation has been implicated in glial neoplasia. However, the expression and significance of Id4 in astrocytomas has not been fully addressed. Herein we report the differential expression of Id4 in astrocytomas of various grades using tissue microarrays (TMA and immunohistochemistry (IHC. Design: The GBM TMA was constructed from 53 archival cases at Georgetown University Hospital and a TMA with normal brain controls and grades II-III astrocytoma was obtained from Cybrdi (Rockville, MD. TMA sections were stained with Id4 antibody and the slides were scored according to the percentage of staining astrocytic nuclei (<9% -, 10-50% +, >51% ++. The Fisher Exact test was used to test for statistical significance. Results: Nuclear staining for Id4 was seen in 73.58% GBMs, 25% grade III, and 12.5% grade II astrocytomas; staining was absent in normal brain tissue. There was a statistically significant difference between GBM and grades II, III astrocytoma (p <0.01. Significant Id4 expression was not detected in normal brain. Conclusions: Our study confirms the frequent upregulation of Id4 expression in GBM, which lends support to its role in tumorigenesis, possibly in the transformation of low to high-grade astrocytoma (i.e. GBM. Further studies are warranted to determine the precise role of Id4 in glial neoplasia and its potential use in targeted therapy for GBM.

  18. The paradox of IDs: an account of an ethnographic experience in the US

    Directory of Open Access Journals (Sweden)

    Mariza Peirano

    2008-01-01

    Full Text Available In the modern world, IDs are indispensable objects, without which we cannot prove that we are who we say we are. We need material substantiation that attests to the authenticity of our self-identification. This paper is an account of an ethnographic experience about IDs and identification processes in the US, based on the examination of two events in which Eliot Spitzer, the New York State governor from January 2007 to March 2008, was a central figure. A comparison with the Brazilian scenario is present throughout the paper, and it ends by focusing on the ID theft phenomenon.

  19. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  20. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  1. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  2. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  3. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  4. Id-1 gene and gene products as therapeutic targets for treatment of breast cancer and other types of carcinoma

    Science.gov (United States)

    Desprez, Pierre-Yves; Campisi, Judith

    2014-08-19

    A method for treatment of breast cancer and other types of cancer. The method comprises targeting and modulating Id-1 gene expression, if any, for the Id-1 gene, or gene products in breast or other epithelial cancers in a patient by delivering products that modulate Id-1 gene expression. When expressed, Id-1 gene is a prognostic indicator that cancer cells are invasive and metastatic.

  5. The metalloid arsenite induces nuclear export of Id3 possibly via binding to the N-terminal cysteine residues

    International Nuclear Information System (INIS)

    Kurooka, Hisanori; Sugai, Manabu; Mori, Kentaro; Yokota, Yoshifumi

    2013-01-01

    Highlights: •Sodium arsenite induces cytoplasmic accumulation of Id3. •Arsenite binds to closely spaced N-terminal cysteine residues of Id3. •N-terminal cysteines are essential for arsenite-induced nuclear export of Id3. •Nuclear export of Id3 counteracts its transcriptional repression activity. -- Abstract: Ids are versatile transcriptional repressors that regulate cell proliferation and differentiation, and appropriate subcellular localization of the Id proteins is important for their functions. We previously identified distinct functional nuclear export signals (NESs) in Id1 and Id2, but no active NES has been reported in Id3. In this study, we found that treatment with the stress-inducing metalloid arsenite led to the accumulation of GFP-tagged Id3 in the cytoplasm. Cytoplasmic accumulation was impaired by a mutation in the Id3 NES-like sequence resembling the Id1 NES, located at the end of the HLH domain. It was also blocked by co-treatment with the CRM1-specific nuclear export inhibitor leptomycin B (LMB), but not with the inhibitors for mitogen-activated protein kinases (MAPKs). Importantly, we showed that the closely spaced N-terminal cysteine residues of Id3 interacted with the arsenic derivative phenylarsine oxide (PAO) and were essential for the arsenite-induced cytoplasmic accumulation, suggesting that arsenite induces the CRM1-dependent nuclear export of Id3 via binding to the N-terminal cysteines. Finally, we demonstrated that Id3 significantly repressed arsenite-stimulated transcription of the immediate-early gene Egr-1 and that this repression activity was inversely correlated with the arsenite-induced nuclear export. Our results imply that Id3 may be involved in the biological action of arsenite

  6. How to save distressed IDS-physician marriages: a case study.

    Science.gov (United States)

    Collins, H; Johnson, B A

    1998-04-01

    A hospital-driven IDS that encounters serious problems resulting from ownership of a physician practice should address those problems by focusing on three core areas: vision and leadership, effectiveness of operations, and physician compensation arrangements. If changes in these areas do not lead to improvements, the IDS may need to consider organizational restructuring. In one case study, a hospital-driven IDS faced the problem of owning a poorly performing MSO with a captive physician group. The IDS's governing board determined that the organization lacked effective communication with the physicians and that realization of the organization's vision would require greater physician involvement in organizational decision making. The organization is expected to undergo some corporate reorganization in which physicians will acquire an equity interest in the enterprise.

  7. Toward operation of series IDs at BL43LXU of SPring-8

    Energy Technology Data Exchange (ETDEWEB)

    Baron, A. Q. R.; Tanaka, T.; Soutome, K.; Takao, M.; Nakamura, T.; Kobayashi, K.; Fujita, T.; Takahashi, S.; Aoyagi, H.; Shimosaki, Y.; Seike, T.; Uchiyama, H.; Ishikawa, D.; Chuang, T.-H.; Kimura, H.; Tanaka, H.; Kitamura, H.; Ishikawa, T. [SPring-8, 1-1-1 Kouto, Sayo, Hyogo, 679 (Japan)

    2016-07-27

    This paper discusses two issues relating to using 3 small gap insertion devices in series at BL43LXU of SPring-8 to make a uniquely powerful source in the 15-26 keV region of the x-ray spectrum. The issues discussed are (1) damage to the covers of the downstream IDs by radiation from the upstream IDs and (2) proper steering of the electron beam to get the best photon beam properties. After tests in several configurations, including one where an ID was run without an impedance-reducing cover, the damage issue was solved by installing a distributed absorber in the most downstream ID. The steering issues were mostly resolved by the introduction of appropriate corrector magnets and feedback. The paper is written from the viewpoint of an interested beamline scientist impressed with the cooperation of different groups to make a source for new science possible.

  8. Pätid võtsid varastatud ID-kaardiga kiirlaene / Põim Kama

    Index Scriptorium Estoniae

    Kama, Põim, 1985-

    2008-01-01

    ID-kaardi vargusega seotud pettusjuhtumist ning jaanuaris jõustunud rahapesu ja terrorismi rahastamise tõkestamise seaduse sättest, mis kohustab laenufirmasid esimese tehingu sooritamisel kliendiga silmast silma kohtuma. Lisatud: kiirlaenufirmad vilistavad seadusele

  9. idSpace Tooling and Training for collaborative distributed product innovation

    NARCIS (Netherlands)

    Rutjens, Marjo; Bitter-Rijpkema, Marlies; Grube, Pascal; Heider, Thomas

    2009-01-01

    Rutjens, M., Bitter-Rijpkema, M., Grube, P. P., & Heider, T. (2009). idSpace Tooling and Training for collaborative distributed product innovation. Workshop during the e-Learning Baltic conference. June, 17-19, 2009, Rostock, Germany.

  10. Wnt/β-catenin signaling changes C2C12 myoblast proliferation and differentiation by inducing Id3 expression

    International Nuclear Information System (INIS)

    Zhang, Long; Shi, Songting; Zhang, Juan; Zhou, Fangfang; Dijke, Peter ten

    2012-01-01

    Highlights: ► Expression of Id3 but not Id1 is induced by Wnt3a stimulation in C2C12 cells. ► Wnt3a induces Id3 expression via canonical Wnt/β-catenin pathway. ► Wnt3a-induced Id3 expression does not depend on BMP signaling activation. ► Induction of Id3 expression is critical determinant in Wnt3a-induced cell proliferation and differentiation. -- Abstract: Canonical Wnt signaling plays important roles in regulating cell proliferation and differentiation. In this study, we report that inhibitor of differentiation (Id)3 is a Wnt-inducible gene in mouse C2C12 myoblasts. Wnt3a induced Id3 expression in a β-catenin-dependent manner. Bone morphogenetic protein (BMP) also potently induced Id3 expression. However, Wnt-induced Id3 expression occurred independent of the BMP/Smad pathway. Functional studies showed that Id3 depletion in C2C12 cells impaired Wnt3a-induced cell proliferation and alkaline phosphatase activity, an early marker of osteoblast cells. Id3 depletion elevated myogenin induction during myogenic differentiation and partially impaired Wnt3a suppressed myogenin expression in C2C12 cells. These results suggest that Id3 is an important Wnt/β-catenin induced gene in myoblast cell fate determination.

  11. Evaluation of the Micro-ID system for the identification of Yersinia pestis.

    OpenAIRE

    Harrison, D N; Williams, J E

    1985-01-01

    One hundred isolates of Yersinia pestis identified by conventional means were tested by the Micro-ID system to assess its reliability for distinguishing Y. pestis from other members of the family Enterobacteriaceae. The Micro-ID system gave Y. pestis as a choice for the identification of 89 of these cultures, although not always as the first choice. Most nitrate-negative strains of Y. pestis keyed out with Yersinia pseudotuberculosis as first choice and Y. pestis as second or fourth choice.

  12. ACE I/D polymorphism in Indian patients with hypertrophic cardiomyopathy and dilated cardiomyopathy

    DEFF Research Database (Denmark)

    Rai, Taranjit Singh; Dhandapany, Perundurai Subramaniam; Ahluwalia, Tarun Veer Singh

    2008-01-01

    The study was carried to determine the association of angiotensin converting enzyme (ACE) insertion/deletion (I/D) polymorphism with the risk of hypertrophic cardiomyopathy (HCM), dilated cardiomyopathy (DCM), and restrictive cardiomyopathy (RCM).......The study was carried to determine the association of angiotensin converting enzyme (ACE) insertion/deletion (I/D) polymorphism with the risk of hypertrophic cardiomyopathy (HCM), dilated cardiomyopathy (DCM), and restrictive cardiomyopathy (RCM)....

  13. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  14. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  15. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  16. Id3 induces an Elk-1–caspase-8-dependent apoptotic pathway in squamous carcinoma cells

    International Nuclear Information System (INIS)

    Chen, You-Shin; Aubee, Joseph; DiVito, Kyle A; Zhou, Hengbo; Zhang, Weiyi; Chou, Fen-Pi; Simbulan-Rosenthal, Cynthia M; Rosenthal, Dean S

    2015-01-01

    Inhibitor of differentiation/DNA-binding (Id) proteins are helix–loop–helix (HLH) transcription factors. The Id protein family (Id1–Id4) mediates tissue homeostasis by regulating cellular processes including differentiation, proliferation, and apoptosis. Ids typically function as dominant negative HLH proteins, which bind other HLH proteins and sequester them away from DNA promoter regions. Previously, we have found that Id3 induced apoptosis in immortalized human keratinocytes upon UVB exposure, consistent with its role as a tumor suppressor. To investigate the role of Id3 in malignant squamous cell carcinoma (SCC) cells (A431), a tetracycline-regulated inducible system was used to induce Id3 in cell culture and mouse xenograft models. We found that upon Id3 induction, there was a decrease in cell number under low serum conditions, as well as in soft agar. Microarray, RT-PCR, immunoblot, siRNA, and inhibitor studies revealed that Id3 induced expression of Elk-1, an E-twenty-six (ETS)-domain transcription factor, inducing procaspase-8 expression and activation. Id3 deletion mutants revealed that 80 C-terminal amino acids, including the HLH, are important for Id3-induced apoptosis. In a mouse xenograft model, Id3 induction decreased tumor size by 30%. Using immunofluorescent analysis, we determined that the tumor size decrease was also mediated through apoptosis. Furthermore, we show that Id3 synergizes with 5-FU and cisplatin therapies for nonmelanoma skin cancer cells. Our studies have shown a molecular mechanism by which Id3 induces apoptosis in SCC, and this information can potentially be used to develop new treatments for SCC patients

  17. Solving polynomial systems using no-root elimination blending schemes

    KAUST Repository

    Barton, Michael

    2011-01-01

    Searching for the roots of (piecewise) polynomial systems of equations is a crucial problem in computer-aided design (CAD), and an efficient solution is in strong demand. Subdivision solvers are frequently used to achieve this goal; however

  18. Management system for the budgetary exercise of the subdivision of technology and professional development (STDP) of Petroleos Mexicanos; Sistema de administracion para el ejercicio presupuestal de la subdivision de tecnologia y desarrollo profesional (STDP) de Petroleos Mexicanos

    Energy Technology Data Exchange (ETDEWEB)

    Nava Lara, Eric Rafael; Santos Dominguez, Martin [Instituto de Investigaciones Electricas, Temixco, Morelos (Mexico); Herrera Lavin, Jesus Xavier [Petroleos Mexicanos (Mexico)

    2000-07-01

    The Management System for the Budgetary Exercise (SAEP) arises from the necessity of supporting the programming processes for the budget allocation to the technological projects of the Subdivision of Technology and Profesional Development (STPD). This system allows recovering the budget partial or complete information facilitating the adjustments to this same one before integrating them to the budget assignation system (SAP). It also allows to control the expenses of the projects as well as of the exercise of the budget, and orchestrates an internal control for the technical and financial approval of the countable commitments and the budget expenses before taking the proceeding through the mechanisms of registry with the SAP. [Spanish] El Sistema de Administracion para el Ejercicio Presupuestal (SAEP) surge de la necesidad de apoyar los procesos de programacion para la asignacion del presupuesto a los proyectos tecnologicos de la Subdireccion de Tecnologia y Desarrollo Profesional (STPD). Este sistema permite recuperar la informacion parcial o completa del presupuesto facilitando las adecuaciones a este mismo antes de integrarlas al Sistema de Asignacion de Presupuesto (SAP). Tambien permite controlar los gastos, tanto de los proyectos como de los ejercicios del presupuesto e instrumenta un control interno para la aprobacion tecnica y financiera de los compromisos contables y las erogaciones del presupuesto antes de llevar el tramite a traves de los mecanismos de registro con el (SAP).

  19. miR-342 regulates BRCA1 expression through modulation of ID4 in breast cancer.

    Directory of Open Access Journals (Sweden)

    Elisabetta Crippa

    Full Text Available A miRNAs profiling on a group of familial and sporadic breast cancers showed that miRNA-342 was significantly associated with estrogen receptor (ER levels. To investigate at functional level the role of miR-342 in the pathogenesis of breast cancer, we focused our attention on its "in silico" predicted putative target gene ID4, a transcription factor of the helix-loop-helix protein family whose expression is inversely correlated with that of ER. ID4 is expressed in breast cancer and can negatively regulate BRCA1 expression. Our results showed an inverse correlation between ID4 and miR-342 as well as between ID4 and BRCA1 expression. We functionally validated the interaction between ID4 and miR-342 in a reporter Luciferase system. Based on these findings, we hypothesized that regulation of ID4 mediated by miR-342 could be involved in the pathogenesis of breast cancer by downregulating BRCA1 expression. We functionally demonstrated the interactions between miR-342, ID4 and BRCA1 in a model provided by ER-negative MDA-MB-231 breast cancer cell line that presented high levels of ID4. Overexpression of miR-342 in these cells reduced ID4 and increased BRCA1 expression, supporting a possible role of this mechanism in breast cancer. In the ER-positive MCF7 and in the BRCA1-mutant HCC1937 cell lines miR-342 over-expression only reduced ID4. In the cohort of patients we studied, a correlation between miR-342 and BRCA1 expression was found in the ER-negative cases. As ER-negative cases were mainly BRCA1-mutant, we speculate that the mechanism we demonstrated could be involved in the decreased expression of BRCA1 frequently observed in non BRCA1-mutant breast cancers and could be implicated as a causal factor in part of the familial cases grouped in the heterogeneous class of non BRCA1 or BRCA2-mutant cases (BRCAx. To validate this hypothesis, the study should be extended to a larger cohort of ER-negative cases, including those belonging to the BRCAx class.

  20. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Wu, Fan; Xu, Lili

    2013-08-01

    Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.

  1. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  2. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  3. Signal multiplexing scheme for LINAC

    International Nuclear Information System (INIS)

    Sujo, C.I.; Mohan, Shyam; Joshi, Gopal; Singh, S.K.; Karande, Jitendra

    2004-01-01

    For the proper operation of the LINAC some signals, RF (radio frequency) as well as LF (low frequency) have to be available at the Master Control Station (MCS). These signals are needed to control, calibrate and characterize the RF fields in the resonators. This can be achieved by proper multiplexing of various signals locally and then routing the selected signals to the MCS. A multiplexing scheme has been designed and implemented, which will allow the signals from the selected cavity to the MCS. High isolation between channels and low insertion loss for a given signal are important issues while selecting the multiplexing scheme. (author)

  4. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  5. Efficient coding and detection of ultra-long IDs for visible light positioning systems.

    Science.gov (United States)

    Zhang, Hualong; Yang, Chuanchuan

    2018-05-14

    Visible light positioning (VLP) is a promising technique to complement Global Navigation Satellite System (GNSS) such as Global positioning system (GPS) and BeiDou Navigation Satellite System (BDS) which features the advantage of low-cost and high accuracy. The situation becomes even more crucial for indoor environments, where satellite signals are weak or even unavailable. For large-scale application of VLP, there would be a considerable number of Light emitting diode (LED) IDs, which bring forward the demand of long LED ID detection. In particular, to provision indoor localization globally, a convenient way is to program a unique ID into each LED during manufacture. This poses a big challenge for image sensors, such as the CMOS camera in everybody's hands since the long ID covers the span of multiple frames. In this paper, we investigate the detection of ultra-long ID using rolling shutter cameras. By analyzing the pattern of data loss in each frame, we proposed a novel coding technique to improve the efficiency of LED ID detection. We studied the performance of Reed-Solomon (RS) code in this system and designed a new coding method which considered the trade-off between performance and decoding complexity. Coding technique decreases the number of frames needed in data processing, significantly reduces the detection time, and improves the accuracy of detection. Numerical and experimental results show that the detected LED ID can be much longer with the coding technique. Besides, our proposed coding method is proved to achieve a performance close to that of RS code while the decoding complexity is much lower.

  6. The Inventory of Depressive Symptomatology Self Report (IDS-SR: Psychometric properties of the Indonesian version.

    Directory of Open Access Journals (Sweden)

    Retha Arjadi

    Full Text Available Depression screening and examination in Indonesia are highly challenging due to the disproportionately low number of mental health professionals in comparison to the Indonesian population. Self-report questionnaires on depression are cost-effective and time-efficient. The current study investigates the psychometric properties of the Indonesian Inventory of Depressive Symptomatology Self Report (IDS-SR.The participants were 904 Indonesians (aged 16-61; 50.2% female, recruited via an online survey using Qualtrics. Confirmatory factor analysis of the one-factor, three-factor, and four-factor model were explored. Convergent and divergent validity of the total score of the Indonesian IDS-SR and each factor were examined, as well as the Cronbach's Alpha reliability. In addition, an optimal cut-off score for the Indonesian IDS-SR was established using ROC curve analysis.The three-factor model of "cognitive/mood", "anxiety/arousal", and "sleep disturbance" was the best fit with the Indonesian IDS-SR data. Convergent and divergent validity were good. Cronbach's Alpha reliability was excellent for the total score, good for the factors "cognitive/mood" and "anxiety/arousal", but insufficient for the factor "sleep disturbance". The optimal cut-off score of the Indonesian IDS-SR was 14, with 87% sensitivity and 86% specificity.As a multifactorial instrument to measure depression that has good validity and reliability, the Indonesian IDS-SR can be used to assess depressive symptoms for the purpose of research and clinical practice. The optimal cut-off score of the Indonesian IDS-SR is in accordance with the internationally used cut-off score.

  7. Association between ACE gene I/D polymorphism and clinical presentation and prognosis of sarcoidosis.

    Science.gov (United States)

    Alía, P; Mañá, J; Capdevila, O; Alvarez, A; Navarro, M A

    2005-01-01

    Serum angiotensin converting enzyme (SACE) concentration is considered a marker of sarcoidosis activity. This concentration is influenced by an insertion/deletion (I/D) polymorphism of the ACE gene, such that SACE levels follow the pattern DD>ID>II. The aim of our work was to study the relationship between I/D polymorphism and susceptibility to sarcoidosis, as well as the relation between this polymorphism and the clinical presentation and evolution of the disease in 177 sarcoidosis patients. A group of 104 individuals without sarcoidosis was included as control. Genotyping was done by a polymerase chain reaction (PCR) method, and SACE concentration at diagnosis was determined by a kinetic method. No differences were observed in genotype or allele distributions between patients and controls, nor between patients considering the type of presentation (Löfgren versus non-Löfgren) and evolution of the disease (acute versus chronic). As reported for healthy populations, SACE concentrations followed the pattern DD>ID>II in sarcoidosis patients, but significant differences between genotypes existed only in the Löfgren group (p = 0.003) and in acute patients (p = 0.02). SACE concentrations at diagnosis were lower in acute patients (p = 0.05) and in Löfgren's syndrome (p = 0.04), but this seemed to occur only in ID individuals (p = 0.02 and p = 0.01, respectively). No relation was thus found between I/D polymorphism and susceptibility to sarcoidosis, but ACE I/D genotyping may improve the assessment of disease activity, both at diagnosis and during the follow-up of treated and untreated patients.

  8. Factors associated with perception of risk of contracting HIV among secondary school female learners in Mbonge subdivision of rural Cameroon.

    Science.gov (United States)

    Tarkang, Elvis Enowbeyang

    2014-01-01

    Since learners in secondary schools fall within the age group hardest hit by HIV/AIDS, it is obvious that these learners might be at high risk of contracting HIV/AIDS. However, little has been explored on the perception of risk of contracting HIV among secondary school learners in Cameroon. This study aimed at examining the perception of risk of contracting HIV among secondary school learners in Mbonge subdivision of rural Cameroon using the Health Belief Model (HBM) as framework. A quantitative, correlational design was adopted, using a self-administered questionnaire to collect data from 210 female learners selected through disproportional, stratified, simple random sampling technique, from three participating senior secondary schools. Statistics were calculated using SPSS version 20 software program. Only 39.4% of the respondents perceived themselves to be at high risk of contracting HIV, though the majority, 54.0% were sexually active. Multinomial logistic regression analyses show that sexual risk behaviours (p=0.000) and the Integrated Value Mapping (IVM) of the perception components of the HBM are the most significant factors associated with perception of risk of contracting HIV at the level p<0.05. The findings of this study can play an instrumental role in the development of effective preventive and interventional messages for adolescents in Cameroon.

  9. An alternative explanation for evidence that xenon depletion, pore formation, and grain subdivision begin at different local burnups

    International Nuclear Information System (INIS)

    Rest, J.; Hofman, G.L.

    2000-01-01

    In order to interpret the recent observation that xenon depletion, pore formation, and grain subdivision occur successively at increasing local burnups, a rate-theory-based model is used to investigate the nucleation and growth of cavities during low-temperature irradiation of UO 2 in the presence of irradiation-induced interstitial-loop formation and growth. Consolidation of the dislocation structure takes into account the generation of forest dislocations and capture of interstitial dislocation loops. The loops accumulate and ultimately evolve into a low-energy cellular dislocation structure. The cell walls have been previously identified as recrystallization nuclei. The calculations indicate that nanometer-size bubbles are associated with this cellular dislocation structure while the observed micron-size bubbles are presumed to be either preexisting pores deformed by adjacent grains and/or new pores formed in the new recrystallized grain-boundary junctions. Subsequent to recrystallization, gas released from the recrystallized grains feeds the preexisting pores and the recrystallized grains may appear to form a preferential concentration of subdivided grains around the growing pores. This picture is illustrated in a sequence of photomicrographs of irradiated U 3 O 8

  10. Availability, Sustainability, and Suitability of Ground Water, Rogers Mesa, Delta County, Colorado - Types of Analyses and Data for Use in Subdivision Water-Supply Reports

    Science.gov (United States)

    Watts, Kenneth R.

    2008-01-01

    The population of Delta County, Colorado, like that in much of the Western United States, is forecast to increase substantially in the next few decades. A substantial portion of the increased population likely will reside in rural subdivisions and use residential wells for domestic water supplies. In Colorado, a subdivision developer is required to submit a water-supply plan through the county for approval by the Colorado Division of Water Resources. If the water supply is to be provided by wells, the water-supply plan must include a water-supply report. The water-supply report demonstrates the availability, sustainability, and suitability of the water supply for the proposed subdivision. During 2006, the U.S. Geological Survey, in cooperation with Delta County, Colorado, began a study to develop criteria that the Delta County Land Use Department can use to evaluate water-supply reports for proposed subdivisions. A table was prepared that lists the types of analyses and data that may be needed in a water-supply report for a water-supply plan that proposes the use of ground water. A preliminary analysis of the availability, sustainability, and suitability of the ground-water resources of Rogers Mesa, Delta County, Colorado, was prepared for a hypothetical subdivision to demonstrate hydrologic analyses and data that may be needed for water-supply reports for proposed subdivisions. Rogers Mesa is a 12-square-mile upland mesa located along the north side of the North Fork Gunnison River about 15 miles east of Delta, Colorado. The principal land use on Rogers Mesa is irrigated agriculture, with about 5,651 acres of irrigated cropland, grass pasture, and orchards. The principal source of irrigation water is surface water diverted from the North Fork Gunnison River and Leroux Creek. The estimated area of platted subdivisions on or partially on Rogers Mesa in 2007 was about 4,792 acres of which about 2,756 acres was irrigated land in 2000. The principal aquifer on Rogers

  11. On 165Ho level scheme

    International Nuclear Information System (INIS)

    Ardisson, Claire; Ardisson, Gerard.

    1976-01-01

    A 165 Ho level scheme was constructed which led to the interpretation of sixty γ rays belonging to the decay of 165 Dy. A new 702.9keV level was identified to be the 5/2 - member of the 1/2 ) 7541{ Nilsson orbit. )] [fr

  12. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min; Ma, Guancong; Wu, Ying; Yang, Zhiyu; Sheng, Ping

    2014-01-01

    the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost

  13. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  14. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  15. Nonlinear Secret Image Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Sang-Ho Shin

    2014-01-01

    efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2⁡m bit-per-pixel (bpp, respectively.

  16. Crossover from normal (N) Ohmic subdivision to superconducting (S) equipartition of current in parallel conductors at the N-S transition: Theory

    OpenAIRE

    Kumar, N.

    2007-01-01

    The recently observed (1) equipartition of current in parallel at and below the Normal-Superconducting (N-S) transition can be understood in terms of a Landau-Ginzburg order-parameter phenomenology. This complements the explanation proposed earlier (1) based on the flux-flow resistance providing a nonlinear negative current feedback towards equipartition when the transition is approached from above. The present treatment also unifies the usual textbook inductive subdivision expected much belo...

  17. RESEARCH OF APPROACHES TO INCREASE THE EFFICIENCY OF FUNCTIONING OF RAILWAY TRANSPORT SUBDIVISIONS FROM THE POINT OF VIEW OF SUSTAINABLE DEVELOPMENT

    Directory of Open Access Journals (Sweden)

    O. I. Kharchenko

    2014-07-01

    Full Text Available Purpose. Modern transport systems are not stable and can not stand up to the destabilizing factors. Global track record in the economic and commercial management systems is the use of the concept of sustainable development. It is necessary on the basis of analysis of literary sources to define the directions of efficiency increase of functioning of railway transport subdivisions from the point of view of sustainable development. Methodology. To achieve the purpose the features of the use of sustainable development conception and its realization were investigated at a management of the complex systems. The existent models were also analyzed in the field of efficiency increase of functioning of railway transport subdivisions. Findings. On the basis of literary sources analysis, keeping up the conceptual essence of the sustainable development, the main directions of efficiency increase of subdivisions functioning were selected. They take into account the basic requirements of steady development and should be considered as a complex. Originality. New directions to consider the efficiency increase issues from position of sustainable development were offered by the author. Three components of conceptions of sustainable development (economic, ecological and social should be examined in a balanced way. Thus, the above mentioned theoretical studies can promote the forming of new economy model corresponding to the purposes and principles of sustainable development. Practical value. The conducted analysis development confirms the necessity of researches on perspective directions of development of railway transport subdivisions, which are marked by the guidance of Ukrzaliznytsia. It enables to select basic directions for further research in the area of efficiency increase.

  18. Identification and genetic analysis of Panama-genotype Venezuelan equine encephalitis virus subtype ID in Peru.

    Science.gov (United States)

    Oberste, M S; Weaver, S C; Watts, D M; Smith, J F

    1998-01-01

    Venezuelan equine encephalitis (VEE) virus was isolated in 1993, 1994, and 1995 from human cases of acute, undifferentiated, febrile illness in the Peruvian Amazon Basin. Two virus isolates were recovered in 1994 from Peruvian soldiers at a jungle outpost near Pantoja in northern Peru, and 10 isolates were obtained from military personnel and civilians in 1993-1995 in Iquitos, an urban center in northeastern Peru. The genetic relationship of these isolates to other VEE virus strains was determined by sequencing 856-867 nucleotide reverse transcription-polymerase chain reaction fragments derived from the PE2 glycoprotein gene. The sequences were compared with those of other VEE virus strains, including representatives of the IAB, IC, ID, IE, II, and IIIC subtypes. The two Pantoja isolates were most closely related to subtype IC and ID viruses previously isolated in Colombia and Venezuela, and to the ID viruses isolated during the 1970s in Iquitos. All of the recent Iquitos isolates were similar to one another, but they were more closely related to Panamanian ID strains than to isolates previously obtained in Iquitos, Peru, or in Colombia and Venezuela. The recent Iquitos VEE viral isolates were the first Panama-genotype VEE ID virus strains identified outside of the Republic of Panama.

  19. Relationship between major depressive disorder and ACE gene I/D polymorphism in a Turkish population

    Directory of Open Access Journals (Sweden)

    Sema Inanir

    2016-04-01

    Full Text Available Abstract Background Major depressive disorder (MDD is a complex disease and a significant health problem that is prevalent across the world. Angiotensin-converting enzyme (ACE has an important role in renin-angiotensin system (RAS and converts inactive angiotensin I to a potent vasopressor and aldosterone-stimulating peptide angiotensin II. Levels of ACE in plasma vary according to the insertion/deletion (I/D polymorphism of ACE gene. Objective The aim of the current study was to examine the influence ACE gene I/D variations on the risk of MDD. Methods In the present case-control study, we analyzed ACE I/D polymorphism in 346 MDD patients and 210 healthy subjects using polymerase chain reaction technique. Results Comparing the two groups, no significant difference was observed with regard to either genotype distributions or allele frequencies of the I/D polymorphism of ACE gene. Discussion Our findings suggest that the ACE I/D polymorphism is not associated with MDD in Turkish case-control study. Further studies are still needed.

  20. CASK inhibits ECV304 cell growth and interacts with Id1

    International Nuclear Information System (INIS)

    Qi Jie; Su Yongyue; Sun Rongju; Zhang Fang; Luo Xiaofeng; Yang Zongcheng; Luo Xiangdong

    2005-01-01

    Calcium/calmodulin-dependent serine protein kinase (CASK) is generally known as a scaffold protein. Here we show that overexpression of CASK resulted in a reduced rate of cell growth, while inhibition of expression of endogenous CASK via RNA-mediated interference resulted in an increased rate of cell growth in ECV304 cells. To explore the molecular mechanism, we identified a novel CASK-interacting protein, inhibitor of differentiation 1 (Id1) with a yeast two-hybrid screening. Furthermore, endogenous CASK and Id1 proteins were co-precipitated from the lysates of ECV304 cells by immunoprecipitation. Mammalian two-hybrid protein-protein interaction assays indicated that CASK possessed a different binding activity for Id1 and its alternative splicing variant. It is known that Id proteins play important roles in regulation of cell proliferation and differentiation. Thus, we speculate that the regulation of cell growth mediated by CASK may be involved in Id1. Our findings indicate a novel function of CASK, the mechanism that remains to be further investigated

  1. Both Isochronous and Non-Isochronous Metrical Subdivision Afford Precise and Stable Ensemble Entrainment: A Corpus Study of Malian Jembe Drumming.

    Science.gov (United States)

    Polak, Rainer; London, Justin; Jacoby, Nori

    2016-01-01

    Most approaches to musical rhythm, whether in music theory, music psychology, or musical neuroscience, presume that musical rhythms are based on isochronous (temporally equidistant) beats and/or beat subdivisions. However, rhythms that are based on non-isochronous, or unequal patterns of time are prominent in the music of Southeast Europe, the Near East and Southern Asia, and in the music of Africa and the African diaspora. The present study examines one such style found in contemporary Malian jembe percussion music. A corpus of 15 representative performances of three different pieces ("Manjanin," "Maraka," and "Woloso") containing ~43,000 data points was analyzed. Manjanin and Woloso are characterized by non-isochronous beat subdivisions (a short IOI followed by two longer IOIs), while Maraka subdivisions are quasi-isochronous. Analyses of onsets and asynchronies show no significant differences in timing precision and coordination between the isochronously timed Maraka vs. the non-isochronously timed Woloso performances, though both pieces were slightly less variable than non-isochronous Manjanin. Thus, the precision and stability of rhythm and entrainment in human music does not necessarily depend on metric isochrony, consistent with the hypothesis that isochrony is not a biologically-based constraint on human rhythmic behavior. Rather, it may represent a historically popular option within a variety of culturally contingent options for metric organization.

  2. Inhibitor of DNA binding 1 (Id1) induces differentiation and proliferation of mouse embryonic carcinoma P19CL6 cells

    International Nuclear Information System (INIS)

    Meng, Qingzhen; Jia, Zhuqing; Wang, Weiping; Li, Binhong; Ma, Kangtao; Zhou, Chunyan

    2011-01-01

    Highlights: → Id1 was upregulated during the cardiac differentiation process of P19CL6 cells. → Id1 upregulated expression of cardiac specific genes Gata4, α-MHC and ISL1. → Id1 promoted proliferation of P19CL6 cells. → Overexpression of Id1 increased activity of TOP flash. → Wnt3a or LiCl treatment promoted Id1 expression in P19CL6 cells. -- Abstract: The inhibitor of DNA binding (Id) family of genes encodes negative regulators of basic helix-loop-helix transcription factors and has been implicated in such diverse cellular processes as differentiation, proliferation, apoptosis and migration. Id knockout mouse embryos display multiple cardiac defects but the specific role of Id1 in cardiac differentiation is unclear. In the present study, we investigated the function of Id1 in DMSO-induced P19CL6 cells, a widely-accepted cell model of cardiac differentiation. We found that Id1 was upregulated during the cardiac differentiation of P19CL6 cells. The expression of cardiac specific marker genes, Gata4, α-MHC and ISL1, was upregulated in P19CL6 cells stably transfected with Id1 (P19CL6-Id1) during cardiac differentiation. The overexpression of Id1 reduced the number of cells in G1 phase and increased the cell population in G2, M and S phases, while knockdown of Id1 increased the number of cells in G1 phase from 48.6 ± 2.51% to 62.2 ± 1.52% at day 0 of cardiac induction, and from 52.5 ± 3.41% to 63.7 ± 1.02% at day 3 after cardiac induction, indicating that Id1 promoted proliferation of P19CL6 cells. Luciferase assays showed that the activity of TOP flash was higher in P19CL6-Id1 cells than wildtype P19CL6 cells, while Id1 expression was also upregulated in P19CL6 cells treated with Wnt3a or LiCl. This indicates that there may be positive feedback between Id1 and Wnt signaling which plays an important role in cardiac differentiation.

  3. Le traitement de l’idéologie dans la sociologie de Luc Boltanski

    Directory of Open Access Journals (Sweden)

    David Vrydaghs

    2006-10-01

    Full Text Available IntroductionLe concept d’idéologie apparaît dans la sociologie de Luc Boltanski à partir du Nouvel Esprit du capitalisme, publié en 1999. L’auteur y revient dans La Condition fœtale, paru en 2004. On aurait donc pu se contenter de ces ouvrages pour examiner le traitement réservé à l’idéologie dans la sociologie de Luc Boltanski. On préférera pourtant revenir aux travaux antérieurs du sociologue, et ce pour deux raisons.D’abord parce que le concept d’idéologie tel qu’il est employé dans Le Nou...

  4. Implementasi Cell ID dan GPS dalam Pencarian Lokasi Fasilitas Kesehatan Terdekat

    Directory of Open Access Journals (Sweden)

    Fahmi Candra Permana

    2017-07-01

    Full Text Available Cell ID dan GPS merupakan layanan berbasis lokasi dan teknologi yang banyak membantu manusia dalam hal navigasi dan penemuan tempat-tempat yang bermanfaat di sekitarnya. Salah satu komponen utama dari teknologi ini dapat diterapkan pada telepon seluler. Dalam penelitian ini, dirancang sebuah aplikasi dengan memanfaatkan teknologi berdasar implementasi dari Cell ID dan GPS untuk mengetahui posisi user dan lokasi fasilitas kesehatan terdekat di sekitar user dan penggunaan JSON sebagai sarana untuk menyimpan database pada web. Aplikasi ini diimplementasikan pada telepon seluler dengan sistem operasi Android. Hasil dari penelitian ini menunjukkan bahwa Cell ID dan GPS dapat diimplementasikan dengan baik dengan memanfaatkan akses Internet dan Google Maps untuk mencari fasilitas kesehatan terdekat dan menggambarkan daerah sekitar user.

  5. ACE I/D genotype, adiposity, and blood pressure in children

    Directory of Open Access Journals (Sweden)

    Rothschild Max

    2009-03-01

    Full Text Available Abstract Background Angiotensin converting enzyme (ACE is a possible candidate gene that may influence both body fatness and blood pressure. Although several genetic studies have been conducted in adults, relatively few studies have examined the contribution of potential candidate genes, and specifically ACE I/D, on adiposity and BP phenotypes in childhood. Such studies may prove insightful for the development of the obesity-hypertension phenotype early in life. The purpose of this study was to examine differences in body fatness and resting blood pressure (BP by ACE I/D genotype, and determine if the association between adiposity and BP varies by ACE I/D genotype in children. Methods 152 children (75 girls, 77 boys were assessed for body composition (% body fat using dual energy x-ray absorbtiometry and resting BP according to American Heart Association recommendations. Buccal cell samples were genotyped using newly developed PCR-RFLP tests for two SNPs (rs4341 and rs4343 in complete linkage disequilibrium with the ACE I/D polymorphism. Partial correlations were computed to assess the ociations between % body fat and BP in the total sample and by genotype. ANCOVA was used to examine differences in resting BP by ACE I/D genotype and fatness groups. Results Approximately 39% of youth were overfat based on % body fat (>30% fat in girls, 25% fat in boys. Body mass, body mass index, and fat-free mass were significantly higher in the ACE D-carriers compared to the II group (p Conclusion ACE D-carriers are heavier than ACE II children; however, BP did not differ by ACE I/D genotype but was adversely influenced in the overfat D-carriers. Further studies are warranted to investigate the genetics of fatness and BP phenotypes in children.

  6. The ubiquitin ligase ASB4 promotes trophoblast differentiation through the degradation of ID2.

    Directory of Open Access Journals (Sweden)

    W H Davin Townley-Tilson

    Full Text Available Vascularization of the placenta is a critical developmental process that ensures fetal viability. Although the vascular health of the placenta affects both maternal and fetal well being, relatively little is known about the early stages of placental vascular development. The ubiquitin ligase Ankyrin repeat, SOCS box-containing 4 (ASB4 promotes embryonic stem cell differentiation to vascular lineages and is highly expressed early in placental development. The transcriptional regulator Inhibitor of DNA binding 2 (ID2 negatively regulates vascular differentiation during development and is a target of many ubiquitin ligases. Due to their overlapping spatiotemporal expression pattern in the placenta and contrasting effects on vascular differentiation, we investigated whether ASB4 regulates ID2 through its ligase activity in the placenta and whether this activity mediates vascular differentiation. In mouse placentas, ASB4 expression is restricted to a subset of cells that express both stem cell and endothelial markers. Placentas that lack Asb4 display immature vascular patterning and retain expression of placental progenitor markers, including ID2 expression. Using JAR placental cells, we determined that ASB4 ubiquitinates and represses ID2 expression in a proteasome-dependent fashion. Expression of ASB4 in JAR cells and primary isolated trophoblast stem cells promotes the expression of differentiation markers. In functional endothelial co-culture assays, JAR cells ectopically expressing ASB4 increased endothelial cell turnover and stabilized endothelial tube formation, both of which are hallmarks of vascular differentiation within the placenta. Co-transfection of a degradation-resistant Id2 mutant with Asb4 inhibits both differentiation and functional responses. Lastly, deletion of Asb4 in mice induces a pathology that phenocopies human pre-eclampsia, including hypertension and proteinuria in late-stage pregnant females. These results indicate that

  7. ID-1 mass storage system for mainframe by using FDDI network

    International Nuclear Information System (INIS)

    Morita, Y.; Fujii, H.; Inoue, E.; Kodama, H. Manabe, A.; Miyamoto, A.; Nomachi, M.; Watase, Y.; Yasu, Y.

    1994-01-01

    The authors have developed an ID-1 mass storage system as a distributed data server for Fujitsu mainframe computers. The system consists of a SONY ID-1 recorder DIR-1000, a tape robot system DMS-24 and a SCSI-II interface DFC-1500, which are connected to Spar Station 10 with an FDDI interface. The maximum speed of 7.5 Mbytes/sec is achieved for data transfer between Sparc Station 10 memory and DIR-1000 with a buffer size of 1 Mbytes. The system has been used successfully since last October to migrate more than 1 Tbytes data

  8. Suurnimed jäid müümata / Maria-Kristiina Soomre

    Index Scriptorium Estoniae

    Soomre, Maria-Kristiina, 1978-

    2001-01-01

    9. mai Christie' oksjonist, müümata jäänud Picasso, Degas', Cezanne'i tööd. 8. mai Sotheby oksjonist, kus edukalt müüdi töid S. J. Seegeri kogust, 3,85 miljoni dollari eest M. Beckmanni "Perseuse viimane katsumus". Sotheby kaasaegse kunsti oksjonil New Yorgis müüdi 5,6 miljoni dollari eest J. Koonsi skulptuur M. Jacksonist. Müümata jäid A. Warholi "Viis supipurki", A. Calderi 3 skulptuuri

  9. Projectc conception for city logistics with utilization of IDS element applicated to the Nitra city

    Directory of Open Access Journals (Sweden)

    Michal Balog

    2010-02-01

    Full Text Available Nowadays traffic situation in the town-residential area is characterized by growing requirement for quality and quantityof transfer performance and services that result in congestion increasing in the some towns. Currently the similar problem has Nitracity, where it is necessary to solve this situation immediately. One of the possibilities of increasing traffic fluency is to extend roads, butin case of Nitra that possibility is irrelevant because of non-available space. Other possibility is an utilization of IDS elements(Intelligent Transport System. The contribution presents the conception of transportation in the town, founded on creation of trafficcircles with subsequent IDS elements application.

  10. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    , Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project...

  11. [PICS: pharmaceutical inspection cooperation scheme].

    Science.gov (United States)

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  12. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  13. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular...

  14. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...

  15. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...

  16. Learning-based automated segmentation of the carotid artery vessel wall in dual-sequence MRI using subdivision surface fitting.

    Science.gov (United States)

    Gao, Shan; van 't Klooster, Ronald; Kitslaar, Pieter H; Coolen, Bram F; van den Berg, Alexandra M; Smits, Loek P; Shahzad, Rahil; Shamonin, Denis P; de Koning, Patrick J H; Nederveen, Aart J; van der Geest, Rob J

    2017-10-01

    The quantification of vessel wall morphology and plaque burden requires vessel segmentation, which is generally performed by manual delineations. The purpose of our work is to develop and evaluate a new 3D model-based approach for carotid artery wall segmentation from dual-sequence MRI. The proposed method segments the lumen and outer wall surfaces including the bifurcation region by fitting a subdivision surface constructed hierarchical-tree model to the image data. In particular, a hybrid segmentation which combines deformable model fitting with boundary classification was applied to extract the lumen surface. The 3D model ensures the correct shape and topology of the carotid artery, while the boundary classification uses combined image information of 3D TOF-MRA and 3D BB-MRI to promote accurate delineation of the lumen boundaries. The proposed algorithm was validated on 25 subjects (48 arteries) including both healthy volunteers and atherosclerotic patients with 30% to 70% carotid stenosis. For both lumen and outer wall border detection, our result shows good agreement between manually and automatically determined contours, with contour-to-contour distance less than 1 pixel as well as Dice overlap greater than 0.87 at all different carotid artery sections. The presented 3D segmentation technique has demonstrated the capability of providing vessel wall delineation for 3D carotid MRI data with high accuracy and limited user interaction. This brings benefits to large-scale patient studies for assessing the effect of pharmacological treatment of atherosclerosis by reducing image analysis time and bias between human observers. © 2017 American Association of Physicists in Medicine.

  17. Molecular Analysis of Ammonia-Oxidizing Bacteria of the β Subdivision of the Class Proteobacteria in Compost and Composted Materials

    Science.gov (United States)

    Kowalchuk, George A.; Naoumenko, Zinaida S.; Derikx, Piet J. L.; Felske, Andreas; Stephen, John R.; Arkhipchenko, Irina A.

    1999-01-01

    Although the practice of composting animal wastes for use as biofertilizers has increased in recent years, little is known about the microorganisms responsible for the nitrogen transformations which occur in compost and during the composting process. Ammonia is the principle available nitrogenous compound in composting material, and the conversion of this compound to nitrite in the environment by chemolithotrophic ammonia-oxidizing bacteria is an essential step in nitrogen cycling. Therefore, the distribution of ammonia-oxidizing members of the β subdivision of the class Proteobacteria in a variety of composting materials was assessed by amplifying 16S ribosomal DNA (rDNA) and 16S rRNA by PCR and reverse transcriptase PCR (RT-PCR), respectively. The PCR and RT-PCR products were separated by denaturing gradient gel electrophoresis (DGGE) and were identified by hybridization with a hierarchical set of oligonucleotide probes designed to detect ammonia oxidizer-like sequence clusters in the genera Nitrosospira and Nitrosomonas. Ammonia oxidizer-like 16S rDNA was detected in almost all of the materials tested, including industrial and experimental composts, manure, and commercial biofertilizers. A comparison of the DGGE and hybridization results after specific PCR and RT-PCR suggested that not all of the different ammonia oxidizer groups detected in compost are equally active. amoA, the gene encoding the active-site-containing subunit of ammonia monooxygenase, was also targeted by PCR, and template concentrations were estimated by competitive PCR. Detection of ammonia-oxidizing bacteria in the composts tested suggested that such materials may not be biologically inert with respect to nitrification and that the fate of nitrogen during composting and compost storage may be affected by the presence of these organisms. PMID:9925559

  18. Defining the Reference Condition for Wadeable Streams in the Sand Hills Subdivision of the Southeastern Plains Ecoregion, USA

    Science.gov (United States)

    Kosnicki, Ely; Sefick, Stephen A.; Paller, Michael H.; Jarrell, Miller S.; Prusha, Blair A.; Sterrett, Sean C.; Tuberville, Tracey D.; Feminella, Jack W.

    2014-09-01

    The Sand Hills subdivision of the Southeastern Plains ecoregion has been impacted by historical land uses over the past two centuries and, with the additive effects of contemporary land use, determining reference condition for streams in this region is a challenge. We identified reference condition based on the combined use of 3 independent selection methods. Method 1 involved use of a multivariate disturbance gradient derived from several stressors, method 2 was based on variation in channel morphology, and method 3 was based on passing 6 of 7 environmental criteria. Sites selected as reference from all 3 methods were considered primary reference, whereas those selected by 2 or 1 methods were considered secondary or tertiary reference, respectively. Sites not selected by any of the methods were considered non-reference. In addition, best professional judgment (BPJ) was used to exclude some sites from any reference class, and comparisons were made to examine the utility of BPJ. Non-metric multidimensional scaling indicated that use of BPJ may help designate non-reference sites when unidentified stressors are present. The macroinvertebrate community measures Ephemeroptera, Plecoptera, Trichoptera richness and North Carolina Biotic Index showed no differences between primary and secondary reference sites when BPJ was ignored. However, there was no significant difference among primary, secondary, and tertiary reference sites when BPJ was used. We underscore the importance of classifying reference conditions, especially in regions that have endured significant anthropogenic activity. We suggest that the use of secondary reference sites may enable construction of models that target a broader set of management interests.

  19. Industrial subdivisions in Aguascalientes State [Mexico]: Valley Region, potential spaces for development in the 21st Century

    Directory of Open Access Journals (Sweden)

    Héctor Daniel García Díaz

    2014-04-01

    Full Text Available The planning policies of the Mexican urban development oriented to the industrial activities implemented regionally and locally, have responded in different ways. The commitment to the sector led to the need to regulate urban growth and development as a substantial factor in achieving government strategies in the search for equitable sharing of national wealth and potential. The publication in 1976 of the General Law of Human Settlements born with this fundamental purpose. Excessive administrative burden of the Mexican social property and the need to insert in an increasingly globalizing economic activities led, in 1992 and 1994, respectively, the amendments to the Land Act and the signing of the Free Trade Agreement between North America, Canada, United States and Mexico. In the West Central Region, consisting of the metropolitan areas of Guadalajara, Zacatecas, San Luis Potosi, Queretaro, Guanajuato and Aguascalientes, spatial area in which a third of the country's inhabitants is based, and hosts the 100% extension territorial state of Aguascalientes, have been exploited discontinuously the natural and man-made resources available in the area. In the Valley of Aguascalientes, north-south strip of the state territory, have been authorized industrial subdivisions under plans and urban development programs that have accelerated or inhibited impulses, according to the vision and expectations of government power in turn; the different rhythms and changes of strategy applied to organize the disorder potential of the rural and urban environment express divergences in the reaches of consolidation and longed purposes. Research indicates and identifies the dynamics with which the last eight administrations of the Mexican State have acted in shaping the industrial potential of the Valley, which the south side hosts industrial city, Nissan I, Nissan II and Automotive Logistics Industrial Park, industrial settlements seeking to consolidate the region

  20. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  1. New schemes for particle accelerators

    International Nuclear Information System (INIS)

    Nishida, Y.

    1985-01-01

    In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here

  2. Id2 reinforces TH1 cell differentiation and inhibits E2A to repress TFH cell differentiation

    Science.gov (United States)

    Shaw, Laura A.; Bélanger, Simon; Omilusik, Kyla D.; Cho, Sunglim; Scott-Browne, James P.; Nance, J. Philip; Goulding, John; Lasorella, Anna; Lu, Li-Fan; Crotty, Shane; Goldrath, Ananda W.

    2016-01-01

    Differentiation of T helper (TH) effector subsets is critical for host protection. E protein transcription factors and Id proteins are important arbiters of T cell development, but their role in differentiation of TH1 and TFH cells is not well understood. TH1 cells showed robust Id2 expression compared to TFH cells, and RNAi depletion of Id2 increased TFH cell frequencies. Further, TH1 cell differentiation was blocked by Id2 deficiency, leading to E protein-dependent accumulation of effector cells with mixed characteristics during viral infection and severely impaired generation of TH1 cells following Toxoplasma gondii infection. The TFH-defining transcriptional repressor Bcl6 bound the Id2 locus, providing a mechanism for the bimodal Id2 expression and reciprocal development of TH1 and TFH cell fates. PMID:27213691

  3. The helix-loop-helix protein id1 controls stem cell proliferation during regenerative neurogenesis in the adult zebrafish telencephalon.

    Science.gov (United States)

    Rodriguez Viales, Rebecca; Diotel, Nicolas; Ferg, Marco; Armant, Olivier; Eich, Julia; Alunni, Alessandro; März, Martin; Bally-Cuif, Laure; Rastegar, Sepand; Strähle, Uwe

    2015-03-01

    The teleost brain has the remarkable ability to generate new neurons and to repair injuries during adult life stages. Maintaining life-long neurogenesis requires careful management of neural stem cell pools. In a genome-wide expression screen for transcription regulators, the id1 gene, encoding a negative regulator of E-proteins, was found to be upregulated in response to injury. id1 expression was mapped to quiescent type I neural stem cells in the adult telencephalic stem cell niche. Gain and loss of id1 function in vivo demonstrated that Id1 promotes stem cell quiescence. The increased id1 expression observed in neural stem cells in response to injury appeared independent of inflammatory signals, suggesting multiple antagonistic pathways in the regulation of reactive neurogenesis. Together, we propose that Id1 acts to maintain the neural stem cell pool by counteracting neurogenesis-promoting signals. © 2014 AlphaMed Press.

  4. Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors

    Directory of Open Access Journals (Sweden)

    Ali A. Yassin

    2016-07-01

    Full Text Available In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu–Zhu–Feng scheme and indicate many shortcomings in their scheme. Impersonation attacks and insider attacks could be effective. To overcome these drawbacks, we propose a secure biometric-based remote authentication scheme using biometric characteristics of hand-geometry, which is aimed at withstanding well-known attacks and achieving good performance. Furthermore, our work contains many crucial merits such as mutual authentication, user anonymity, freely chosen passwords, secure password changes, session key agreements, revocation by using personal biometrics, and does not need extra device or software for hand geometry in the login phase. Additionally, our scheme is highly efficient and withstands existing known attacks like password guessing, server impersonation, insider attacks, denial of service (DOS attacks, replay attacks, and parallel-session attacks. Compared with the other related schemes, our work is powerful both in communications and computation costs.

  5. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  6. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  7. Combination of electron beam irradiation and thermal treatment to enhance the shelf-life of traditional Indian fermented food (Idli)

    Science.gov (United States)

    Mulmule, Manoj D.; Shimmy, Shankar M.; Bambole, Vaishali; Jamdar, Sahayog N.; Rawat, K. P.; Sarma, K. S. S.

    2017-02-01

    Idli, a steam-cooked breakfast food item consumed in India, is famous as a staple food for its spongy texture and unique fermented taste. Idli preparation is a time consuming process; although instant Idli pre-mixes as powder or batter are available in the market, they do not have the distinctive taste and aroma similar to the Idli prepared at home. Hence ready-to-eat (RTE) form of this food is in demand. Therefore, an attempt was made to prepare RTE Idli bearing similar taste as home-cooked Idli with an extended shelf-life of up to two months at an ambient temperature using Electron Beam Irradiation (EBI) at dosages 2.5 kGy, 5 kGy and 7.5 kGy and combination processing comprised of EBI dosage at 2.5 kGy and thermal treatment (80 °C for 20 min). The treated Idli's were microbiologically and sensorially evaluated at storage periods of zero day, 14 days, 30 days and 60 days. Idli's irradiated at 7.5 kGy and subjected to combination processing at 2.5 kGy and thermal treatment were shelf-stable for 60 days. 2.5 kGy and 5 kGy radiation dosages alone were not sufficient to preserve Idli samples for more than 14 days. Undesirable change in sensory properties of Idli was observed at an EBI dosage of 7.5 kGy. Sensory properties of combination processed Idli's were found to undergo minor change over the storage period. The present work suggests that lowest radiation dosage in combination with thermal treatment could be useful to achieve the extended shelf-life without considerably impairing the organoleptic quality of Ready-to-Eat Idli.

  8. Combination of electron beam irradiation and thermal treatment to enhance the shelf-life of traditional Indian fermented food (Idli)

    International Nuclear Information System (INIS)

    Mulmule, Manoj D.; Shimmy, Shankar M.; Bambole, Vaishali; Jamdar, Sahayog N.; Rawat, K.P.; Sarma, K.S.S.

    2017-01-01

    Idli, a steam-cooked breakfast food item consumed in India, is famous as a staple food for its spongy texture and unique fermented taste. Idli preparation is a time consuming process; although instant Idli pre-mixes as powder or batter are available in the market, they do not have the distinctive taste and aroma similar to the Idli prepared at home. Hence ready-to-eat (RTE) form of this food is in demand. Therefore, an attempt was made to prepare RTE Idli bearing similar taste as home-cooked Idli with an extended shelf-life of up to two months at an ambient temperature using Electron Beam Irradiation (EBI) at dosages 2.5 kGy, 5 kGy and 7.5 kGy and combination processing comprised of EBI dosage at 2.5 kGy and thermal treatment (80 °C for 20 min). The treated Idli's were microbiologically and sensorially evaluated at storage periods of zero day, 14 days, 30 days and 60 days. Idli's irradiated at 7.5 kGy and subjected to combination processing at 2.5 kGy and thermal treatment were shelf-stable for 60 days. 2.5 kGy and 5 kGy radiation dosages alone were not sufficient to preserve Idli samples for more than 14 days. Undesirable change in sensory properties of Idli was observed at an EBI dosage of 7.5 kGy. Sensory properties of combination processed Idli's were found to undergo minor change over the storage period. The present work suggests that lowest radiation dosage in combination with thermal treatment could be useful to achieve the extended shelf-life without considerably impairing the organoleptic quality of Ready-to-Eat Idli. - Highlights: • Idli (traditional Indian fermented food) was prepared in ready-to-eat (RTE) form. • Ready-to-eat Idli was then subjected to combination processing comprised of lowest irradiation dosage of 2.5 kGy with mild heat treatment to extend its shelf life. • Increase in hardness and decrease in brightness of combination processed Idli was observed. • Combination processed Idli was microbiologically safe and

  9. [Clinical Significance of ID4 Gene Mehtylation in Demethylation-Treated MDS Cell Line and 2 MDS Patients].

    Science.gov (United States)

    Kang, Hui-Yuan; Wang, Xin-Rong; Gao, Li; Wang, Wei; Li, Mian-Yang; Wang, Li-Li; Wang, Cheng-Bin; Yu, Li

    2015-04-01

    To evaluate significance of ID4 gene mehtylation in demethylating myelodysplastic syndrome(MDS) cell Line MUTZ1 and 2 patients with MDS. The methylation-specific PCR (MS-PCR) and reverse transcription-PCR (RT-PCR) were applied to identify the methylation status and gene expression of ID4 gene in MDS cell line MUTZ1, a patient with aplastic anemia(AA) and a donor with normal bone marrow (NBM). RT-PCR was applied to detect the ID4 gene expression status in MUTZ1 cell line treated with decitabine at 3 different concentrations. Then bisulfite sequencing PCR (BSP) was applied to detect ID4 gene methylation status in 2 MDS parients treated with decitabine. The MDS cell line MUTZ-1 displayed a complete methylation of ID4 gene promoter with little mRNA expression. Inversely, bone marrow of an AA patient and NBM showed complete unmethylation of this gene with intensity mRNA expression. With the increase of decitabine concentration, ID4 gene mRNA expression was more and more increased. After decitabine treatment, ID4 gene methylation-positive frequencies of both the 2 MDS patients were much more decreased than that of the first treatment. So, ID4 gene mRNA expression inhibited by promoter hypemethylation could be recovered by using demethylation medicine. ID4 as a new potential anti-oncogene suggests that its methylation may become a marker for selection and assessment of therapeutic schedules in patients with MDS.

  10. 78 FR 23952 - Notice of Temporary Closure on Public Lands in Elmore County, ID

    Science.gov (United States)

    2013-04-23

    ...] Notice of Temporary Closure on Public Lands in Elmore County, ID AGENCY: Bureau of Land Management, Interior. ACTION: Notice of temporary closure. SUMMARY: Notice is hereby given that the Stout Fire closure to motorized vehicle use is in effect on public lands administered by the Four Rivers Field Office...

  11. 77 FR 14417 - Notice of Temporary Closure on Public Lands in Gooding and Elmore Counties, ID

    Science.gov (United States)

    2012-03-09

    ...] Notice of Temporary Closure on Public Lands in Gooding and Elmore Counties, ID AGENCY: Bureau of Land Management, Interior. ACTION: Notice of temporary closure. SUMMARY: Notice is hereby given that the Blair Fire closure to motorized vehicle use is in effect on public lands administered by the Four Rivers and...

  12. 78 FR 20135 - Notice of Temporary Closure on Public Lands in Boise County, ID

    Science.gov (United States)

    2013-04-03

    ...] Notice of Temporary Closure on Public Lands in Boise County, ID AGENCY: Bureau of Land Management, Interior. ACTION: Notice of Temporary Closure SUMMARY: Notice is hereby given that the Springs Fire closure to all human use is in effect on public lands administered by the Four Rivers Field Office, Bureau of...

  13. 76 FR 48877 - Kootenai National Wildlife Refuge, Boundary County, ID; Draft Comprehensive Conservation Plan and...

    Science.gov (United States)

    2011-08-09

    ..., Kootenai National Wildlife Refuge, 287 Westside Road, Bonners Ferry, ID 83805. Web site: http://www.fws.gov..., wildlife observation and photography, and environmental education and interpretation. We will review and... the auto tour route to provide for safety. Big game and upland game (grouse) hunting would be allowed...

  14. 77 FR 16556 - Kootenai National Wildlife Refuge, Boundary County, ID; Final Comprehensive Conservation Plan and...

    Science.gov (United States)

    2012-03-21

    ...: Dianna Ellis, Refuge Manager, Kootenai National Wildlife Refuge, 287 Westside Road, Bonners Ferry, ID..., wildlife observation and photography, and environmental education and interpretation. We will review and... safety. Allowing big game and upland game (grouse) hunting on the 295 acres of timber on the west side of...

  15. OpenID Connect as a security service in cloud-based medical imaging systems.

    Science.gov (United States)

    Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter

    2016-04-01

    The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as "Kerberos of cloud." We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model.

  16. Drug evaluation: FavId, a patient-specific idiotypic vaccine for non-Hodgkin's lymphoma.

    Czech Academy of Sciences Publication Activity Database

    Reiniš, Milan

    2007-01-01

    Roč. 9, č. 3 (2007), s. 291-298 ISSN 1464-8431 Institutional research plan: CEZ:AV0Z50520514 Keywords : non-Hodgkin's lymphoma * lymphoma vaccine FavId Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 2.526, year: 2007

  17. Typing of two Middle Eastern populations with the Precision ID Ancestry Panel

    DEFF Research Database (Denmark)

    Truelsen, Ditte Mikkelsen; Farzad, Maryam Sharafi; Mogensen, Helle Smidt

    2017-01-01

    , Turkish and Iranian individuals were SNP typed with Massively Parallel Sequencing with the Precision ID Ancestry Panel (Thermo Fisher Scientific) to assess whether it was possible to differentiate geographically proximate populations in the Middle East using this kit. Analyses showed that it were...

  18. Karikaturist Aivar Juhanson näitab KuKu klubis oma töid

    Index Scriptorium Estoniae

    2009-01-01

    Loit Jõekalda kureeritud joonistustriennaali raames eksponeerivad oma töid Ave Avalo, Kärt Hammer, Eero Ijavoinen, Kristjan Kittus, Mari-Liis Laanemaa, Triinu Lille, Valli Lember-Bogatkina jpt. kunstnikud. Ajalehe "Eesti Ekspress" karikaturisti Aivar Juhansoni tööde näitus Tallinnas KuKu klubis

  19. Use of false ID cards and other deceptive methods to purchase alcoholic beverages during high school.

    Science.gov (United States)

    Schwartz, R H; Farrow, J A; Banks, B; Giesel, A E

    1998-01-01

    Altered motor vehicle drivers's licenses or other falsified or counterfeit photo identification cards are widely and illegally used by teenagers to obtain beer and other alcohol beverages. We obtained information on the methods currently used by teenagers to purchase beer and wine by asking nine hundred teenagers, between 16-19 years old to complete a brief, confidential questionnaire. High school students most often obtained alcoholic beverages by requesting someone of legal age to purchase it for them. College students used borrowed, altered, or counterfeit identification (ID) more often than high school students. Photo IDs purchased through mail order from a magazine advertisement were used infrequently and when use was attempted, they were sometimes (25%) unsuccessful. Fifteen percent of high school students, 14% of college freshmen, and 24% of teenage drug abusers were able to purchase beer by the case with borrowed, altered, or fake ID. Suggestions to reduce sales of alcohol-containing beverages to minors include universal "carding" of prospective purchasers, use of two view or hologram photos on a drivers' license, requiring three different ID cards at the point of purchase, and penalties to stores that fail to make a good effort to identify underage customers.

  20. Assessment of the relationship between ACE I/D gene polymorphism and renal allograft survival.

    Science.gov (United States)

    Yang, Chun-Hua; Lu, Yi; Chen, Xue-Xia; Xian, Wen-Feng; Tu, Wei-Feng; Li, Hong-Yan

    2015-12-01

    The relationship between the angiotensin-converting enzyme (ACE) insertion/deletion (I/D) gene polymorphism and renal allograft survival after renal transplantation from the published reports are still debatable. This study was performed to evaluate the relationship between the ACE I/D gene polymorphism and renal allograft survival after renal transplantation using meta-analysis. Eligible studies were identified from PubMed and Cochrane Library on 1 November 2014, and eligible studies were recruited and synthesized using a meta-analysis methodology. Twelve investigations were included in this meta-analysis for the assessment of the relationship between the ACE I/D gene polymorphism and renal allograft survival. In this meta-analysis, the ACE I/D gene polymorphism was not associated with renal allograft survival after renal transplantation for overall populations, Caucasians, Brazilians and Africans. Interestingly, the ACE D allele and DD genotype were associated with renal allograft survival after renal transplantation in the Asian population. ACE D allele and DD genotype were associated with renal allograft survival after renal transplantation in the Asian population. However, more studies should be performed to confirm this association. © The Author(s) 2015.

  1. Hizbollah lubab : "Me tahame ameeriklastega häid suhteid" / Mohamad Afif ; interv. Ivar Soopan

    Index Scriptorium Estoniae

    Afif, Mohamad

    2005-01-01

    Liibanoni shiiitide organisatsiooni Hizbollah meediasuhete direktor ütleb, et Hizbollah ei ole terroriorganisatsioon. Religioosse ja poliitilise grupina tahab Hizbollah häid suhteid teistega kõikjal maailmas, kuid probleem on poliitikas, selles, kuidas USA suhtub nende regiooni, tõekspidamistesse

  2. Design of Distortion-Invariant Optical ID Tags for Remote Identification and Verification of Objects

    Science.gov (United States)

    Pérez-Cabré, Elisabet; Millán, María Sagrario; Javidi, Bahram

    Optical identification (ID) tags [1] have a promising future in a number of applications such as the surveillance of vehicles in transportation, control of restricted areas for homeland security, item tracking on conveyor belts or other industrial environment, etc. More specifically, passive optical ID tag [1] was introduced as an optical code containing a signature (that is, a characteristic image or other relevant information of the object), which permits its real-time remote detection and identification. Since their introduction in the literature [1], some contributions have been proposed to increase their usefulness and robustness. To increase security and avoid counterfeiting, the signature was introduced in the optical code as an encrypted function [2-5] following the double-phase encryption technique [6]. Moreover, the design of the optical ID tag was done in such a way that tolerance to variations in scale and rotation was achieved [2-5]. To do that, the encrypted information was multiplexed and distributed in the optical code following an appropriate topology. Further studies were carried out to analyze the influence of different sources of noise. In some proposals [5, 7], the designed ID tag consists of two optical codes where the complex-valued encrypted signature was separately introduced in two real-valued functions according to its magnitude and phase distributions. This solution was introduced to overcome some difficulties in the readout of complex values in outdoors environments. Recently, the fully phase encryption technique [8] has been proposed to increase noise robustness of the authentication system.

  3. What's Going on in Your Professor's Head? Demonstrating the Id, Ego, and Superego

    Science.gov (United States)

    Segrist, Dan J.

    2009-01-01

    This article describes an in-class activity designed to demonstrate Freud's structural theory of the psyche, specifically the roles of the id, ego, and superego, as well as the interplay among them. Additionally, the activity visually illustrates Freud's ideas about the levels of consciousness associated with these 3 components. Pre-post quiz…

  4. External validity of the Indonesian Wechsler Adult Intelligence Scale - Fourth edition (WAIS-IV-ID)

    NARCIS (Netherlands)

    Suwartono, C.; Hidajat, L.L.; Halim, M.S.; Hendriks, M.P.H.; Kessels, R.P.C.

    2016-01-01

    The Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV-ID) has been adapted and proved to be valid for its internal structure for Indonesian population. The same structure found as in the American WAIS-IV (WAIS-IV-US; Suwartono, Hendriks, Hidajat, Halim, & Kessels, 2015). Despite its strong

  5. Identification of an active ID-like group of SINEs in the mouse.

    Science.gov (United States)

    Kass, David H; Jamison, Nicole

    2007-09-01

    The mouse genome consists of five known families of SINEs: B1, B2, B4/RSINE, ID, and MIR. Using RT-PCR we identified a germ-line transcript that demonstrates 92.7% sequence identity to ID (excluding primer sequence), yet a BLAST search identified numerous matches of 100% sequence identity. We analyzed four of these elements for their presence in orthologous genes in strains and subspecies of Mus musculus as well as other species of Mus using a PCR-based assay. All four analyzed elements were identified either only in M. musculus or exclusively in both M. musculus and M. domesticus, indicative of recent integrations. In conjunction with the identification of transcripts, we present an active ID-like group of elements that is not derived from the proposed BC1 master gene of ID elements. A BLAST of the rat genome indicated that these elements were not in the rat. Therefore, this family of SINEs has recently evolved, and since it has thus far been observed mainly in M. musculus, we refer to this family as MMIDL.

  6. Angiotensin-I converting enzyme gene and I/D polymorphism ...

    Indian Academy of Sciences (India)

    Angiotensin-I converting enzyme gene and I/D polymorphism distribution in the Greek population and a comparison with other European populations. Sekerli Eleni Katsanidis Dimitrios Papadopoulou Vaya Makedou Areti Vavatsi Norma Gatzola Magdalini. Research Note Volume 87 Issue 1 April 2008 pp 91-93 ...

  7. Angiotensin-converting enzyme gene I/D polymorphism in Pakistani ...

    African Journals Online (AJOL)

    The frequency of DD allele in SLE patients with lupus nephritis is 100%, Sjogren's syndrome 100%, Raynaud's phenomenon 88.88%, and with rheumatoid arthritis it is 78.94%. The frequency of ID allele in SLE patients with Raynaud's phenomenon is 5.55%, and with rheumatoid arthritis it is 10.52%. The frequency of II ...

  8. OpenID connect as a security service in Cloud-based diagnostic imaging systems

    Science.gov (United States)

    Ma, Weina; Sartipi, Kamran; Sharghi, Hassan; Koff, David; Bak, Peter

    2015-03-01

    The evolution of cloud computing is driving the next generation of diagnostic imaging (DI) systems. Cloud-based DI systems are able to deliver better services to patients without constraining to their own physical facilities. However, privacy and security concerns have been consistently regarded as the major obstacle for adoption of cloud computing by healthcare domains. Furthermore, traditional computing models and interfaces employed by DI systems are not ready for accessing diagnostic images through mobile devices. RESTful is an ideal technology for provisioning both mobile services and cloud computing. OpenID Connect, combining OpenID and OAuth together, is an emerging REST-based federated identity solution. It is one of the most perspective open standards to potentially become the de-facto standard for securing cloud computing and mobile applications, which has ever been regarded as "Kerberos of Cloud". We introduce OpenID Connect as an identity and authentication service in cloud-based DI systems and propose enhancements that allow for incorporating this technology within distributed enterprise environment. The objective of this study is to offer solutions for secure radiology image sharing among DI-r (Diagnostic Imaging Repository) and heterogeneous PACS (Picture Archiving and Communication Systems) as well as mobile clients in the cloud ecosystem. Through using OpenID Connect as an open-source identity and authentication service, deploying DI-r and PACS to private or community clouds should obtain equivalent security level to traditional computing model.

  9. Mapping of Id locus for dermal shank melanin in a Chinese ...

    Indian Academy of Sciences (India)

    JIGUO XU

    2017-12-08

    Dec 8, 2017 ... Information on the SNPs used for the association analysis. ID. Position (galGal3) .... using Bio-Rad Manager software, and the data were nor- malized to the ..... This work was supported by the High Technology Research.

  10. Angiotensin-converting enzyme gene I/D polymorphism in Pakistani ...

    African Journals Online (AJOL)

    hope&shola

    two were the cases of antiphospholipid syndrome. Parsa et al. (2002) conducted an association of 3 polymor- phisms in angiotensin-converting enzyme including I/D polymorphism and 2 polymorphisms were associated with systemic lupus erythematosus and Lupus Nephritis among non-Caucasians that includes Hispanic, ...

  11. Support and Self-Efficacy among Latino and White Parents of Children with ID

    Science.gov (United States)

    Cohen, Shana R.; Holloway, Susan D.; Dominguez-Pareto, Irenka; Kuppermann, Miriam

    2015-01-01

    Research indicates that mothers of children with ID who receive familial support experience less stress than those who receive less support. Less is known about the relation of support to mothers' evaluation of parenting self-efficacy, particularly in Latino families. We examined the relationship of different types of family support to life…

  12. 77 FR 13072 - Salmon-Challis National Forest, Butte, Custer and Lemhi Counties, ID, Supplemental Environmental...

    Science.gov (United States)

    2012-03-05

    ... DEPARTMENT OF AGRICULTURE Forest Service Salmon-Challis National Forest, Butte, Custer and Lemhi Counties, ID, Supplemental Environmental Impact Statement to the 2009 Salmon- Challis National Forest... of intent to prepare a supplemental environmental impact statement. SUMMARY: The Salmon-Challis...

  13. 76 FR 36896 - Salmon-Challis National Forest, ID; Forestwide Invasive Plant Treatment Environmental Impact...

    Science.gov (United States)

    2011-06-23

    ... DEPARTMENT OF AGRICULTURE Forest Service Salmon-Challis National Forest, ID; Forestwide Invasive... to the biological diversity and ecological integrity within and outside the Salmon-Challis National... loss of recreational opportunities. Within the 3,108,904 acres of the of the Salmon-Challis National...

  14. Attachment quality of children with ID and its link to maternal sensitivity and structuring.

    Science.gov (United States)

    Feniger-Schaal, Rinat; Joels, Tirtsa

    2018-05-01

    Attachment theory produced a fertile field of research and clinical application. Although the topic of attachment of children with intellectual disability (ID) has received increasing research attention over the past 15 years, the empirical evidence is still limited. We applied theoretical and empirical knowledge of parenting typically developing children to examine the mother-child relationship in the ID population. The aim was to examine maternal sensitivity and structuring and its association with children's attachment classification and their disability. Forty preschool children (mean age 47.25, range 26-75 months) with non-specific ID and their mothers participated in the study. The mean developmental age was 25.92 months (SD = 10.89), The DQ mean score was 55.45 (SD = 17.28). We assessed children's quality of attachment using the SSP and maternal interactive behavior using the Emotional Availability Scales. Forty percent of children showed secure attachment, and 32.5% showed disorganized attachment. Attachment classifications correlated significantly with maternal sensitivity and maternal structuring but not with the child's cognitive disability. The results point to the importance of maternal interactive behavior for children with ID. Clinical implication may consider interventions aiming to enhance maternal sensitivity and structuring to improve children's quality of attachment. Copyright © 2018 Elsevier Ltd. All rights reserved.

  15. VIPP-LD: A promising Video Feedback intervention program for parents with ID

    NARCIS (Netherlands)

    Hodes, M.W.; Kef, S.; Meppelder, H.M.; Schuengel, C.

    2012-01-01

    Aim: Parenting support has been shown to be of benefit to parents with intellectual disabilities (ID) on several outcomes; however, effects on parent-child interaction in the form of sensitive responsiveness and positive inductive discipline are still under debate. This study tested the effects of an

  16. 77 FR 55813 - Transition of DOE-ID Public Reading Room

    Science.gov (United States)

    2012-09-11

    ... to the INL Research Library at 1776 Science Center Drive, Idaho Falls, ID 83401, beginning September 1, 2012. Access to documents will also be electronically accessible through the World Wide Web. For direction in accessing documents electronically through the World Wide Web, please refer to the Idaho...

  17. Identification of clinical yeasts by Vitek MS system compared with API ID 32 C.

    Science.gov (United States)

    Durán-Valle, M Teresa; Sanz-Rodríguez, Nuria; Muñoz-Paraíso, Carmen; Almagro-Moltó, María; Gómez-Garcés, José Luis

    2014-05-01

    We performed a clinical evaluation of the Vitek MS matrix-assisted laser desorption ionization-time-of-flight mass spectrometry (MALDI-TOF MS) system with the commercial database version 2.0 for rapid identification of medically important yeasts as compared with the conventional phenotypic method API ID 32 C. We tested 161 clinical isolates, nine isolates from culture collections and five reference strains. In case of discrepant results or no identification with one or both methods, molecular identification techniques were employed. Concordance between both methods was observed with 160/175 isolates (91.42%) and misidentifications by both systems occurred only when taxa were not included in the respective databases, i.e., one isolate of Candida etchellsii was identified as C. globosa by Vitek MS and two isolates of C. orthopsilosis were identified as C. parapsilosis by API ID 32 C. Vitek MS could not identify nine strains (5.14%) and API ID 32 C did not identify 13 (7.42%). Vitek MS was more reliable than API ID 32 C and reduced the time required for the identification of clinical isolates to only a few minutes.

  18. 76 FR 43196 - Implementation of the Truth in Caller ID Act

    Science.gov (United States)

    2011-07-20

    ... National Network to End Domestic Violence (NNEDV) that the term ``harm'' is a broad concept that... evolution of technology, and the consequences of spoofing ANI and pseudo-ANI, we find that the delivery of... ID spoofing to protect victims of domestic violence. According to NNEDV, a verification requirement...

  19. Validation of the Inventory of Depressive Symptomatology (IDS) in Cocaine Dependent Inmates.

    Science.gov (United States)

    Suris, Alina; Kashner, T. Michael; Gillaspy, James A., Jr.; Biggs, Melanie; Rush, A. John

    2001-01-01

    While the reliability and validity of Inventory of Depressive Symptomatology (IDS) scores have been established with outpatient adults being treated in community psychiatric clinics, it has not been used in special or dually diagnosed populations. Establishes internal consistency, concurrent validity, and construct validity for both the clinical…

  20. The Id, Ego and Super-Ego in "Pride and Prejudice"

    Science.gov (United States)

    Liang, Yamin

    2011-01-01

    This paper mainly analyses the the id, ego, and super-ego which exists in the main character Elizabeth from several aspects, such as her pursuit for love, her prejudice towards Mr. Darcy, and the changes in her attitudes towards Wickham. This analysis helps readers appreciate this masterpiece from a different aspect which is related to the…

  1. Determination of Trace Elements in Uranium by HPLC-ID-ICP-MS: NTNFC Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Manard, Benjamin Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wylie, Ernest Miller II [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Xu, Ning [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Tandon, Lav [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-10-19

    This report covers the FY 16 effort for the HPLC-ID-ICP-MS methodology 1) sub-method validation for the group I&II elements, 2) sub-method stood-up and validation for REE, 3) sub-method development for the transition element, and 4) completion of a comprehensive SOP for three families of elements.

  2. 76 FR 12753 - Notice of Temporary Closures on Public Lands in Ada and Elmore Counties, ID

    Science.gov (United States)

    2011-03-08

    ... DEPARTMENT OF THE INTERIOR Bureau of Land Management [LLIDB00200 LF20000ES.JS0000 LFESFTF60000] Notice of Temporary Closures on Public Lands in Ada and Elmore Counties, ID AGENCY: Bureau of Land... business hours. SUPPLEMENTARY INFORMATION: The Big Fire closure affects public lands located in Ada County...

  3. Decoupling schemes for the SSC Collider

    International Nuclear Information System (INIS)

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper

  4. Renormalization scheme-invariant perturbation theory

    International Nuclear Information System (INIS)

    Dhar, A.

    1983-01-01

    A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)

  5. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  6. Événement, idéologie et utopie

    Directory of Open Access Journals (Sweden)

    Jean-Luc AMALRIC

    2014-12-01

    Full Text Available RESUMEL’hypothèse que tente d’esquisser cet article est que l’idée ricœurienne d’une médiatisation dynamique des contradictions de l’imaginaire social présuppose une corrélation originaire de l’idéologie et de l’utopie qui ne peut elle-même être comprise qu’à partir de l’événement de l’institution d’un imaginaire social constituant. Dans un premier temps, l’article s’efforce de cerner ce qui fait la spécificité de la théorie ricœurienne de l’idéologie et de l’utopie comme « pratiques imaginatives », en soulignant à ce titre l’influence déterminante des thèses de Jacques Ellul sur l’idéologie. Puis, dans un second temps, il s’engage dans une analyse régressive qui conduit de la réappropriation ricœurienne de la conception dialectique de l’idéologie et de l’utopie exposée par Mannheim à l’idée d’un fondement événementiel de ces deux formes opposées de l’imaginaire social.Mots-Clés : Evénement, idéologie, utopie, Ellul, Mannheim. ABSTRACTThis paper attempts to sketch out the hypothesis that the Ricœurian conception of a dynamic mediatization of the contradictions of the social imaginary presupposes an original correlation between ideology and utopia, which can itself be understood only from the event that institutes a constitutive social imaginary. The first part of the paper marks out the specificity of the Ricœurian theory of ideology and utopia in terms of “imaginative practices”, underlining the determining influence of Jacques Ellul’s theses on ideology. The second part tries to develop a regressive argument, starting from the Ricœurian re-appropriation of Mannheim’s dialectical conception of ideology and utopia, and leading back to the idea of an event foundation for these two opposed forms of the social imaginary.Keywords : Event, Ideology, Utopia, Ellul, Mannheim   

  7. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  8. On the validity of Ksub(Id)-measurements in instrumented impact tests

    International Nuclear Information System (INIS)

    Kalthoff, J.F.; Winkler, S.; Klemm, W.; Beinert, J.

    1979-01-01

    The influence of inertia effects in determining the dynamic fracture toughness Ksub(Id) by instrumented impact testing is investigated. Model experiments in the brittle fracture regime are carried out with precracked bend specimens machined from the epoxy resin Araldite B. As is usual in these tests, the loads at the tup of the impinging striker are recorded as a function of time during the impact process. For reference purposes, the dynamic fracture toughness value Ksub(Id)sup(m1) is derived from the measured maximum load utilizing static stress intensity factor formulas. In addition to this conventional procedure, the actual stress intensity factors are measured directly at the tip of the crack by means of the shadow optical method of caustics applied in combination with high speed photography. The critical value of these optically measured stress intensity factors (for onset of crack propagation), Ksub(Id)sup(opt), is the true dynamic fracture toughness. In the experiments, the specimen size and the impact velocity were varied. In accordance with expectations, it is found that the hammer load signal is not correlated with the actual crack tip stress intensity factor values by a simple proportionality. The conventionally determined Ksub(Id)sup(m1)-value overestimates the true dynamic fracture toughness Ksub(Id)sup(opt). This overestimation becomes larger for larger specimen sizes and larger impact velocities. The results demonstrate the dominating influence inertia effects can have on hammer load measurements and emphasize the importance of eliminating these effects in order to determine non-erroneous dynamic fracture toughness values. (orig.)

  9. ASSOCIATION OF ACTN3 R577X AND ACE I/D POLYMORPHISMS IN BRAZILIANS WRESTLERS

    Directory of Open Access Journals (Sweden)

    Marcelo Romanovitch Ribas

    Full Text Available ABSTRACT Introduction: By associating genetics and sport, it is possible to identify subjects with greater capacity to adapt to training, and lower chances of injury. Objective: The investigation evaluated the genotypic and allelic distribution of ACTN3 R577X and ACE I/D polymorphisms in Brazilian high-performance athletes in wrestling and percussion combat sports. Methods: The study included 37 male athletes ranked from first to third place in world scenarios, divided into two groups: wrestling (23 wrestlers, being 11 of Judo, 4 of Greco-Roman style, 8 of Brazilian Jiu Jitsu, with mean age of 27.3 ± 6.9 years and percussion combat sports (14 athletes with a mean age of 25.7±4.4 years, being 6 of Karate, 3 of Muay Thai, 4 of Taekwondo, 1 Boxing. Genotyping of ACTN3 and ACE I/D polymorphisms was performed by polymerase chain reaction (PCR from the genomic DNA. Genotypic and allelic distributions were compared with control populations and athletes by Chi-square test and Fisher’s exact test; all analyzes considered p ≤ 0.05. Results: The genotypic distributions and allelic frequencies of ACTN3 RR=46%, RX=38% and XX=16%; R=65% and X=35%, and ACE I/D DD=47.7%, ID=34.3% and II=20%; D=62.9% and I=37.1% did not differ from the control population; however, when compared with wrestling athletes a significant difference was observed. Conclusion: These results suggest an association of ACTN3 R577X and ACE I/D genes with Brazilian high-performance wrestling athletes.

  10. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  11. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...

  12. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.

  13. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  14. Acidicapsa borealis gen. nov., sp. nov. and Acidicapsa ligni sp. nov., subdivision 1 Acidobacteria from Sphagnum peat and decaying wood.

    Science.gov (United States)

    Kulichevskaya, Irina S; Kostina, Lilia A; Valásková, Vendula; Rijpstra, W Irene C; Damsté, Jaap S Sinninghe; de Boer, Wietse; Dedysh, Svetlana N

    2012-07-01

    Two strains of subdivision 1 Acidobacteria, a pink-pigmented bacterium KA1(T) and a colourless isolate WH120(T), were obtained from acidic Sphagnum peat and wood under decay by the white-rot fungus Hyploma fasciculare, respectively. Cells of these isolates were Gram-negative-staining, non-motile, short rods, which were covered by large polysaccharide capsules and occurred singly, in pairs, or in short chains. Strains KA1(T) and WH120(T) were strictly aerobic mesophiles that grew between 10 and 33 °C, with an optimum at 22-28 °C. Both isolates developed under acidic conditions, but strain WH120(T) was more acidophilic (pH growth range 3.5-6.4; optimum, 4.0-4.5) than strain KA1(T) (pH growth range 3.5-7.3; optimum , 5.0-5.5). The preferred growth substrates were sugars. In addition, the wood-derived isolate WH120(T) grew on oxalate, lactate and xylan, while the peat-inhabiting acidobacterium strain KA1(T) utilized galacturonate, glucuronate and pectin. The major fatty acids were iso-C(15:0) and iso-C(17:1)ω8c; the cells also contained significant amounts of 13,16-dimethyl octacosanedioic acid. The quinone was MK-8. The DNA G+C contents of strains KA1(T) and WH120(T) were 54.1 and 51.7 mol%, respectively. Strains KA1(T) and WH120(T) displayed 97.8% 16S rRNA gene sequence similarity to each other. The closest recognized relatives were Acidobacterium capsulatum and Telmatobacter bradus (93.4-94.3% 16S rRNA gene sequence similarity). These species differed from strains KA1(T) and WH120(T) by their ability to grow under anoxic conditions, the absence of capsules, presence of cell motility and differing fatty acid composition. Based on these differences, the two new isolates are proposed as representing a novel genus, Acidicapsa gen. nov., and two novel species. Acidicapsa borealis gen. nov., sp. nov. is the type species for the new genus with strain KA1(T) (=DSM 23886(T)=LMG 25897(T)=VKM B-2678(T)) as the type strain. The name Acidicapsa ligni sp. nov. is proposed for

  15. REMINDER: Saved Leave Scheme (SLS)

    CERN Multimedia

    2003-01-01

    Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...

  16. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  17. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    We investigate adjacency labeling schemes for graphs of bounded degree Δ = O(1). In particular, we present an optimal (up to an additive constant) log n + O(1) adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar...... graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  18. [Comparison of Phoenix™ Yeast ID Panel and API® ID 32C commercial systems for the identification of Candida species isolated from clinical samples].

    Science.gov (United States)

    Gayibova, Ülkü; Dalyan Cılo, Burcu; Ağca, Harun; Ener, Beyza

    2014-07-01

    Opportunistic fungal pathogens are one of the important causes of nosocomial infections, and several different types of yeasts, especially Candida species are increasingly recovered from immunocompromised patients. Since many of the yeasts are resistant to the commonly used antifungal agents, the introduction of appropriate therapy depends on rapid and accurate identification. The aims of this study were to compare the commercial identification systems namely API® ID 32C (bioMerieux, France) and Phoenix™ Yeast ID Panel (Becton Dickinson Diagnostics, USA) for the identification of Candida species and to evaluate the effect of morphological findings in the identification process. A total of 211 yeast strains isolated from different clinical samples (111 urine, 34 blood/vascular catheter, 27 upper/lower respiratory tract, 16 abscess/pus, 13 throat/vagina swabs and 10 sterile body fluids) of 137 patients hospitalized in Uludag University Health and Research Center between October 2013 to January 2014, were included in the study. Samples were cultured on blood agar, chromogenic agar (CHROMagar Candida, BD, USA) and Saboraud's dextrose agar (SDA), and isolated yeast colonies were evaluated with germ tube test and morphological examination by microscopy on cornmeal/Tween-80 agar. The isolates were identified as well by two commercial systems according to the manufacturers' recommendations. Discrepant results between the systems were tried to be resolved by using morphological characteristics of the yeasts. Of the isolates 159 were identified identical by both of the systems, and the concordance between those systems were estimated as 75.4%. According to the concordant identification, the most frequently isolated species was C.albicans (44.1%) followed by C.tropicalis (9.9%), C.glabrata (9.5%), C.parapsilosis (8.5%) and C.kefyr (8.1%). The concordance rate was 81.7% in identification of frequently isolated species (C.albicans, C.tropicalis, C.parapsilosis, C.glabrata, C

  19. Development and Psychometric Properties of an Assessment for Persons with Intellectual Disability--The InterRAI ID

    Science.gov (United States)

    Martin, Lynn; Hirdes, John P.; Fries, Brant E.; Smith, Trevor F.

    2007-01-01

    This paper describes the development of the interRAI-Intellectual Disability (interRAI ID), a comprehensive instrument that assesses all key domains of interest to service providers relative to a person with an intellectual disability (ID). The authors report on the reliability and validity of embedded scales for cognition, self-care, aggression,…

  20. 77 FR 55800 - Foreign-Trade Zone 242-Boundary County, ID; Application for Subzone AREVA Enrichment Services...

    Science.gov (United States)

    2012-09-11

    ... DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [B-68-2012] Foreign-Trade Zone 242--Boundary County, ID; Application for Subzone AREVA Enrichment Services, LLC; Bonneville County, ID An application... FTZ 242, requesting special-purpose subzone status for the facility of AREVA Enrichment Services, LLC...

  1. Limited concordance between teachers, parents and healthcare professionals on the presence of chronic diseases in ID-adolescents

    NARCIS (Netherlands)

    Oeseburg, B.; Jansen, D. E. M. C.; Reijneveld, S. A.; Dijkstra, G. J.; Groothoff, J. W.

    2010-01-01

    Evidence on teachers' knowledge about somatic and mental chronic diseases among ID-adolescent compared to the knowledge parents and healthcare professionals have, is limited. The aim of this study is: (1) to assess the knowledge of teachers on the presence of chronic diseases in ID-adolescents; (2)

  2. Id1 expression promotes peripheral CD4{sup +} T cell proliferation and survival upon TCR activation without co-stimulation

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Chen; Jin, Rong [Department of Immunology, Peking University Health Science Center, Beijing (China); Wang, Hong-Cheng [Oklahoma Medical Research Foundation, Oklahoma City, OK (United States); Tang, Hui; Liu, Yuan-Feng; Qian, Xiao-Ping; Sun, Xiu-Yuan; Ge, Qing [Department of Immunology, Peking University Health Science Center, Beijing (China); Sun, Xiao-Hong, E-mail: sunx@omrf.org [Oklahoma Medical Research Foundation, Oklahoma City, OK (United States); Zhang, Yu, E-mail: zhangyu007@bjmu.edu.cn [Department of Immunology, Peking University Health Science Center, Beijing (China)

    2013-06-21

    Highlights: •Id1 expression enables naïve T cell proliferation without anti-CD28 co-stimulation. •Id1 expression facilitates T cells survival when stimulated with anti-CD3. •Elevation of IL-2 production by Id1 contributes increased proliferation and survival. •Id1 potentiates NF-κB activation by anti-CD3 stimulation. -- Abstract: Although the role of E proteins in the thymocyte development is well documented, much less is known about their function in peripheral T cells. Here we demonstrated that CD4 promoter-driven transgenic expression of Id1, a naturally occurring dominant-negative inhibitor of E proteins, can substitute for the co-stimulatory signal delivered by CD28 to facilitate the proliferation and survival of naïve CD4{sup +} cells upon anti-CD3 stimulation. We next discovered that IL-2 production and NF-κB activity after anti-CD3 stimulation were significantly elevated in Id1-expressing cells, which may be, at least in part, responsible for the augmentation of their proliferation and survival. Taken together, results from this study suggest an important role of E and Id proteins in peripheral T cell activation. The ability of Id proteins to by-pass co-stimulatory signals to enable T cell activation has significant implications in regulating T cell immunity.

  3. A functionally significant polymorphism in ID3 is associated with human coronary pathology.

    Directory of Open Access Journals (Sweden)

    Ani Manichaikul

    Full Text Available We previously identified association between the ID3 SNP rs11574 and carotid intima-media thickness in the Diabetes Heart Study, a predominantly White diabetic population. The nonsynonymous SNP rs11574 results in an amino acid substitution in the C-terminal region of ID3, attenuating the dominant negative function of ID3 as an inhibitor of basic HLH factor E12-mediated transcription. In the current investigation, we characterize the association between the functionally significant polymorphism in ID3, rs11574, with human coronary pathology.The Multi-Ethnic Study of Atherosclerosis (MESA is a longitudinal study of subclinical cardiovascular disease, including non-Hispanic White (n = 2,588, African American (n = 2,560 and Hispanic (n = 2,130 participants with data on coronary artery calcium (CAC. The Coronary Assessment in Virginia cohort (CAVA included 71 patients aged 30-80 years, undergoing a medically necessary cardiac catheterization and intravascular ultrasound (IVUS at the University of Virginia. ID3 SNP rs11574 risk allele was associated with the presence of CAC in MESA Whites (P = 0.017. In addition, the risk allele was associated with greater atheroma burden and stenosis in the CAVA cohort (P = 0.003, P = 0.04 respectively. The risk allele remained predictive of atheroma burden in multivariate analysis (Model 1: covariates age, gender, and LDL, regression coefficient = 9.578, SE = 3.657, p = 0.0110; Model 2: covariates Model 1, presence of hypertension, presence of diabetes, regression coefficient = 8.389, SE = 4.788, p = 0.0163.We present additional cohorts that demonstrate association of ID3 SNP rs11574 directly with human coronary artery pathology as measured by CAC and IVUS: one a multiethnic, relatively healthy population with low levels of diabetes and the second a predominantly White population with a higher incidence of T2DM referred for cardiac catheterization.

  4. What’s in a Name: A Comparative Analysis of the United States Real ID Act and the United Kingdom’s National Identity Scheme

    Science.gov (United States)

    2015-12-01

    Cards Bill into Parliament. A slightly different version was re-introduced in May 2005 after the general election .68 It passed in March and the...but its purpose was expanded over time.298 In 1945, it could be used to register to vote in the general election , and by 1952, 39 government...1989, designed to reduce violence at soccer matches in England and Wales, proposed a national membership system involving the creation of a

  5. Cross-cultural adaptation, reliability, and validation of the Korean version of the identification functional ankle instability (IdFAI).

    Science.gov (United States)

    Ko, Jupil; Rosen, Adam B; Brown, Cathleen N

    2017-09-12

    To cross-culturally adapt the Identification Functional Ankle Instability for use with Korean-speaking participants. The English version of the IdFAI was cross-culturally adapted into Korean based on the guidelines. The psychometric properties in the Korean version of the IdFAI were measured for test-retest reliability, internal consistency, criterion-related validity, discriminative validity, and measurement error 181 native Korean-speakers. Intra-class correlation coefficients (ICC 2,1 ) between the English and Korean versions of the IdFAI for test-retest reliability was 0.98 (standard error of measurement = 1.41). The Cronbach's alpha coefficient was 0.89 for the Korean versions of IdFAI. The Korean versions of the IdFAI had a strong correlation with the SF-36 (r s  = -0.69, p 10 was the optimal cutoff score to distinguish between the group memberships. The minimally detectable change of the Korean versions of the IdFAI score was 3.91. The Korean versions of the IdFAI have shown to be an excellent, reliable, and valid instrument. The Korean versions of the IdFAI can be utilized to assess the presence of Chronic Ankle Instability by researchers and clinicians working among Korean-speaking populations. Implications for rehabilitation The high recurrence rate of sprains may result into Chronic Ankle Instability (CAI). The Identification of Functional Ankle Instability Tool (IdFAI) has been validated and recommended to identify patients with Chronic Ankle Instability (CAI). The Korean version of the Identification of Functional Ankle Instability Tool (IdFAI) may be also recommend to researchers and clinicians for assessing the presence of Chronic Ankle Instability (CAI) in Korean-speaking population.

  6. Fragment separator momentum compression schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  7. Fragment separator momentum compression schemes

    International Nuclear Information System (INIS)

    Bandura, Laura; Erdelyi, Bela; Hausmann, Marc; Kubo, Toshiyuki; Nolen, Jerry; Portillo, Mauricio; Sherrill, Bradley M.

    2011-01-01

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  8. Electrical injection schemes for nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2013-01-01

    The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... of 3 InGaAsP QWs on an InP substrate has been chosen for the modeling. In the simulations the main focus is on the electrical and optical properties of the nanolasers i.e. electrical resistance, threshold voltage, threshold current and wallplug efficiency. In the current flow evaluation the lowest...... threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations...

  9. Scheme of thinking quantum systems

    International Nuclear Information System (INIS)

    Yukalov, V I; Sornette, D

    2009-01-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field

  10. Yellow light for green scheme

    International Nuclear Information System (INIS)

    Morch, Stein

    2004-01-01

    The article asserts that there could be an investment boom for wind, hydro and bio power in a common Norwegian-Swedish market scheme for green certificates. The Swedish authorities are ready, and the Norwegian government is preparing a report to the Norwegian Parliament. What are the ambitions of Norway, and will hydro power be included? A green certificate market common to more countries have never before been established and requires the solution of many challenging problems. In Sweden, certificate support is expected to promote primarily bioenergy, wind power and small-scale hydro power. In Norway there is an evident potential for wind power, and more hydro power can be developed if desired

  11. Pomeranchuk conjecture and symmetry schemes

    Energy Technology Data Exchange (ETDEWEB)

    Galindo, A.; Morales, A.; Ruegg, H. [Junta de Energia Nuclear, Madrid (Spain); European Organization for Nuclear Research, Geneva (Switzerland); University of Geneva, Geneva (Switzerland)

    1963-01-15

    Pomeranchuk has conjectured that the cross-sections for charge-exchange processes vanish asymptotically as the energy tends to infinity. (By ''charge'' it is meant any internal quantum number, like electric charge, hypercharge, .. . ). It has been stated by several people that this conjecture implies equalities among the total cross-sections whenever any symmetry scheme is invoked for the strong interactions. But to our knowledge no explicit general proof of this statement has been given so far. We want to give this proof for any compact Lie group. We also prove, under certain assumptions, that the equality of the total cross-sections implies that s{sup -l} times the charge-exchange forward scattering absorptive amplitudes tend to zero as s -> ∞.

  12. Application of game theory for the interpretation of inventory differences (ID)

    International Nuclear Information System (INIS)

    Moglewer, S.

    1978-01-01

    In a study performed by the Test and Evaluation Branch, Division of Safeguards, at the U.S. Nuclear Regulatory Commission with contract assistance from Lawrence Berkeley Laboratory, the validity of the ID concept for estabilishing assurance concerning possible unauthorized diversion of SNM was examined. The evaluation methodology was based upon the theory of games and produced results that were quite different from those derived by classical statistical hypothesis testing. A model was developed based upon a decision maker's utilities and solved for generic facilities. Based upon the value of ID, obtained from each inventory, and specific for each facility, there is a best policy for estimating unauthorized deliberate diversion and establishing action limits (alarm thresholds). This paper presents the results of this study as applied to a generic facility

  13. Le point de vue de la philosophie: L'entreprise idéologique

    OpenAIRE

    Pesqueux , Yvon

    2004-01-01

    Parler de l'entreprise conduit à questionner ce qui fonde le discours – scientifique ou médiatique – qui permette d'en parler. Et c'est bien en cela qu'il est nécessaire d'approfondir l'univers de l'idéologie et de la croyance qui est celui dans lequel modèle, image, métaphore et figure de l'entreprise plongent leurs racines dans la mesure où l'usage de ces notions, quand on les applique à l'entreprise, conduit à créer un monde qui soit cohérent avec ce qu'ils portent en eux. L'idéologie comm...

  14. ORCID Integration: Services to Create and Use ORCID IDs at KAUST

    KAUST Repository

    Grenz, Daryl M.

    2015-06-09

    As ORCID IDs become accepted as a global standard, the potential benefits to researchers and institutions of making use of them are multiplying. At King Abdullah University of Science and Technology (KAUST) we adopted the first institutional open access policy in the Arab region in June 2014 and are integrating with ORCID as part of services to researchers that improve the preservation and dissemination of their research. We started by using ORCID IDs to identify authors in our institutional repository. Our next step was to join ORCID as an institutional member and then set up a plan to support our faculty, researchers and students in the creation and use of ORCID identifiers. This presentation will look at the choices made and lessons learned during this process, focusing on the tools we developed to interact with the ORCID member API and the ways in which introducing ORCID has complemented other repository initiatives, such as the implementation of our institutional open access policy.

  15. Inspection of cup-shaped steel parts from the I.D. side using eddy current

    Science.gov (United States)

    Griffiths, Erick W.; Pearson, Lee H.

    2018-04-01

    An eddy current method was developed to inspect cup-shaped steel parts from the I.D. side. During the manufacturing process of these parts, a thin Al tape foil is applied to the I.D. side of the part. One of the critical process parameters is that only one foil layer can be applied. An eddy current inspection system was developed to reject parts with more than one foil layer. The Al tape foil is cut to length to fit the inner diameter, however, after application of the foil there is a gap created between the beginning and end of the foil. It was found that this gap interfered with the eddy current inspection causing a false positive indication. To solve this problem a sensor design and data analysis process were developed to overcome the effects of these gaps. The developed system incorporates simultaneous measurements from multiple eddy current sensors and signal processing to achieve a reliable inspection.

  16. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  17. Penerimaan Masyarakat terhadap Website P3M.Sidoarjokab.go.id

    OpenAIRE

    Ningrum, Dyah Ary Setya; Rochmaniah, Ainur

    2016-01-01

    This study aimed to describe community reception of website P3M.sidoarjokab.go.id. This research used descriptive qualitative method with in-depth interview technique. The focus of this research discussed perception, thinking, preference, interpretation, ease of use, easy of finding information, design of page, web traffic and search in website of Complaint Service Center (P3M). Data analysis technique in this research used interactive analysis, with five informant. The research found that P3...

  18. ASSOCIATION OF ACTN3 R577X AND ACE I/D POLYMORPHISMS IN BRAZILIANS WRESTLERS

    OpenAIRE

    Ribas, Marcelo Romanovitch; Oliveira Netto, Zair Candido; Salgueirosa, Fabiano; Fernandes, Priscila; Matos, Oslei de; Bassan, Julio Cesar

    2017-01-01

    ABSTRACT Introduction: By associating genetics and sport, it is possible to identify subjects with greater capacity to adapt to training, and lower chances of injury. Objective: The investigation evaluated the genotypic and allelic distribution of ACTN3 R577X and ACE I/D polymorphisms in Brazilian high-performance athletes in wrestling and percussion combat sports. Methods: The study included 37 male athletes ranked from first to third place in world scenarios, divided into two groups: wrestl...

  19. Angiotensin-converting enzyme I/D polymorphism in chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    Pabst S

    2009-12-01

    Full Text Available Abstract Study objective The etiology of chronic obstructive lung disease (COPD is unclear. It is supposed to be the product of an exogenous antigenic stimulus, such as tobacco smoke, and an endogenous genetic susceptibility. The angiotensin-converting enzyme (ACE gene contains a polymorphism based on the presence (insertion [I] or absence (deletion [D] of a 287-bp nonsense domain, resulting in three different genotypes (II, ID and DD. The aim of the study was to find out whether the ACE gene polymorphism can determine the course of COPD. Patients and design We genotyped 152 Caucasian patients with COPD and 158 healthy controls for the ACE (I/D polymorphism. We divided the COPD group into one group of 64 patients with a stable course of disease, defined as less than three hospitalizations over the last three years due to COPD, and another group of 88 patients with an instable course with more than three hospitalizations. Results The I-allele was significantly associated with an increased risk for COPD in a dominant model (OR 1.67 (95% CI 1.00 to 2.78, p = 0.048, but not in a recessive or co-dominant model. Moreover, the I-allele of ACE (I/D was significantly increased in patients with a stable course of COPD (p = 0.012 compared with controls. In a dominant model (II/ID v DD we found an even stronger association between the I-allele and a stable course of COPD (OR 3.24 (95% CI 1.44 to 7.31, p = 0.003. Conclusion These data suggest that the presence of an ACE I-allele determines a stable course of COPD.

  20. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R., E-mail: rodrigo.castro@visite.es [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Barbato, P. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Taliercio, C. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy)

    2011-10-15

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  1. British military operation at Sheikh Sa‘id in the First World War

    Directory of Open Access Journals (Sweden)

    Abdol Rauh Yaccob

    2017-09-01

    Full Text Available It is a difficult task to measure the importance of South West Arabia to the Ottomans and the British prior to and during World War I. Early history of imperial expansion in the area which followed by constant conflicts and involved a considerable amount of diplomacy and intrigues with the natives may suggest that South West Arabia was considered as equally as important to other areas within the empire. However from the beginning of the 20th century South West Arabia was considered something of a backwater. It may also be observed that during the First World War the position of South West Arabia to these powers in relation to other war theatres remained practically the same except in the episodes of British action at Sheikh Said and the Ottomans advance at Lahej. The Indian authorities who believed that the Ottomans were contemplating a move to Sheikh Sa‘id with the aim of acting against British Perim with the telegraphic communication, convoys and shipping, only two miles away, took the opportunity of the movement of the troops through the Red Sea to attack the fort of Sheikh Sa‘id. The action was quickly taken before obtaining official approval from the Admiralty and the India Office in London. The action was taken due to the persistent reports of the Ottoman reinforcement with guns had been sent to Sheikh Sa‘id, further to take advantage of the presence of transports with troops for Egypt. Subsequently future military operations at Sheikh Sa‘id and the Red Sea appeared to dominate the discussions among the authorities at the India Office, the Admiralty, the Indian authorities and the Resident at Aden throughout the war without materializing any further military action.

  2. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    International Nuclear Information System (INIS)

    Castro, R.; Barbato, P.; Vega, J.; Taliercio, C.

    2011-01-01

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  3. Implementing New-age Authentication Techniques using OpenID for Security Automation

    OpenAIRE

    Dharmendra Choukse; Umesh Kumar Singh; Deepak Sukheja; Rekha Shahapurkar

    2010-01-01

    Security of any software can be enhanced manifolds if multiple factors for authorization and authentication are used .The main aim of this work was to design and implement an Academy Automation Software for IPS Academy which uses OpenID and Windows CardSpace as Authentication Techniques in addition to Role Based Authentication (RBA) System to ensure that only authentic users can access the predefined roles as per their Authorization level. The Automation covers different computing hardware an...

  4. Minimization of Antinutrients in Idli by Using Response Surface Process Optimization

    NARCIS (Netherlands)

    Sharma, Anand; Kumari, Sarita; Nout, Martinus J.R.; Sarkar, Prabir K.

    2017-01-01

    Deploying response surface methodology, the stages of idli preparation were optimized for minimizing the level of antinutrients. Under optimum conditions of soaking blackgram dal (1:5 of dal and water at 16C, and pH 4.0 for 18 h) and rice (1:5 of rice and water at 16C, and pH 5.6 for 18 h), the

  5. Heat transfer through He II in a 9.6 m long 35 mm ID tube

    International Nuclear Information System (INIS)

    Caspi, S.; Schafer, R.V.

    1984-07-01

    The limiting heat flux at the onset of He I was measured in a 9.6 m long tube of 35 mm ID at a bath temperature between 1.8 K and T/sub lambda/ and a pressure of 1 atm. The measured limiting heat flux during axial heating is 50% more than end heating at the same bath temperature. Both cases agrees with the Gorter-Mellink mutual friction theory

  6. Development of Integral Effect Test Facility P and ID and Technical Specification for SMART Fluid System

    International Nuclear Information System (INIS)

    Lee, Sang Il; Jung, Y. H.; Yang, H. J.; Song, S. Y.; Han, O. J.; Lee, B. J.; Kim, Y. A.; Lim, J. H.; Park, K. W.; Kim, N. G.

    2010-01-01

    SMART integral test loop is the thermal hydraulic test facility with a high pressure and temperature for simulating the major systems of the prototype reactor, SMART-330. The objective of this project is to conduct the basic design for constructing SMART ITL. The major results of this project include a series of design documents, technical specifications and P and ID. The results can be used as the fundamental materials for making the detailed design which is essential for manufacturing and installing SMART ITL

  7. The development and psychometric evaluation of the Internet Disorder Scale (IDS-15).

    Science.gov (United States)

    Pontes, Halley M; Griffiths, Mark D

    2017-01-01

    Previously published research suggests that improvement in the assessment of Internet addiction (IA) is paramount in advancing the field. However, little has been done to address inconsistencies in the assessment of IA using a more updated framework. The aim of the present study was to develop a new instrument to assess IA based on a modification of the nine Internet Gaming Disorder (IGD) criteria as suggested by the American Psychiatric Association in the latest (fifth) edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM-5), and to provide a taxonomy of the potential risk of IA risk among participants. A heterogeneous sample of Internet users (n=1105) was recruited online (61.3% males, mean age 33years). Construct validity of the new instrument - Internet Disorder Scale (IDS-15) - was assessed by means of factorial, convergent, and discriminant validity. Criterion-related validity and reliability were also investigated. Additionally, latent profile analysis (LPA) was carried out to differentiate and characterize Internet users based on their potential IA risk. The construct and criterion-related validity of the IDS-15 were both warranted. The IDS-15 proved to be a valid and reliable tool. Using the LPA, participants were classed as "low addiction risk" (n=183, 18.2%), "medium addiction risk" (n=456, 41.1%), and "high addiction risk" (n=455, 40.77%). Furthermore, key differences emerged among these classes in terms of age, relationship status, cigarette consumption, weekly Internet usage, age of Internet use initiation, and IDS-15 total scores. The present findings support the viability of using adapted IGD criteria as a framework to assess IA. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. A non-parametric peak calling algorithm for DamID-Seq.

    Directory of Open Access Journals (Sweden)

    Renhua Li

    Full Text Available Protein-DNA interactions play a significant role in gene regulation and expression. In order to identify transcription factor binding sites (TFBS of double sex (DSX-an important transcription factor in sex determination, we applied the DNA adenine methylation identification (DamID technology to the fat body tissue of Drosophila, followed by deep sequencing (DamID-Seq. One feature of DamID-Seq data is that induced adenine methylation signals are not assured to be symmetrically distributed at TFBS, which renders the existing peak calling algorithms for ChIP-Seq, including SPP and MACS, inappropriate for DamID-Seq data. This challenged us to develop a new algorithm for peak calling. A challenge in peaking calling based on sequence data is estimating the averaged behavior of background signals. We applied a bootstrap resampling method to short sequence reads in the control (Dam only. After data quality check and mapping reads to a reference genome, the peaking calling procedure compromises the following steps: 1 reads resampling; 2 reads scaling (normalization and computing signal-to-noise fold changes; 3 filtering; 4 Calling peaks based on a statistically significant threshold. This is a non-parametric method for peak calling (NPPC. We also used irreproducible discovery rate (IDR analysis, as well as ChIP-Seq data to compare the peaks called by the NPPC. We identified approximately 6,000 peaks for DSX, which point to 1,225 genes related to the fat body tissue difference between female and male Drosophila. Statistical evidence from IDR analysis indicated that these peaks are reproducible across biological replicates. In addition, these peaks are comparable to those identified by use of ChIP-Seq on S2 cells, in terms of peak number, location, and peaks width.

  9. A non-parametric peak calling algorithm for DamID-Seq.

    Science.gov (United States)

    Li, Renhua; Hempel, Leonie U; Jiang, Tingbo

    2015-01-01

    Protein-DNA interactions play a significant role in gene regulation and expression. In order to identify transcription factor binding sites (TFBS) of double sex (DSX)-an important transcription factor in sex determination, we applied the DNA adenine methylation identification (DamID) technology to the fat body tissue of Drosophila, followed by deep sequencing (DamID-Seq). One feature of DamID-Seq data is that induced adenine methylation signals are not assured to be symmetrically distributed at TFBS, which renders the existing peak calling algorithms for ChIP-Seq, including SPP and MACS, inappropriate for DamID-Seq data. This challenged us to develop a new algorithm for peak calling. A challenge in peaking calling based on sequence data is estimating the averaged behavior of background signals. We applied a bootstrap resampling method to short sequence reads in the control (Dam only). After data quality check and mapping reads to a reference genome, the peaking calling procedure compromises the following steps: 1) reads resampling; 2) reads scaling (normalization) and computing signal-to-noise fold changes; 3) filtering; 4) Calling peaks based on a statistically significant threshold. This is a non-parametric method for peak calling (NPPC). We also used irreproducible discovery rate (IDR) analysis, as well as ChIP-Seq data to compare the peaks called by the NPPC. We identified approximately 6,000 peaks for DSX, which point to 1,225 genes related to the fat body tissue difference between female and male Drosophila. Statistical evidence from IDR analysis indicated that these peaks are reproducible across biological replicates. In addition, these peaks are comparable to those identified by use of ChIP-Seq on S2 cells, in terms of peak number, location, and peaks width.

  10. Development of the PARA-ID Program to Simulate a Unified Viscoplasticity Behaviour

    International Nuclear Information System (INIS)

    Koo, Gyeong Hoi

    2009-01-01

    The PARA-ID code is a general purpose computer simulation program for a nonlinear cyclic material behavior with and without viscous effects, which can simulate various constitutive models such as - Prager Model - Armstrong and Frederick Model - Chaboche 3-decomposed rule Model - Chaboche 4-decomposed rule Model - Ohno and Wang Model - Unified Chaboche Viscoplastic Model In this paper, the unified Chaboche viscoplasticity model is investigated with some examples of application for a cyclic hardening material of 316L

  11. 75 FR 45661 - Notice of Permanent Closure on Public Lands in Ada County, ID

    Science.gov (United States)

    2010-08-03

    ... DEPARTMENT OF THE INTERIOR Bureau of Land Management [LLIDB00100 L17110000.PH0000 241A 4500013040] Notice of Permanent Closure on Public Lands in Ada County, ID AGENCY: Bureau of Land Management, Interior.../2\\NW\\1/4\\ NW\\1/4\\ and N\\1/2\\SW\\1/4\\ NW\\1/4\\ of Section 32, T.1 S., R.3 E., Boise Meridian, Ada...

  12. Using Efficient TRNGs for PSEUDO Profile in National eID Card

    OpenAIRE

    Blerim Rexha; Dren Imeraj; Isak Shabani

    2018-01-01

    Applications that requires true random number generator (TRNG), which uses raw analog data generated from any noise source in nature, must convert the source normal distribution to uniform distribution. Many up to date implementations convert the raw analog data into digital data by employing a comparator or a Schmitt trigger. This method wastes a large amount of random input data, lowering the throughput of the TRNG. In new national electronic identity card (eID) beyond the true identity of ...

  13. Purification, crystallization and preliminary crystallographic study of an IDS-epimerase from Agrobacterium tumefaciens BY6

    Energy Technology Data Exchange (ETDEWEB)

    Bäuerle, Bettina [Institute of Microbiology, University of Stuttgart, 70569 Stuttgart (Germany); Sandalova, Tatyana; Schneider, Gunter [Department of Medical Biochemistry and Biophysics, Karolinska Institutet, 17177 Stockholm (Sweden); Rieger, Paul-Gerhard, E-mail: pg.rieger@imb.uni-stuttgart.de [Institute of Microbiology, University of Stuttgart, 70569 Stuttgart (Germany)

    2006-08-01

    This is the first report of the crystallization of an IDS-epimerase from A. tumefaciens BY6 and its l-selenomethionine derivative. The initial degradation of all stereoisomers of the complexing agent iminodisuccinate (IDS) is enabled by an epimerase in the bacterial strain Agrobacterium tumefaciens BY6. This protein was produced in Escherichia coli, purified and crystallized by the hanging-drop vapour-diffusion method. Crystals of IDS-epimerase were obtained under several conditions. The best diffracting crystals were grown in 22% PEG 3350, 0.2 M (NH{sub 4}){sub 2}SO{sub 4} and 0.1 M bis-Tris propane pH 7.2 at 293 K. These crystals belong to the monoclinic space group P2{sub 1}, with unit-cell parameters a = 55.4, b = 104.2, c = 78.6 Å, β = 103.3°, and diffracted to 1.7 Å resolution. They contain two protein molecules per asymmetric unit. In order to solve the structure using the MAD phasing method, crystals of the l-selenomethionine-substituted epimerase were grown in the presence of 20% PEG 3350, 0.2 M Na{sub 2}SO{sub 4} and 0.1 M bis-Tris propane pH 8.5.

  14. Purification, crystallization and preliminary crystallographic study of an IDS-epimerase from Agrobacterium tumefaciens BY6

    International Nuclear Information System (INIS)

    Bäuerle, Bettina; Sandalova, Tatyana; Schneider, Gunter; Rieger, Paul-Gerhard

    2006-01-01

    This is the first report of the crystallization of an IDS-epimerase from A. tumefaciens BY6 and its l-selenomethionine derivative. The initial degradation of all stereoisomers of the complexing agent iminodisuccinate (IDS) is enabled by an epimerase in the bacterial strain Agrobacterium tumefaciens BY6. This protein was produced in Escherichia coli, purified and crystallized by the hanging-drop vapour-diffusion method. Crystals of IDS-epimerase were obtained under several conditions. The best diffracting crystals were grown in 22% PEG 3350, 0.2 M (NH 4 ) 2 SO 4 and 0.1 M bis-Tris propane pH 7.2 at 293 K. These crystals belong to the monoclinic space group P2 1 , with unit-cell parameters a = 55.4, b = 104.2, c = 78.6 Å, β = 103.3°, and diffracted to 1.7 Å resolution. They contain two protein molecules per asymmetric unit. In order to solve the structure using the MAD phasing method, crystals of the l-selenomethionine-substituted epimerase were grown in the presence of 20% PEG 3350, 0.2 M Na 2 SO 4 and 0.1 M bis-Tris propane pH 8.5

  15. ACE insertion/deletion (I/D) polymorphism and diabetic nephropathy.

    Science.gov (United States)

    Rahimi, Zohreh

    2012-10-01

    Angiotensin converting enzyme (ACE) gene encodes ACE, a key component of renin angiotensin system (RAS), plays an important role in blood pressure homeostasis by generating the vasoconstrictor peptide angiotensin II. Directory of Open Access Journals (DOAJ), Google Scholar, Pubmed (NLM), LISTA (EBSCO) and Web of Science have been searched. The presence of ACE insertion/deletion (I/D) polymorphism affects the plasma level of ACE. ACE DD genotype is associated with the highest systemic and renal ACE levels compared with the lowest ACE activity in carriers of II genotype. In this review focus has been performed on the study of ACE I/D polymorphism in various populations and its influence on the risk of onset and progression of diabetic nephropathy. Also, association between ACE I/D polymorphism and response to ACE inhibitor and angiotensin II receptor antagonists will be reviewed. Further, synergistic effect of this polymorphism and variants of some genes on the risk of development of diabetic nephropathy will be discussed.

  16. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    Science.gov (United States)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  17. DNA origami-based shape IDs for single-molecule nanomechanical genotyping

    Science.gov (United States)

    Zhang, Honglu; Chao, Jie; Pan, Dun; Liu, Huajie; Qiang, Yu; Liu, Ke; Cui, Chengjun; Chen, Jianhua; Huang, Qing; Hu, Jun; Wang, Lianhui; Huang, Wei; Shi, Yongyong; Fan, Chunhai

    2017-04-01

    Variations on DNA sequences profoundly affect how we develop diseases and respond to pathogens and drugs. Atomic force microscopy (AFM) provides a nanomechanical imaging approach for genetic analysis with nanometre resolution. However, unlike fluorescence imaging that has wavelength-specific fluorophores, the lack of shape-specific labels largely hampers widespread applications of AFM imaging. Here we report the development of a set of differentially shaped, highly hybridizable self-assembled DNA origami nanostructures serving as shape IDs for magnified nanomechanical imaging of single-nucleotide polymorphisms. Using these origami shape IDs, we directly genotype single molecules of human genomic DNA with an ultrahigh resolution of ~10 nm and the multiplexing ability. Further, we determine three types of disease-associated, long-range haplotypes in samples from the Han Chinese population. Single-molecule analysis allows robust haplotyping even for samples with low labelling efficiency. We expect this generic shape ID-based nanomechanical approach to hold great potential in genetic analysis at the single-molecule level.

  18. Association of ACE Gene I/D polymorphism with migraine in Kashmiri population.

    Science.gov (United States)

    Wani, Irfan Yousuf; Sheikh, Saleem; Shah, Zafar Amin; Pandith, Arshid A; Wani, Mushtaq; Asimi, Ravouf; Wani, Maqbool; Sheikh, Shahnawaz; Mehraj, Iqra

    2016-01-01

    Migraine is a complex, recurrent headache disorder that is one of the most common complaints in neurology practice. The role of various genes in its pathogenesis is being studied. We did this study to see whether an association exists between ACE gene I/D polymorphism and migraine in our region. The study included 100 patients diagnosed with migraine and 121 healthy controls. The study subject were age and gender matched. The analysis was based on Polymerase Chain Reaction (PCR) and included following steps: DNA extraction from blood, PCR and Restriction Fragment Length Polymorphism (RFLP). Out of 100 cases, 69 were females and 31 were males. Fifty-seven were having migraine without aura and 43 had migraine with aura. 45 of the cases had II polymorphism, 40 had ID polymorphism and 15 had DD polymorphism in ACE gene. We were not able to find a statistically significant association between ACE gene I/D polymorphism with migraine. The reason for difference in results between our study and other studies could be because of different ethnicity in study populations. So a continuous research is needed in this regard in order to find the genes and different polymorphism that increase the susceptibility of Kashmiri population to migraine.

  19. Quand l’idée fixe se met « à table »

    Directory of Open Access Journals (Sweden)

    Cécile de Bary

    2008-03-01

    Full Text Available Un livre de cuisine, comme A table de Claudian, édité en 1963, peut relever de la prose d’idées dans la mesure où son projet est sous-tendu par une idéologie très précise, qui seule lui donne sa cohérence. Si l’ethnocentrisme consiste à ne pas reconnaître à l’autre une culture, par exemple, ce livre apparaît comme ethnocentrique, puisqu’il a pour projet de départager les peuples qui savent et ceux qui ne savent pas. Il est encore réactionnaire, voué au rétablissement des savoir-faire des terroirs, contre les corruptions parisiennes en particulier. Dès lors, la présentation d’un plat est toujours susceptible de s’étendre ou de se faire discours, sous la poussée d’un lyrisme acrimonieux. Pour autant, il ne s’agit pas d’un faux livre de cuisine, d’un traité ou d’une « physiologie ». La recette est l’aboutissement logique de l’idée fixe. Elle est le lieu d’une bataille que l’argumentation sert, qu’elle met en scène et qu’elle prépare.

  20. RNA-ID, a Powerful Tool for Identifying and Characterizing Regulatory Sequences.

    Science.gov (United States)

    Brule, C E; Dean, K M; Grayhack, E J

    2016-01-01

    The identification and analysis of sequences that regulate gene expression is critical because regulated gene expression underlies biology. RNA-ID is an efficient and sensitive method to discover and investigate regulatory sequences in the yeast Saccharomyces cerevisiae, using fluorescence-based assays to detect green fluorescent protein (GFP) relative to a red fluorescent protein (RFP) control in individual cells. Putative regulatory sequences can be inserted either in-frame or upstream of a superfolder GFP fusion protein whose expression, like that of RFP, is driven by the bidirectional GAL1,10 promoter. In this chapter, we describe the methodology to identify and study cis-regulatory sequences in the RNA-ID system, explaining features and variations of the RNA-ID reporter, as well as some applications of this system. We describe in detail the methods to analyze a single regulatory sequence, from construction of a single GFP variant to assay of variants by flow cytometry, as well as modifications required to screen libraries of different strains simultaneously. We also describe subsequent analyses of regulatory sequences. © 2016 Elsevier Inc. All rights reserved.

  1. Protective effects of ID331 Triticum monococcum gliadin on in vitro models of the intestinal epithelium.

    Science.gov (United States)

    Iacomino, Giuseppe; Di Stasio, Luigia; Fierro, Olga; Picariello, Gianluca; Venezia, Antonella; Gazza, Laura; Ferranti, Pasquale; Mamone, Gianfranco

    2016-12-01

    A growing interest in developing new strategies for preventing coeliac disease has motivated efforts to identify cereals with null or reduced toxicity. In the current study, we investigate the biological effects of ID331 Triticum monococcum gliadin-derived peptides in human Caco-2 intestinal epithelial cells. Triticum aestivum gliadin derived peptides were employed as a positive control. The effects on epithelial permeability, zonulin release, viability, and cytoskeleton reorganization were investigated. Our findings confirmed that ID331 gliadin did not enhance permeability and did not induce zonulin release, cytotoxicity or cytoskeleton reorganization of Caco-2 cell monolayers. We also demonstrated that ID331 ω-gliadin and its derived peptide ω(105-123) exerted a protective action, mitigating the injury of Triticum aestivum gliadin on cell viability and cytoskeleton reorganization. These results may represent a new opportunity for the future development of innovative strategies to reduce gluten toxicity in the diet of patients with gluten intolerance. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. Fraudulent ID using face morphs: Experiments on human and automatic recognition.

    Science.gov (United States)

    Robertson, David J; Kramer, Robin S S; Burton, A Mike

    2017-01-01

    Matching unfamiliar faces is known to be difficult, and this can give an opportunity to those engaged in identity fraud. Here we examine a relatively new form of fraud, the use of photo-ID containing a graphical morph between two faces. Such a document may look sufficiently like two people to serve as ID for both. We present two experiments with human viewers, and a third with a smartphone face recognition system. In Experiment 1, viewers were asked to match pairs of faces, without being warned that one of the pair could be a morph. They very commonly accepted a morphed face as a match. However, in Experiment 2, following very short training on morph detection, their acceptance rate fell considerably. Nevertheless, there remained large individual differences in people's ability to detect a morph. In Experiment 3 we show that a smartphone makes errors at a similar rate to 'trained' human viewers-i.e. accepting a small number of morphs as genuine ID. We discuss these results in reference to the use of face photos for security.

  3. Visible and NIR spectral band combination to produce high security ID tags for automatic identification

    Science.gov (United States)

    Pérez-Cabré, Elisabet; Millán, María S.; Javidi, Bahram

    2006-09-01

    Verification of a piece of information and/or authentication of a given object or person are common operations carried out by automatic security systems that can be applied, for instance, to control the entrance to restricted areas, access to public buildings, identification of cardholders, etc. Vulnerability of such security systems may depend on the ease of counterfeiting the information used as a piece of identification for verification and authentication. To protect data against tampering, the signature that identifies an object is usually encrypted to avoid an easy recognition at human sight and an easy reproduction using conventional devices for imaging or scanning. To make counterfeiting even more difficult, we propose to combine data from visible and near infrared (NIR) spectral bands. By doing this, neither the visible content nor the NIR data by theirselves are sufficient to allow the signature recognition and thus, the identification of a given object. Only the appropriate combination of both signals permits a satisfactory authentication. In addition, the resulting signature is encrypted following a fully-phase encryption technique and the obtained complex-amplitude distribution is encoded on an ID tag. Spatial multiplexing of the encrypted signature allows us to build a distortion-invariant ID tag, so that remote authentication can be achieved even if the tag is captured under rotation or at different distances. We also explore the possibility of using partial information of the encrypted signature to simplify the ID tag design.

  4. Evaluation of the RapID-ANA system for identification of anaerobic bacteria of veterinary origin.

    Science.gov (United States)

    Adney, W S; Jones, R L

    1985-12-01

    This study evaluated the ability of the RapID-ANA system (Innovative Diagnostic Systems, Inc., Atlanta, Ga.) to accurately identify a spectrum of freshly isolated veterinary anaerobes. A total of 183 isolates were tested and included 7 Actinomyces spp., 53 Bacteroides spp., 32 Clostridium spp., 2 Eubacterium spp., 65 Fusobacterium spp., 1 Peptococcus spp., 22 Peptostreptococcus spp., and 1 Propionibacterium spp. All isolates were initially identified by conventional biochemical testing and gas-liquid chromatography of short-chain fatty acid metabolites. Additional tests were performed as required by the RapID-ANA system. Of these isolates, 81.4% were correctly identified to the genus level, including 59.6% to the species level, 14.2% were incorrectly identified at the genus level, and 4.4% were not identified. Initially, 20.2% of the strains were not identified because the microcodes were not in the code book. The majority of the incorrect identifications were caused by the misidentification of Fusobacterium spp. as Bacteroides spp. Errors also occurred when veterinary anaerobes not included in the data base were assigned an identification from the existing data base. The RapID-ANA system appears to be a promising new method for rapid identification of veterinary anaerobes; however, further evaluation with an extended data base is needed before the system can accurately identify all clinically significant anaerobes.

  5. Prediction and error growth in the daily forecast of precipitation from the NCEP CFSv2 over the subdivisions of Indian subcontinent

    Science.gov (United States)

    Pandey, Dhruva Kumar; Rai, Shailendra; Sahai, A. K.; Abhilash, S.; Shahi, N. K.

    2016-02-01

    This study investigates the forecast skill and predictability of various indices of south Asian monsoon as well as the subdivisions of the Indian subcontinent during JJAS season for the time domain of 2001-2013 using NCEP CFSv2 output. It has been observed that the daily mean climatology of precipitation over the land points of India is underestimated in the model forecast as compared to observation. The monthly model bias of precipitation shows the dry bias over the land points of India and also over the Bay of Bengal, whereas the Himalayan and Arabian Sea regions show the wet bias. We have divided the Indian landmass into five subdivisions namely central India, southern India, Western Ghat, northeast and southern Bay of Bengal regions based on the spatial variation of observed mean precipitation in JJAS season. The underestimation over the land points of India during mature phase was originated from the central India, southern Bay of Bengal, southern India and Western Ghat regions. The error growth in June forecast is slower as compared to July forecast in all the regions. The predictability error also grows slowly in June forecast as compared to July forecast in most of the regions. The doubling time of predictability error was estimated to be in the range of 3-5 days for all the regions. Southern India and Western Ghats are more predictable in the July forecast as compared to June forecast, whereas IMR, northeast, central India and southern Bay of Bengal regions have the opposite nature.

  6. How can conceptual schemes change teaching?

    Science.gov (United States)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  7. Knoto-ID: a tool to study the entanglement of open protein chains using the concept of knotoids.

    Science.gov (United States)

    Dorier, Julien; Goundaroulis, Dimos; Benedetti, Fabrizio; Stasiak, Andrzej

    2018-05-02

    The backbone of most proteins forms an open curve. To study their entanglement, a common strategy consists in searching for the presence of knots in their backbones using topological invariants. However, this approach requires to close the curve into a loop, which alters the geometry of curve. Knoto-ID allows evaluating the entanglement of open curves without the need to close them, using the recent concept of knotoids which is a generalization of the classical knot theory to open curves. Knoto-ID can analyse the global topology of the full chain as well as the local topology by exhaustively studying all subchains or only determining the knotted core. Knoto-ID permits to localize topologically non-trivial protein folds that are not detected by informatics tools detecting knotted protein folds. Knoto-ID is written in C ++ and includes R (www.R-project.org) scripts to generate plots of projections maps, fingerprint matrices and disk matrices. Knoto-ID is distributed under the GNU General Public License (GPL), version 2 or any later version and is available at https://github.com/sib-swiss/Knoto-ID. A binary distribution for Mac OS X, Linux and Windows with detailed user guide and examples can be obtained from https://www.vital-it.ch/software/Knoto-ID. julien.dorier@sib.swiss.

  8. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  9. Secure RAID Schemes for Distributed Storage

    OpenAIRE

    Huang, Wentao; Bruck, Jehoshua

    2016-01-01

    We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...

  10. Elevated endogenous expression of the dominant negative basic helix-loop-helix protein ID1 correlates with significant centrosome abnormalities in human tumor cells

    Directory of Open Access Journals (Sweden)

    Gutmann Anja

    2010-01-01

    Full Text Available Abstract Background ID proteins are dominant negative inhibitors of basic helix-loop-helix transcription factors that have multiple functions during development and cellular differentiation. Ectopic (over-expression of ID1 extends the lifespan of primary human epithelial cells. High expression levels of ID1 have been detected in multiple human malignancies, and in some have been correlated with unfavorable clinical prognosis. ID1 protein is localized at the centrosomes and forced (over-expression of ID1 results in errors during centrosome duplication. Results Here we analyzed the steady state expression levels of the four ID-proteins in 18 tumor cell lines and assessed the number of centrosome abnormalities. While expression of ID1, ID2, and ID3 was detected, we failed to detect protein expression of ID4. Expression of ID1 correlated with increased supernumerary centrosomes in most cell lines analyzed. Conclusions This is the first report that shows that not only ectopic expression in tissue culture but endogenous levels of ID1 modulate centrosome numbers. Thus, our findings support the hypothesis that ID1 interferes with centrosome homeostasis, most likely contributing to genomic instability and associated tumor aggressiveness.

  11. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  12. A Spatial Domain Quantum Watermarking Scheme

    International Nuclear Information System (INIS)

    Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang

    2016-01-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)

  13. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  14. Telomere length is associated with ACE I/D polymorphism in hypertensive patients with left ventricular hypertrophy

    DEFF Research Database (Denmark)

    Fyhrquist, Frej; Eriksson, Anders; Saijonmaa, Outi

    2013-01-01

    INTRODUCTION: Short telomeres are often associated with cardiovascular risk factors and age-related diseases, while the angiotensin converting enzyme (ACE) gene insertion/deletion polymorphism (DD, ID, II) has shown such associations less consistently. We hypothesized that telomere length...... and association of telomere length with cardiovascular risk is affected by ACE (I/D) genotype. METHODS: We measured leucocyte telomere length (LTL) by Southern blot and analysed ACE I/D genotypes in 1249 subjects with hypertension and left ventricular hypertrophy (LVH). We examined interactions of ACE I...

  15. Inhibition of muscle-specific gene expression by Id3: requirement of the C-terminal region of the protein for stable expression and function.

    Science.gov (United States)

    Chen, B; Han, B H; Sun, X H; Lim, R W

    1997-01-15

    We have examined the role of an Id-like protein, Id3 (also known as HLH462), in the regulation of muscle-specific gene expression. Id proteins are believed to block expression of muscle-specific genes by preventing the dimerization between ubiquitous bHLH proteins (E proteins) and myogenic bHLH proteins such as MyoD. Consistent with its putative role as an inhibitor of differentiation, Id3 mRNA was detected in proliferating skeletal muscle cells, was further induced by basic fibroblast growth factor (bFGF) and was down-regulated in differentiated muscle cultures. Overexpression of Id3 efficiently inhibited the MyoD-mediated activation of the muscle-specific creatine kinase (MCK) reporter gene. Deletion analysis indicated that the C-terminal 15 amino acids of Id3 are critical for the full inhibitory activity while deleting up to 42 residues from the C-terminus of the related protein, Id2, did not affect its ability to inhibit the MCK reporter gene. Chimeric protein containing the N-terminal region of Id3 and the C-terminus of Id2 was also non-functional in transfected cells. In contrast, wild-type Id3, the C-terminal mutants, and the Id3/Id2 chimera could all interact with the E-protein E47in vitro. Additional studies indicated that truncation of the Id3 C-terminus might have adversely affected the expression level of the mutant proteins but the Id3/Id2 chimera was stably expressed. Taken together, our results revealed a more complex requirement for the expression and proper function of the Id family proteins than was hitherto expected.

  16. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  17. Community healthcare financing scheme: findings among residents ...

    African Journals Online (AJOL)

    ... none were active participants as 2(0.6%) were indifferent. There was a statistically significant relationship, Fischers <0.0001 between sex and the scheme's knowledge. Conclusion: Knowledge of the scheme was poor among majority of the respondents and none were active participants. Bribery and corruption was the ...

  18. Improved Load Shedding Scheme considering Distributed Generation

    DEFF Research Database (Denmark)

    Das, Kaushik; Nitsas, Antonios; Altin, Müfit

    2017-01-01

    With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme...

  19. A generalized scheme for designing multistable continuous ...

    Indian Academy of Sciences (India)

    In this paper, a generalized scheme is proposed for designing multistable continuous dynamical systems. The scheme is based on the concept of partial synchronization of states and the concept of constants of motion. The most important observation is that by coupling two mdimensional dynamical systems, multistable ...

  20. Consolidation of the health insurance scheme

    CERN Document Server

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).