WorldWideScience

Sample records for identify key limiting

  1. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  2. BENCHMARKING - PRACTICAL TOOLS IDENTIFY KEY SUCCESS FACTORS

    Directory of Open Access Journals (Sweden)

    Olga Ju. Malinina

    2016-01-01

    Full Text Available The article gives a practical example of the application of benchmarking techniques. The object of study selected fashion store Company «HLB & M Hennes & Mauritz», located in the shopping center «Gallery», Krasnodar. Hennes & Mauritz. The purpose of this article is to identify the best ways to develop a fashionable brand clothing store Hennes & Mauritz on the basis of benchmarking techniques. On the basis of conducted market research is a comparative analysis of the data from different perspectives. The result of the author’s study is a generalization of the ndings, the development of the key success factors that will allow to plan a successful trading activities in the future, based on the best experience of competitors.

  3. Identifying Key Attributes for Protein Beverages.

    Science.gov (United States)

    Oltman, A E; Lopetcharat, K; Bastian, E; Drake, M A

    2015-06-01

    This study identified key attributes of protein beverages and evaluated effects of priming on liking of protein beverages. An adaptive choice-based conjoint study was conducted along with Kano analysis to gain insight on protein beverage consumers (n = 432). Attributes evaluated included label claim, protein type, amount of protein, carbohydrates, sweeteners, and metabolic benefits. Utility scores for levels and importance scores for attributes were determined. Subsequently, two pairs of clear acidic whey protein beverages were manufactured that differed by age of protein source or the amount of whey protein per serving. Beverages were evaluated by 151 consumers on two occasions with or without priming statements. One priming statement declared "great flavor," the other priming statement declared 20 g protein per serving. A two way analysis of variance was applied to discern the role of each priming statement. The most important attribute for protein beverages was sweetener type, followed by amount of protein, followed by type of protein followed by label claim. Beverages with whey protein, naturally sweetened, reduced sugar and ≥15 g protein per serving were most desired. Three consumer clusters were identified, differentiated by their preferences for protein type, sweetener and amount of protein. Priming statements positively impacted concept liking (P 0.05). Consistent with trained panel profiles of increased cardboard flavor with higher protein content, consumers liked beverages with 10 g protein more than beverages with 20 g protein (6.8 compared with 5.7, P appeal. © 2015 Institute of Food Technologists®

  4. Research Note Identifying key grazing indicators to monitor trends in ...

    African Journals Online (AJOL)

    Research Note Identifying key grazing indicators to monitor trends in the veld condition of Lambert's Bay Strandveld, South Africa. ... from which a minimum number of species necessary to monitor trends in the condition of the veld were determined, making it user-friendly for land-users, extension officers and others. The key ...

  5. Microscale optical cryptography using a subdiffraction-limit optical key

    Science.gov (United States)

    Ogura, Yusuke; Aino, Masahiko; Tanida, Jun

    2018-04-01

    We present microscale optical cryptography using a subdiffraction-limit optical pattern, which is finer than the diffraction-limit size of the decrypting optical system, as a key and a substrate with a reflectance distribution as an encrypted image. Because of the subdiffraction-limit spatial coding, this method enables us to construct a secret image with the diffraction-limit resolution. Simulation and experimental results demonstrate, both qualitatively and quantitatively, that the secret image becomes recognizable when and only when the substrate is illuminated with the designed key pattern.

  6. Social Network Analysis Identifies Key Participants in Conservation Development.

    Science.gov (United States)

    Farr, Cooper M; Reed, Sarah E; Pejchar, Liba

    2018-05-01

    Understanding patterns of participation in private lands conservation, which is often implemented voluntarily by individual citizens and private organizations, could improve its effectiveness at combating biodiversity loss. We used social network analysis (SNA) to examine participation in conservation development (CD), a private land conservation strategy that clusters houses in a small portion of a property while preserving the remaining land as protected open space. Using data from public records for six counties in Colorado, USA, we compared CD participation patterns among counties and identified actors that most often work with others to implement CDs. We found that social network characteristics differed among counties. The network density, or proportion of connections in the network, varied from fewer than 2 to nearly 15%, and was higher in counties with smaller populations and fewer CDs. Centralization, or the degree to which connections are held disproportionately by a few key actors, was not correlated strongly with any county characteristics. Network characteristics were not correlated with the prevalence of wildlife-friendly design features in CDs. The most highly connected actors were biological and geological consultants, surveyors, and engineers. Our work demonstrates a new application of SNA to land-use planning, in which CD network patterns are examined and key actors are identified. For better conservation outcomes of CD, we recommend using network patterns to guide strategies for outreach and information dissemination, and engaging with highly connected actor types to encourage widespread adoption of best practices for CD design and stewardship.

  7. Identifying key hospital service quality factors in online health communities.

    Science.gov (United States)

    Jung, Yuchul; Hur, Cinyoung; Jung, Dain; Kim, Minki

    2015-04-07

    The volume of health-related user-created content, especially hospital-related questions and answers in online health communities, has rapidly increased. Patients and caregivers participate in online community activities to share their experiences, exchange information, and ask about recommended or discredited hospitals. However, there is little research on how to identify hospital service quality automatically from the online communities. In the past, in-depth analysis of hospitals has used random sampling surveys. However, such surveys are becoming impractical owing to the rapidly increasing volume of online data and the diverse analysis requirements of related stakeholders. As a solution for utilizing large-scale health-related information, we propose a novel approach to identify hospital service quality factors and overtime trends automatically from online health communities, especially hospital-related questions and answers. We defined social media-based key quality factors for hospitals. In addition, we developed text mining techniques to detect such factors that frequently occur in online health communities. After detecting these factors that represent qualitative aspects of hospitals, we applied a sentiment analysis to recognize the types of recommendations in messages posted within online health communities. Korea's two biggest online portals were used to test the effectiveness of detection of social media-based key quality factors for hospitals. To evaluate the proposed text mining techniques, we performed manual evaluations on the extraction and classification results, such as hospital name, service quality factors, and recommendation types using a random sample of messages (ie, 5.44% (9450/173,748) of the total messages). Service quality factor detection and hospital name extraction achieved average F1 scores of 91% and 78%, respectively. In terms of recommendation classification, performance (ie, precision) is 78% on average. Extraction and

  8. Secret Key Agreement: Fundamental Limits and Practical Challenges

    KAUST Repository

    Rezki, Zouheir

    2017-02-15

    Despite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.

  9. Key clinical features to identify girls with CDKL5 mutations.

    Science.gov (United States)

    Bahi-Buisson, Nadia; Nectoux, Juliette; Rosas-Vargas, Haydeé; Milh, Mathieu; Boddaert, Nathalie; Girard, Benoit; Cances, Claude; Ville, Dorothée; Afenjar, Alexandra; Rio, Marlène; Héron, Delphine; N'guyen Morel, Marie Ange; Arzimanoglou, Alexis; Philippe, Christophe; Jonveaux, Philippe; Chelly, Jamel; Bienvenu, Thierry

    2008-10-01

    Mutations in the human X-linked cyclin-dependent kinase-like 5 (CDKL5) gene have been shown to cause infantile spasms as well as Rett syndrome (RTT)-like phenotype. To date, less than 25 different mutations have been reported. So far, there are still little data on the key clinical diagnosis criteria and on the natural history of CDKL5-associated encephalopathy. We screened the entire coding region of CDKL5 for mutations in 183 females with encephalopathy with early seizures by denaturing high liquid performance chromatography and direct sequencing, and we identified in 20 unrelated girls, 18 different mutations including 7 novel mutations. These mutations were identified in eight patients with encephalopathy with RTT-like features, five with infantile spasms and seven with encephalopathy with refractory epilepsy. Early epilepsy with normal interictal EEG and severe hypotonia are the key clinical features in identifying patients likely to have CDKL5 mutations. Our study also indicates that these patients clearly exhibit some RTT features such as deceleration of head growth, stereotypies and hand apraxia and that these RTT features become more evident in older and ambulatory patients. However, some RTT signs are clearly absent such as the so called RTT disease profile (period of nearly normal development followed by regression with loss of acquired fine finger skill in early childhood and characteristic intensive eye communication) and the characteristic evolution of the RTT electroencephalogram. Interestingly, in addition to the overall stereotypical symptomatology (age of onset and evolution of the disease) resulting from CDKL5 mutations, atypical forms of CDKL5-related conditions have also been observed. Our data suggest that phenotypic heterogeneity does not correlate with the nature or the position of the mutations or with the pattern of X-chromosome inactivation, but most probably with the functional transcriptional and/or translational consequences of CDKL5

  10. Identifying key genes associated with acute myocardial infarction.

    Science.gov (United States)

    Cheng, Ming; An, Shoukuan; Li, Junquan

    2017-10-01

    This study aimed to identify key genes associated with acute myocardial infarction (AMI) by reanalyzing microarray data. Three gene expression profile datasets GSE66360, GSE34198, and GSE48060 were downloaded from GEO database. After data preprocessing, genes without heterogeneity across different platforms were subjected to differential expression analysis between the AMI group and the control group using metaDE package. P FI) network. Then, DEGs in each module were subjected to pathway enrichment analysis using DAVID. MiRNAs and transcription factors predicted to regulate target DEGs were identified. Quantitative real-time polymerase chain reaction (RT-PCR) was applied to verify the expression of genes. A total of 913 upregulated genes and 1060 downregulated genes were identified in the AMI group. A FI network consists of 21 modules and DEGs in 12 modules were significantly enriched in pathways. The transcription factor-miRNA-gene network contains 2 transcription factors FOXO3 and MYBL2, and 2 miRNAs hsa-miR-21-5p and hsa-miR-30c-5p. RT-PCR validations showed that expression levels of FOXO3 and MYBL2 were significantly increased in AMI, and expression levels of hsa-miR-21-5p and hsa-miR-30c-5p were obviously decreased in AMI. A total of 41 DEGs, such as SOCS3, VAPA, and COL5A2, are speculated to have roles in the pathogenesis of AMI; 2 transcription factors FOXO3 and MYBL2, and 2 miRNAs hsa-miR-21-5p and hsa-miR-30c-5p may be involved in the regulation of the expression of these DEGs.

  11. Identifying the key concerns of Irish persons with intellectual disability.

    Science.gov (United States)

    García Iriarte, Edurne; O'Brien, Patricia; McConkey, Roy; Wolfe, Marie; O'Doherty, Siobhain

    2014-11-01

    Internationally, people with intellectual disability are socially marginalized, and their rights under the United Nations Convention for the Rights of Persons with Disabilities (CRPD) are often ignored. This paper aims to define the key concerns of adults with an intellectual disability in relation to their participation in society using an inclusive research strategy for both data gathering and data analysis. A national study involving 23 focus groups and 168 persons was conducted on the island of Ireland with people with intellectual disability as co-facilitators. A thematic content analysis was undertaken of the verbatim transcripts initially by university co-researchers, and 19 themes were identified. Co-researchers with intellectual disability joined in identifying the eight core themes. These were as follows: living options, employment, relationships, citizenship, leisure time, money management, self-advocacy, and communication. The concerns are discussed within the framework of the CRPD, and implications for transforming service policy are drawn. Why we did the research In many countries, people with intellectual disability have difficulties doing things other people without disabilities do, for example to study, to get a job or to live independently. They also find that their rights are not respected under the Convention on the Rights of Persons with Disabilities (the Convention). We did this study to Learn what are the main issues for adults with intellectual disability in Ireland. Do research with people with intellectual disability. How we did the research People with intellectual disability and their supporters worked with university researchers to plan and do the research. We met with people in groups and 168 people told us about things important to them. What we found out We found that there were very important things that people talked about in the groups. We chose the most important: living options, employment, relationships, rights, leisure, money

  12. Risk and Performance Technologies: Identifying the Keys to Successful Implementation

    International Nuclear Information System (INIS)

    McClain, Lynn; Smith, Art; O'Regan, Patrick

    2002-01-01

    The nuclear power industry has been utilizing risk and performance based technologies for over thirty years. Applications of these technologies have included risk assessment (e.g. Individual Plant Examinations), burden reduction (e.g. Risk-Informed Inservice Inspection, RI-ISI) and risk management (Maintenance Rule, 10CFR50.65). Over the last five to ten years the number of risk-informed (RI) burden reduction initiatives has increased. Unfortunately, the efficiencies of some of these applications have been questionable. This paper investigates those attributes necessary to support successful, cost-effective RI-applications. The premise to this paper is that by understanding the key attributes that support one successful application, insights can be gleaned that will streamline/coordinate future RI-applications. This paper is an extension to a paper presented at the Pressure Vessel and Piping (PVP-2001) Conference. In that paper, a number issues and opportunities were identified that needed to be assessed in order to support future (and efficient) RI-applications. It was noted in the paper that a proper understanding and resolution of these issues will facilitate implementation of risk and performance technology in the operation, maintenance and design disciplines. In addition, it will provide the foundation necessary to support regulatory review and approval. (authors)

  13. A Sensitivity Analysis Approach to Identify Key Environmental Performance Factors

    Directory of Open Access Journals (Sweden)

    Xi Yu

    2014-01-01

    Full Text Available Life cycle assessment (LCA is widely used in design phase to reduce the product’s environmental impacts through the whole product life cycle (PLC during the last two decades. The traditional LCA is restricted to assessing the environmental impacts of a product and the results cannot reflect the effects of changes within the life cycle. In order to improve the quality of ecodesign, it is a growing need to develop an approach which can reflect the changes between the design parameters and product’s environmental impacts. A sensitivity analysis approach based on LCA and ecodesign is proposed in this paper. The key environmental performance factors which have significant influence on the products’ environmental impacts can be identified by analyzing the relationship between environmental impacts and the design parameters. Users without much environmental knowledge can use this approach to determine which design parameter should be first considered when (redesigning a product. A printed circuit board (PCB case study is conducted; eight design parameters are chosen to be analyzed by our approach. The result shows that the carbon dioxide emission during the PCB manufacture is highly sensitive to the area of PCB panel.

  14. Robustness bounds and practical limitations of quantum key distribution

    International Nuclear Information System (INIS)

    Khalique, Aeysha

    2008-01-01

    Quantum information theory is a modern branch of theoretical physics. One of its main goals is to interpret concepts of quantum physics. This leads to a deeper understanding of quantum theory. The most common examples of practical applications of basic quantum theory are quantum computation and quantum cryptography. Quantum cryptography provides secure communication between legitimate users even in the presence of an adversary by making possible the distribution of a secret key. It then allows error correction and privacy amplification, which is elimination of adversary information, through classical communication. In this thesis two important aspects of quantum key distribution are covered, namely robustness bounds with respect to provable entanglement for ideal protocols and practical quantum key distribution using two-way classical communication. In part one of the thesis, ideal quantum key distribution protocols and their robustness in terms of provable entanglement are discussed. The robustness bounds are proved for most general coherent attacks. These bounds for provable entanglement are already known to be 25% for the four-state protocol and 33% for the six-state protocol. We anticipate to provide a region in which the legitimate users share entanglement. This region is large for the four-state protocol and is reduced to a smaller region for the six-state protocol because of additional constraint on it. We also investigate the information cost which the adversary has to pay in order to reach these bounds. In part two we adopt a more practical approach. We investigate the limitation on distance of secure communication because of practical restrictions. In particular we investigate the restrictions due to the lack of single photon sources, the lossy channel and faulty detectors. These practical limitations have already been observed using one-way classical communication between legitimate users. It has been observed that it is actually the dark count rate that

  15. Key Clinical Features to Identify Girls with "CDKL5" Mutations

    Science.gov (United States)

    Bahi-Buisson, Nadia; Nectoux, Juliette; Rosas-Vargas, Haydee; Milh, Mathieu; Boddaert, Nathalie; Girard, Benoit; Cances, Claude; Ville, Dorothee; Afenjar, Alexandra; Rio, Marlene; Heron, Delphine; Morel, Marie Ange N'Guyen; Arzimanoglou, Alexis; Philippe, Christophe; Jonveaux, Philippe; Chelly, Jamel; Bienvenu, Thierry

    2008-01-01

    Mutations in the human X-linked cyclin-dependent kinase-like 5 ("CDKL5") gene have been shown to cause infantile spasms as well as Rett syndrome (RTT)-like phenotype. To date, less than 25 different mutations have been reported. So far, there are still little data on the key clinical diagnosis criteria and on the natural history of…

  16. Human-automation collaboration in manufacturing: identifying key implementation factors

    OpenAIRE

    Charalambous, George; Fletcher, Sarah; Webb, Philip

    2013-01-01

    Human-automation collaboration refers to the concept of human operators and intelligent automation working together interactively within the same workspace without conventional physical separation. This concept has commanded significant attention in manufacturing because of the potential applications, such as the installation of large sub-assemblies. However, the key human factors relevant to human-automation collaboration have not yet been fully investigated. To maximise effective implement...

  17. Identifying the Key Weaknesses in Network Security at Colleges.

    Science.gov (United States)

    Olsen, Florence

    2000-01-01

    A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)

  18. Identifying key nodes in multilayer networks based on tensor decomposition.

    Science.gov (United States)

    Wang, Dingjie; Wang, Haitao; Zou, Xiufen

    2017-06-01

    The identification of essential agents in multilayer networks characterized by different types of interactions is a crucial and challenging topic, one that is essential for understanding the topological structure and dynamic processes of multilayer networks. In this paper, we use the fourth-order tensor to represent multilayer networks and propose a novel method to identify essential nodes based on CANDECOMP/PARAFAC (CP) tensor decomposition, referred to as the EDCPTD centrality. This method is based on the perspective of multilayer networked structures, which integrate the information of edges among nodes and links between different layers to quantify the importance of nodes in multilayer networks. Three real-world multilayer biological networks are used to evaluate the performance of the EDCPTD centrality. The bar chart and ROC curves of these multilayer networks indicate that the proposed approach is a good alternative index to identify real important nodes. Meanwhile, by comparing the behavior of both the proposed method and the aggregated single-layer methods, we demonstrate that neglecting the multiple relationships between nodes may lead to incorrect identification of the most versatile nodes. Furthermore, the Gene Ontology functional annotation demonstrates that the identified top nodes based on the proposed approach play a significant role in many vital biological processes. Finally, we have implemented many centrality methods of multilayer networks (including our method and the published methods) and created a visual software based on the MATLAB GUI, called ENMNFinder, which can be used by other researchers.

  19. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  20. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  1. Numerical limit analysis of keyed shear joints in concrete structures

    DEFF Research Database (Denmark)

    Herfelt, Morten Andersen; Poulsen, Peter Noe; Hoang, Linh Cao

    2016-01-01

    This paper concerns the shear capacity of keyed joints, which are transversely reinforced with overlapping U-bar loops. It is known from experimental studies that the discontinuity of the transverse reinforcement affects the capacity as well as the failure mode; however, to the best knowledge...... theorem and uses the modified Mohr-Coulomb yield criterion, which is formulated for second-order cone programming. The model provides a statically admissible stress field as well as the failure mode. Twenty-four different test specimens are modelled and the calculations are compared to the experimental...

  2. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  3. Identifying Key Performance Indicators for Holistic Hospital Management with a Modified DEMATEL Approach.

    Science.gov (United States)

    Si, Sheng-Li; You, Xiao-Yue; Liu, Hu-Chen; Huang, Jia

    2017-08-19

    Performance analysis is an important way for hospitals to achieve higher efficiency and effectiveness in providing services to their customers. The performance of the healthcare system can be measured by many indicators, but it is difficult to improve them simultaneously due to the limited resources. A feasible way is to identify the central and influential indicators to improve healthcare performance in a stepwise manner. In this paper, we propose a hybrid multiple criteria decision making (MCDM) approach to identify key performance indicators (KPIs) for holistic hospital management. First, through integrating evidential reasoning approach and interval 2-tuple linguistic variables, various assessments of performance indicators provided by healthcare experts are modeled. Then, the decision making trial and evaluation laboratory (DEMATEL) technique is adopted to build an interactive network and visualize the causal relationships between the performance indicators. Finally, an empirical case study is provided to demonstrate the proposed approach for improving the efficiency of healthcare management. The results show that "accidents/adverse events", "nosocomial infection", ''incidents/errors", "number of operations/procedures" are significant influential indicators. Also, the indicators of "length of stay", "bed occupancy" and "financial measures" play important roles in performance evaluation of the healthcare organization. The proposed decision making approach could be considered as a reference for healthcare administrators to enhance the performance of their healthcare institutions.

  4. Experimental infections with Mycoplasma agalactiae identify key factors involved in host-colonization.

    Directory of Open Access Journals (Sweden)

    Eric Baranowski

    Full Text Available Mechanisms underlying pathogenic processes in mycoplasma infections are poorly understood, mainly because of limited sequence similarities with classical, bacterial virulence factors. Recently, large-scale transposon mutagenesis in the ruminant pathogen Mycoplasma agalactiae identified the NIF locus, including nifS and nifU, as essential for mycoplasma growth in cell culture, while dispensable in axenic media. To evaluate the importance of this locus in vivo, the infectivity of two knock-out mutants was tested upon experimental infection in the natural host. In this model, the parental PG2 strain was able to establish a systemic infection in lactating ewes, colonizing various body sites such as lymph nodes and the mammary gland, even when inoculated at low doses. In these PG2-infected ewes, we observed over the course of infection (i the development of a specific antibody response and (ii dynamic changes in expression of M. agalactiae surface variable proteins (Vpma, with multiple Vpma profiles co-existing in the same animal. In contrast and despite a sensitive model, none of the knock-out mutants were able to survive and colonize the host. The extreme avirulent phenotype of the two mutants was further supported by the absence of an IgG response in inoculated animals. The exact role of the NIF locus remains to be elucidated but these data demonstrate that it plays a key role in the infectious process of M. agalactiae and most likely of other pathogenic mycoplasma species as many carry closely related homologs.

  5. Identifying Key Stakeholders in Blended Tertiary Environments: Experts' Perspectives

    Science.gov (United States)

    Tuapawa, Kimberley

    2017-01-01

    Although key stakeholders in blended tertiary environments (BTEs) fulfil an extraordinary role in higher education, significant gaps in knowledge about their identities may be impeding the provision of stakeholder support, limiting their ability to promote effective learning and teaching. As online growth intensifies, it is critical that tertiary…

  6. A User Centered Innovation Approach Identifying Key User Values for the E-Newspaper

    OpenAIRE

    Carina Ihlström Eriksson; Jesper Svensson

    2009-01-01

    We have studied the pre-adoption phase of the e-newspaper, i.e. a newspaper published with e-paper technology. The research question of this article is: In what way can a user centered innovation process contribute to identifying key values in mobile innovations? The aim of this article is threefold: firstly, to identify key values for the e-newspaper, secondly, to examine the intention to adopt a new possible innovation and thirdly, to explore user centered design processes ability to captur...

  7. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-05-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then

  8. Key Issues in Empirically Identifying Chronically Low-Performing and Turnaround Schools

    Science.gov (United States)

    Hansen, Michael

    2012-01-01

    One of the US Department of Education's key priorities is turning around the nation's persistently low-achieving schools, yet exactly how to identify low-performing schools is a task left to state policy makers, and a myriad of definitions have been utilized. In addition, exactly how to recognize when a school begins to turn around is not well…

  9. Integrated systems approach identifies risk regulatory pathways and key regulators in coronary artery disease.

    Science.gov (United States)

    Zhang, Yan; Liu, Dianming; Wang, Lihong; Wang, Shuyuan; Yu, Xuexin; Dai, Enyu; Liu, Xinyi; Luo, Shanshun; Jiang, Wei

    2015-12-01

    Coronary artery disease (CAD) is the most common type of heart disease. However, the molecular mechanisms of CAD remain elusive. Regulatory pathways are known to play crucial roles in many pathogenic processes. Thus, inferring risk regulatory pathways is an important step toward elucidating the mechanisms underlying CAD. With advances in high-throughput data, we developed an integrated systems approach to identify CAD risk regulatory pathways and key regulators. Firstly, a CAD-related core subnetwork was identified from a curated transcription factor (TF) and microRNA (miRNA) regulatory network based on a random walk algorithm. Secondly, candidate risk regulatory pathways were extracted from the subnetwork by applying a breadth-first search (BFS) algorithm. Then, risk regulatory pathways were prioritized based on multiple CAD-associated data sources. Finally, we also proposed a new measure to prioritize upstream regulators. We inferred that phosphatase and tensin homolog (PTEN) may be a key regulator in the dysregulation of risk regulatory pathways. This study takes a closer step than the identification of disease subnetworks or modules. From the risk regulatory pathways, we could understand the flow of regulatory information in the initiation and progression of the disease. Our approach helps to uncover its potential etiology. We developed an integrated systems approach to identify risk regulatory pathways. We proposed a new measure to prioritize the key regulators in CAD. PTEN may be a key regulator in dysregulation of the risk regulatory pathways.

  10. Identifying the impacts of climate change on key pests and diseases of plant and animal industries

    International Nuclear Information System (INIS)

    Luck, Jo; Aurambout, Jean-Philippe; Finlay, Kyla; Azuloas, Joe; Constable, Fiona; Rijswijk, Bonny Rowles-Van

    2007-01-01

    Full text: Full text: Climate change is increasingly recognised as a major threat to natural and agricultural systems. Understanding these threats will enable government and primary industries to better prepare and adapt to climate change. While observations of climate change are well documented, the potential effects on pests, pathogens and their hosts are not clearly understood. To address this, a review of the potential impacts on plant biosecurity was undertaken to determine the effects of climate change on the behaviour and distribution of emergent plant pests and pathogens. The review identified increasing C02 and temperature, decreasing frost events, heavy and unseasonal rains, increased humidity, drought, cyclones and hurricanes, and warmer winter temperatures as influencing the behaviour of plant pests and pathogens. To study the effects of these changes in detail, three key plant biosecurity threats were analysed in case studies; wheat stripe rust, silver leaf whitefly and citrus canker. The predicted distribution of citrus canker was examined with increasing temperature scenarios using the bioclimatic model CLIMEX. The model predicted a southerly shift in the geographic range of the causal organism which would threaten the major southern citrus growing regions in future climates. A similar study on Bluetongue disease of sheep, spread by the Culicoides midge, also predicted a southerly shift in the vector's geographic range. Significant limitations were identified with bioclimatic modelling when examining the effects of climate change on pests and diseases. The model was unable to assess the plant and animal response to increasing temperature in conjunction with the pest. Also the influence of temperature on the life cycle of the organism, pathogenicity of strains, competition with other species, host coverage and the general effect on the biology of the organism could not be assessed. To begin to address this, a dynamic model was constructed using daily

  11. Iterative key-residues interrogation of a phytase with thermostability increasing substitutions identified in directed evolution.

    Science.gov (United States)

    Shivange, Amol V; Roccatano, Danilo; Schwaneberg, Ulrich

    2016-01-01

    Bacterial phytases have attracted industrial interest as animal feed supplement due to their high activity and sufficient thermostability (required for feed pelleting). We devised an approach named KeySIDE,  an iterative Key-residues interrogation of the wild type with Substitutions Identified in Directed Evolution for improving Yersinia mollaretii phytase (Ymphytase) thermostability by combining key beneficial substitutions and elucidating their individual roles. Directed evolution yielded in a discovery of nine positions in Ymphytase and combined iteratively to identify key positions. The "best" combination (M6: T77K, Q154H, G187S, and K289Q) resulted in significantly improved thermal resistance; the residual activity improved from 35 % (wild type) to 89 % (M6) at 58 °C and 20-min incubation. Melting temperature increased by 3 °C in M6 without a loss of specific activity. Molecular dynamics simulation studies revealed reduced flexibility in the loops located next to helices (B, F, and K) which possess substitutions (Helix-B: T77K, Helix-F: G187S, and Helix-K: K289E/Q). Reduced flexibility in the loops might be caused by strengthened hydrogen bonding network (e.g., G187S and K289E/K289Q) and a salt bridge (T77K). Our results demonstrate a promising approach to design phytases in food research, and we hope that the KeySIDE might become an attractive approach for understanding of structure-function relationships of enzymes.

  12. Identifying key performance indicators for nursing and midwifery care using a consensus approach.

    Science.gov (United States)

    McCance, Tanya; Telford, Lorna; Wilson, Julie; Macleod, Olive; Dowd, Audrey

    2012-04-01

    The aim of this study was to gain consensus on key performance indicators that are appropriate and relevant for nursing and midwifery practice in the current policy context. There is continuing demand to demonstrate effectiveness and efficiency in health and social care and to communicate this at boardroom level. Whilst there is substantial literature on the use of clinical indicators and nursing metrics, there is less evidence relating to indicators that reflect the patient experience. A consensus approach was used to identify relevant key performance indicators. A nominal group technique was used comprising two stages: a workshop involving all grades of nursing and midwifery staff in two HSC trusts in Northern Ireland (n = 50); followed by a regional Consensus Conference (n = 80). During the workshop, potential key performance indicators were identified. This was used as the basis for the Consensus Conference, which involved two rounds of consensus. Analysis was based on aggregated scores that were then ranked. Stage one identified 38 potential indicators and stage two prioritised the eight top-ranked indicators as a core set for nursing and midwifery. The relevance and appropriateness of these indicators were confirmed with nurses and midwives working in a range of settings and from the perspective of service users. The eight indicators identified do not conform to the majority of other nursing metrics generally reported in the literature. Furthermore, they are strategically aligned to work on the patient experience and are reflective of the fundamentals of nursing and midwifery practice, with the focus on person-centred care. Nurses and midwives have a significant contribution to make in determining the extent to which these indicators are achieved in practice. Furthermore, measurement of such indicators provides an opportunity to evidence of the unique impact of nursing/midwifery care on the patient experience. © 2011 Blackwell Publishing Ltd.

  13. Postsecondary Students With Psychiatric Disabilities Identify Core Services and Key Ingredients to Supporting Education Goals.

    Science.gov (United States)

    Biebel, Kathleen; Mizrahi, Raphael; Ringeisen, Heather

    2017-10-26

    Accessing and successfully completing postsecondary educational opportunities may be challenging for those living with psychiatric disabilities. This exploratory study highlights the experiences of individuals with psychiatric disabilities participating in postsecondary educational support initiatives. Investigators conducted case studies with 3 education support initiatives across the United States. Focus groups revealed what concrete supported education services were helpful and key ingredients in delivering education supports. Access to specialists, mindfulness techniques, help with time management and procrastination, and facilitating classroom accommodations were identified as critical. Developing authentic relationships with supported education staff, flexibility in service delivery and access to student peers living with psychiatric disabilities were noted as key ingredients in service delivery. Incorporating the voice of students with psychiatric disabilities into supported education services can increase access, involvement, and retention, therein providing more supports to students with psychiatric disabilities achieving their postsecondary education goals. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  14. Methods of Developing User-Friendly Keys to Identify Green Sea Turtles (Chelonia mydas L. from Photographs

    Directory of Open Access Journals (Sweden)

    Jane R. Lloyd

    2012-01-01

    Full Text Available Identifying individual animals is important in understanding their ecology and behaviour, as well as providing estimates of population sizes for conservation efforts. We produce identification keys from photographs of green sea turtles to identify them while foraging in Akumal Bay, Mexico. We create three keys, which (a minimise the length of the key, (b present the most obvious differential characteristics first, and (c remove the strict dichotomy from key b. Keys were capable of identifying >99% of turtles in >2500 photographs during the six-month study period. The keys differed significantly in success rate for students to identify individual turtles, with key (c being the best with >70% success and correctly being followed further than other keys before making a mistake. User-friendly keys are, therefore, a suitable method for the photographic identification of turtles and could be used for other large marine vertebrates in conservation or behavioural studies.

  15. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana

    OpenAIRE

    Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original mult...

  16. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana.

    Science.gov (United States)

    Engel, Julien; Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original multi-access electronic key for the identification of 389 tree genera occurring in French Guiana terra-firme forests, based on a set of 79 morphological characters related to vegetative, floral and fruit characters. Its purpose is to help Amazonian tree identification and to support the dissemination of botanical knowledge to non-specialists, including forest workers, students and researchers from other scientific disciplines. The electronic key is accessible with the free access software Xper ², and the database is publicly available on figshare: https://figshare.com/s/75d890b7d707e0ffc9bf (doi: 10.6084/m9.figshare.2682550).

  17. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters.

    Science.gov (United States)

    Lucamarini, M; Yuan, Z L; Dynes, J F; Shields, A J

    2018-05-01

    Quantum key distribution (QKD) 1,2 allows two distant parties to share encryption keys with security based on physical laws. Experimentally, QKD has been implemented via optical means, achieving key rates of 1.26 megabits per second over 50 kilometres of standard optical fibre 3 and of 1.16 bits per hour over 404 kilometres of ultralow-loss fibre in a measurement-device-independent configuration 4 . Increasing the bit rate and range of QKD is a formidable, but important, challenge. A related target, which is currently considered to be unfeasible without quantum repeaters 5-7 , is overcoming the fundamental rate-distance limit of QKD 8 . This limit defines the maximum possible secret key rate that two parties can distil at a given distance using QKD and is quantified by the secret-key capacity of the quantum channel 9 that connects the parties. Here we introduce an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station. Fields imparted with the same random phase are 'twins' and can be used to distil a quantum key. The key rate of this twin-field QKD exhibits the same dependence on distance as does a quantum repeater, scaling with the square-root of the channel transmittance, irrespective of who (malicious or otherwise) is in control of the measuring station. However, unlike schemes that involve quantum repeaters, ours is feasible with current technology and presents manageable levels of noise even on 550 kilometres of standard optical fibre. This scheme is a promising step towards overcoming the rate-distance limit of QKD and greatly extending the range of secure quantum communications.

  18. Identifying and characterizing key nodes among communities based on electrical-circuit networks.

    Science.gov (United States)

    Zhu, Fenghui; Wang, Wenxu; Di, Zengru; Fan, Ying

    2014-01-01

    Complex networks with community structures are ubiquitous in the real world. Despite many approaches developed for detecting communities, we continue to lack tools for identifying overlapping and bridging nodes that play crucial roles in the interactions and communications among communities in complex networks. Here we develop an algorithm based on the local flow conservation to effectively and efficiently identify and distinguish the two types of nodes. Our method is applicable in both undirected and directed networks without a priori knowledge of the community structure. Our method bypasses the extremely challenging problem of partitioning communities in the presence of overlapping nodes that may belong to multiple communities. Due to the fact that overlapping and bridging nodes are of paramount importance in maintaining the function of many social and biological networks, our tools open new avenues towards understanding and controlling real complex networks with communities accompanied with the key nodes.

  19. Experimental quantum key distribution with simulated ground-to-satellite photon losses and processing limitations

    Science.gov (United States)

    Bourgoin, Jean-Philippe; Gigov, Nikolay; Higgins, Brendon L.; Yan, Zhizhong; Meyer-Scott, Evan; Khandani, Amir K.; Lütkenhaus, Norbert; Jennewein, Thomas

    2015-11-01

    Quantum key distribution (QKD) has the potential to improve communications security by offering cryptographic keys whose security relies on the fundamental properties of quantum physics. The use of a trusted quantum receiver on an orbiting satellite is the most practical near-term solution to the challenge of achieving long-distance (global-scale) QKD, currently limited to a few hundred kilometers on the ground. This scenario presents unique challenges, such as high photon losses and restricted classical data transmission and processing power due to the limitations of a typical satellite platform. Here we demonstrate the feasibility of such a system by implementing a QKD protocol, with optical transmission and full post-processing, in the high-loss regime using minimized computing hardware at the receiver. Employing weak coherent pulses with decoy states, we demonstrate the production of secure key bits at up to 56.5 dB of photon loss. We further illustrate the feasibility of a satellite uplink by generating a secure key while experimentally emulating the varying losses predicted for realistic low-Earth-orbit satellite passes at 600 km altitude. With a 76 MHz source and including finite-size analysis, we extract 3374 bits of a secure key from the best pass. We also illustrate the potential benefit of combining multiple passes together: while one suboptimal "upper-quartile" pass produces no finite-sized key with our source, the combination of three such passes allows us to extract 165 bits of a secure key. Alternatively, we find that by increasing the signal rate to 300 MHz it would be possible to extract 21 570 bits of a secure finite-sized key in just a single upper-quartile pass.

  20. Identifying and weighting of key performance indicators of knowledge management2.0 in organizations

    Directory of Open Access Journals (Sweden)

    Saeed Khalilazar

    2016-03-01

    Full Text Available Main purpose of this research is identifying and weighting of key performance indicators of knowledge management2.0 in organizations. According to widespread permeation of technology, especially social media in different organizational dimensions and functional view to this phenomenon in knowledge management, performance measurement of this kind of media in order to meet organizational goals seems necessary. KM2.0 key performance indicators in this article has been identified and weighted through Delphi methodology, via questionnaire in three rounds. KM2.0 KPIs which are identified and weighted in this article are applicable in organizations that are eager to implement KM2.0 initiative and they can measure the performance of KM2.0 activities therefore this research is applicable in goal oriented approach. According to the results, KM2.0 participation process consists of 3 stages and 8 steps as mentioned below: First stage which is presence, consists of 3 steps which are registration, visit and download. Second stage which is feedback consists of 3 steps which are conversation, applause and amplification. Finally, third stage which is creation consists of 2 steps which are codification and personalization. Ultimate contribution of this research is identifying and weighting KPIs of KM2.0 in conceptual framework of KM2.0. Based on developing a conceptual framework and participation process in KM2.0 and listing related KPIs as an applicable solution in order to measure and improve the performance of organizational social media, this research has unique innovation among related and other articles.

  1. Identifying Key Drivers of Return Reversal with Dynamical Bayesian Factor Graph.

    Directory of Open Access Journals (Sweden)

    Shuai Zhao

    Full Text Available In the stock market, return reversal occurs when investors sell overbought stocks and buy oversold stocks, reversing the stocks' price trends. In this paper, we develop a new method to identify key drivers of return reversal by incorporating a comprehensive set of factors derived from different economic theories into one unified dynamical Bayesian factor graph. We then use the model to depict factor relationships and their dynamics, from which we make some interesting discoveries about the mechanism behind return reversals. Through extensive experiments on the US stock market, we conclude that among the various factors, the liquidity factors consistently emerge as key drivers of return reversal, which is in support of the theory of liquidity effect. Specifically, we find that stocks with high turnover rates or high Amihud illiquidity measures have a greater probability of experiencing return reversals. Apart from the consistent drivers, we find other drivers of return reversal that generally change from year to year, and they serve as important characteristics for evaluating the trends of stock returns. Besides, we also identify some seldom discussed yet enlightening inter-factor relationships, one of which shows that stocks in Finance and Insurance industry are more likely to have high Amihud illiquidity measures in comparison with those in other industries. These conclusions are robust for return reversals under different thresholds.

  2. Identifying Key Stakeholder Groups for Implementing a Place Branding Policy in Saint Petersburg

    Directory of Open Access Journals (Sweden)

    Kulibanova V. V.

    2017-10-01

    Full Text Available Regional brands have become a valuable intangible asset and a crucial competitive resource for forging partnerships. An effective place branding policy is impossible without a precise understanding of the interests of stakeholder groups. It is essential to realize that each region is unique in its own way. Territories differ in the structure of stakeholders, their influence on regional development, and the range of leverages over regional decision-makers. This study aims to give a more precise definition of key groups of stakeholders in Saint Petersburg place branding, and to identify them. The authors employ the method of theoretical and empirical typology of a territory’s stakeholders within a theoretical framework proposed by E. Freeman, P. Kotler, S. Zenker, and E. Brown. The article defines the concept of key regional stakeholders and identifies them. The proposed target audience (stakeholder group model for a place branding policy is tested on the case of Saint Petersburg. The authors show that each target audience of place marketing requires an individual policy. This is explained by the fact that each group enjoys its unique features that should be taken into account when creating and transmitting messages.

  3. Bayesian inference for partially identified models exploring the limits of limited data

    CERN Document Server

    Gustafson, Paul

    2015-01-01

    Introduction Identification What Is against Us? What Is for Us? Some Simple Examples of Partially Identified ModelsThe Road Ahead The Structure of Inference in Partially Identified Models Bayesian Inference The Structure of Posterior Distributions in PIMs Computational Strategies Strength of Bayesian Updating, Revisited Posterior MomentsCredible Intervals Evaluating the Worth of Inference Partial Identification versus Model Misspecification The Siren Call of Identification Comp

  4. Identifying key radiogenomic associations between DCE-MRI and micro-RNA expressions for breast cancer

    Science.gov (United States)

    Samala, Ravi K.; Chan, Heang-Ping; Hadjiiski, Lubomir; Helvie, Mark A.; Kim, Renaid

    2017-03-01

    Understanding the key radiogenomic associations for breast cancer between DCE-MRI and micro-RNA expressions is the foundation for the discovery of radiomic features as biomarkers for assessing tumor progression and prognosis. We conducted a study to analyze the radiogenomic associations for breast cancer using the TCGA-TCIA data set. The core idea that tumor etiology is a function of the behavior of miRNAs is used to build the regression models. The associations based on regression are analyzed for three study outcomes: diagnosis, prognosis, and treatment. The diagnosis group consists of miRNAs associated with clinicopathologic features of breast cancer and significant aberration of expression in breast cancer patients. The prognosis group consists of miRNAs which are closely associated with tumor suppression and regulation of cell proliferation and differentiation. The treatment group consists of miRNAs that contribute significantly to the regulation of metastasis thereby having the potential to be part of therapeutic mechanisms. As a first step, important miRNA expressions were identified and their ability to classify the clinical phenotypes based on the study outcomes was evaluated using the area under the ROC curve (AUC) as a figure-of-merit. The key mapping between the selected miRNAs and radiomic features were determined using least absolute shrinkage and selection operator (LASSO) regression analysis within a two-loop leave-one-out cross-validation strategy. These key associations indicated a number of radiomic features from DCE-MRI to be potential biomarkers for the three study outcomes.

  5. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    Directory of Open Access Journals (Sweden)

    Hualin Xie

    2014-02-01

    Full Text Available Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability.

  6. [Key effect genes responding to nerve injury identified by gene ontology and computer pattern recognition].

    Science.gov (United States)

    Pan, Qian; Peng, Jin; Zhou, Xue; Yang, Hao; Zhang, Wei

    2012-07-01

    In order to screen out important genes from large gene data of gene microarray after nerve injury, we combine gene ontology (GO) method and computer pattern recognition technology to find key genes responding to nerve injury, and then verify one of these screened-out genes. Data mining and gene ontology analysis of gene chip data GSE26350 was carried out through MATLAB software. Cd44 was selected from screened-out key gene molecular spectrum by comparing genes' different GO terms and positions on score map of principal component. Function interferences were employed to influence the normal binding of Cd44 and one of its ligands, chondroitin sulfate C (CSC), to observe neurite extension. Gene ontology analysis showed that the first genes on score map (marked by red *) mainly distributed in molecular transducer activity, receptor activity, protein binding et al molecular function GO terms. Cd44 is one of six effector protein genes, and attracted us with its function diversity. After adding different reagents into the medium to interfere the normal binding of CSC and Cd44, varying-degree remissions of CSC's inhibition on neurite extension were observed. CSC can inhibit neurite extension through binding Cd44 on the neuron membrane. This verifies that important genes in given physiological processes can be identified by gene ontology analysis of gene chip data.

  7. Identifying the key personnel in a nurse-initiated hospital waste reduction program.

    Science.gov (United States)

    McDermott-Levy, Ruth; Fazzini, Carol

    2010-01-01

    Hospitals in the United States generate more than 6600 tons of trash a day and approximately 85% of the waste is nonhazardous solid waste such as food, cardboard, and plastic. Treatment and management of hospital waste can lead to environmental problems for the communities that receive the waste. One health system's shared governance model provided the foundation to develop a nurse-led hospital waste reduction program that focused on point-of-care waste management. Waste reduction program development required working with a variety of departments within and external to the health system. The interdisciplinary approach informed the development of the waste reduction program. This article identifies the key departments that were necessary to include when developing a hospital waste reduction program.

  8. Identifying Determinants of Organizational Development as the Key Developers of Employee Soft Skill

    Directory of Open Access Journals (Sweden)

    Shahjahan Laghari

    2016-10-01

    Full Text Available The purpose of this article is to identify the determinants of organizational development as the key developers of employee soft skills. Various studies have been taken where determinants of organizational development defining soft skills in employees are discussed. However, the current study is different in Pakistani industry context as the link was missing about the determinants of organizational development which in synchronized way help in developing soft skills in employees of firm. This research uses explanatory approach; incorporating secondary data extracted under the light of existing school of thoughts paired with quantification through data collected from respondents in Pakistani corporate sector. Hypotheses are tested using structural equation model (SEM technique. Results This research showed an affirmative link between determinants of organizational development and development of soft skills in employees. Finally, the study proposes enriching insights on few missing links that can be researched and triggered achieving maximized outcomes.

  9. A mouse model of alcoholic liver fibrosis-associated acute kidney injury identifies key molecular pathways

    International Nuclear Information System (INIS)

    Furuya, Shinji; Chappell, Grace A.; Iwata, Yasuhiro; Uehara, Takeki; Kato, Yuki; Kono, Hiroshi; Bataller, Ramon; Rusyn, Ivan

    2016-01-01

    Clinical data strongly indicate that acute kidney injury (AKI) is a critical complication in alcoholic hepatitis, an acute-on-chronic form of liver failure in patients with advanced alcoholic fibrosis. Development of targeted therapies for AKI in this setting is hampered by the lack of an animal model. To enable research into molecular drivers and novel therapies for fibrosis- and alcohol-associated AKI, we aimed to combine carbon tetrachloride (CCl 4 )-induced fibrosis with chronic intra-gastric alcohol feeding. Male C57BL/6J mice were administered a low dose of CCl 4 (0.2 ml/kg 2 × week/6 weeks) followed by alcohol intragastrically (up to 25 g/kg/day for 3 weeks) and with continued CCl 4 . We observed that combined treatment with CCl 4 and alcohol resulted in severe liver injury, more pronounced than using each treatment alone. Importantly, severe kidney injury was evident only in the combined treatment group. This mouse model reproduced distinct pathological features consistent with AKI in human alcoholic hepatitis. Transcriptomic analysis of kidneys revealed profound effects in the combined treatment group, with enrichment for damage-associated pathways, such as apoptosis, inflammation, immune-response and hypoxia. Interestingly, Havcr1 and Lcn2, biomarkers of AKI, were markedly up-regulated. Overall, this study established a novel mouse model of fibrosis- and alcohol-associated AKI and identified key mechanistic pathways. - Highlights: • Acute kidney injury (AKI) is a critical complication in alcoholic hepatitis • We developed a novel mouse model of fibrosis- and alcohol-associated AKI • This model reproduces key molecular and pathological features of human AKI • This animal model can help identify new targeted therapies for alcoholic hepatitis

  10. A mouse model of alcoholic liver fibrosis-associated acute kidney injury identifies key molecular pathways

    Energy Technology Data Exchange (ETDEWEB)

    Furuya, Shinji; Chappell, Grace A.; Iwata, Yasuhiro [Department of Veterinary Integrative Biosciences, Texas A& M University, College Station, TX (United States); Uehara, Takeki; Kato, Yuki [Laboratory of Veterinary Pathology, Osaka Prefecture University, Osaka (Japan); Kono, Hiroshi [First Department of Surgery, University of Yamanashi, Yamanashi (Japan); Bataller, Ramon [Division of Gastroenterology & Hepatology, Department of Medicine, University of North Carolina, Chapel Hill, NC (United States); Rusyn, Ivan, E-mail: irusyn@tamu.edu [Department of Veterinary Integrative Biosciences, Texas A& M University, College Station, TX (United States)

    2016-11-01

    Clinical data strongly indicate that acute kidney injury (AKI) is a critical complication in alcoholic hepatitis, an acute-on-chronic form of liver failure in patients with advanced alcoholic fibrosis. Development of targeted therapies for AKI in this setting is hampered by the lack of an animal model. To enable research into molecular drivers and novel therapies for fibrosis- and alcohol-associated AKI, we aimed to combine carbon tetrachloride (CCl{sub 4})-induced fibrosis with chronic intra-gastric alcohol feeding. Male C57BL/6J mice were administered a low dose of CCl{sub 4} (0.2 ml/kg 2 × week/6 weeks) followed by alcohol intragastrically (up to 25 g/kg/day for 3 weeks) and with continued CCl{sub 4}. We observed that combined treatment with CCl{sub 4} and alcohol resulted in severe liver injury, more pronounced than using each treatment alone. Importantly, severe kidney injury was evident only in the combined treatment group. This mouse model reproduced distinct pathological features consistent with AKI in human alcoholic hepatitis. Transcriptomic analysis of kidneys revealed profound effects in the combined treatment group, with enrichment for damage-associated pathways, such as apoptosis, inflammation, immune-response and hypoxia. Interestingly, Havcr1 and Lcn2, biomarkers of AKI, were markedly up-regulated. Overall, this study established a novel mouse model of fibrosis- and alcohol-associated AKI and identified key mechanistic pathways. - Highlights: • Acute kidney injury (AKI) is a critical complication in alcoholic hepatitis • We developed a novel mouse model of fibrosis- and alcohol-associated AKI • This model reproduces key molecular and pathological features of human AKI • This animal model can help identify new targeted therapies for alcoholic hepatitis.

  11. Exploring the effects of spatial autocorrelation when identifying key drivers of wildlife crop-raiding.

    Science.gov (United States)

    Songhurst, Anna; Coulson, Tim

    2014-03-01

    Few universal trends in spatial patterns of wildlife crop-raiding have been found. Variations in wildlife ecology and movements, and human spatial use have been identified as causes of this apparent unpredictability. However, varying spatial patterns of spatial autocorrelation (SA) in human-wildlife conflict (HWC) data could also contribute. We explicitly explore the effects of SA on wildlife crop-raiding data in order to facilitate the design of future HWC studies. We conducted a comparative survey of raided and nonraided fields to determine key drivers of crop-raiding. Data were subsampled at different spatial scales to select independent raiding data points. The model derived from all data was fitted to subsample data sets. Model parameters from these models were compared to determine the effect of SA. Most methods used to account for SA in data attempt to correct for the change in P-values; yet, by subsampling data at broader spatial scales, we identified changes in regression estimates. We consequently advocate reporting both model parameters across a range of spatial scales to help biological interpretation. Patterns of SA vary spatially in our crop-raiding data. Spatial distribution of fields should therefore be considered when choosing the spatial scale for analyses of HWC studies. Robust key drivers of elephant crop-raiding included raiding history of a field and distance of field to a main elephant pathway. Understanding spatial patterns and determining reliable socio-ecological drivers of wildlife crop-raiding is paramount for designing mitigation and land-use planning strategies to reduce HWC. Spatial patterns of HWC are complex, determined by multiple factors acting at more than one scale; therefore, studies need to be designed with an understanding of the effects of SA. Our methods are accessible to a variety of practitioners to assess the effects of SA, thereby improving the reliability of conservation management actions.

  12. Predictive model identifies key network regulators of cardiomyocyte mechano-signaling.

    Directory of Open Access Journals (Sweden)

    Philip M Tan

    2017-11-01

    Full Text Available Mechanical strain is a potent stimulus for growth and remodeling in cells. Although many pathways have been implicated in stretch-induced remodeling, the control structures by which signals from distinct mechano-sensors are integrated to modulate hypertrophy and gene expression in cardiomyocytes remain unclear. Here, we constructed and validated a predictive computational model of the cardiac mechano-signaling network in order to elucidate the mechanisms underlying signal integration. The model identifies calcium, actin, Ras, Raf1, PI3K, and JAK as key regulators of cardiac mechano-signaling and characterizes crosstalk logic imparting differential control of transcription by AT1R, integrins, and calcium channels. We find that while these regulators maintain mostly independent control over distinct groups of transcription factors, synergy between multiple pathways is necessary to activate all the transcription factors necessary for gene transcription and hypertrophy. We also identify a PKG-dependent mechanism by which valsartan/sacubitril, a combination drug recently approved for treating heart failure, inhibits stretch-induced hypertrophy, and predict further efficacious pairs of drug targets in the network through a network-wide combinatorial search.

  13. Modelling Creativity: Identifying Key Components through a Corpus-Based Approach.

    Science.gov (United States)

    Jordanous, Anna; Keller, Bill

    2016-01-01

    Creativity is a complex, multi-faceted concept encompassing a variety of related aspects, abilities, properties and behaviours. If we wish to study creativity scientifically, then a tractable and well-articulated model of creativity is required. Such a model would be of great value to researchers investigating the nature of creativity and in particular, those concerned with the evaluation of creative practice. This paper describes a unique approach to developing a suitable model of how creative behaviour emerges that is based on the words people use to describe the concept. Using techniques from the field of statistical natural language processing, we identify a collection of fourteen key components of creativity through an analysis of a corpus of academic papers on the topic. Words are identified which appear significantly often in connection with discussions of the concept. Using a measure of lexical similarity to help cluster these words, a number of distinct themes emerge, which collectively contribute to a comprehensive and multi-perspective model of creativity. The components provide an ontology of creativity: a set of building blocks which can be used to model creative practice in a variety of domains. The components have been employed in two case studies to evaluate the creativity of computational systems and have proven useful in articulating achievements of this work and directions for further research.

  14. Computational modeling identifies key gene regulatory interactions underlying phenobarbital-mediated tumor promotion

    Science.gov (United States)

    Luisier, Raphaëlle; Unterberger, Elif B.; Goodman, Jay I.; Schwarz, Michael; Moggs, Jonathan; Terranova, Rémi; van Nimwegen, Erik

    2014-01-01

    Gene regulatory interactions underlying the early stages of non-genotoxic carcinogenesis are poorly understood. Here, we have identified key candidate regulators of phenobarbital (PB)-mediated mouse liver tumorigenesis, a well-characterized model of non-genotoxic carcinogenesis, by applying a new computational modeling approach to a comprehensive collection of in vivo gene expression studies. We have combined our previously developed motif activity response analysis (MARA), which models gene expression patterns in terms of computationally predicted transcription factor binding sites with singular value decomposition (SVD) of the inferred motif activities, to disentangle the roles that different transcriptional regulators play in specific biological pathways of tumor promotion. Furthermore, transgenic mouse models enabled us to identify which of these regulatory activities was downstream of constitutive androstane receptor and β-catenin signaling, both crucial components of PB-mediated liver tumorigenesis. We propose novel roles for E2F and ZFP161 in PB-mediated hepatocyte proliferation and suggest that PB-mediated suppression of ESR1 activity contributes to the development of a tumor-prone environment. Our study shows that combining MARA with SVD allows for automated identification of independent transcription regulatory programs within a complex in vivo tissue environment and provides novel mechanistic insights into PB-mediated hepatocarcinogenesis. PMID:24464994

  15. Identifying key areas for active interprofessional learning partnerships: A facilitated dialogue.

    Science.gov (United States)

    Steven, Kathryn; Angus, Allyson; Breckenridge, Jenna; Davey, Peter; Tully, Vicki; Muir, Fiona

    2016-11-01

    Student and service user involvement is recognised as an important factor in creating interprofessional education (IPE) opportunities. We used a team-based learning approach to bring together undergraduate health professional students, early career professionals (ECPs), public partners, volunteers, and carers to explore learning partnerships. Influenced by evaluative inquiry, this qualitative study used a free text response to allow participants to give their own opinion. A total of 153 participants (50 public partners and 103 students and professionals representing 11 healthcare professions) took part. Participants were divided into mixed groups of six (n = 25) and asked to identify areas where students, professionals, and public could work together to improve health professional education. Each group documented their discussions by summarising agreed areas and next steps. Responses were collected and transcribed for inductive content analysis. Seven key themes (areas for joint working) were identified: communication, public as partners, standards of conduct, IPE, quality improvement, education, and learning environments. The team-based learning format enabled undergraduate and postgraduate health professionals to achieve consensus with public partners on areas for IPE and collaboration. Some of our results may be context-specific but the approach is generalisable to other areas.

  16. Key identifiers and spelling conventions in MXit-lingo as found in conversations with Dr Math

    Directory of Open Access Journals (Sweden)

    Laurie Butgereit

    2012-07-01

    Full Text Available Different human languages look different from other human languages. To use a term from the computer industry, each human language has its own “look and feel”. European English speakers can easily recognise a phrase such as “Comment allez-vous?” as being written in French while the phrase “¿Habla usted español?” is written in Spanish. Each language has its own letter frequencies, word frequencies and other identifiers. This paper describes key identifiers in MXit lingo as found in Dr Math conversations. MXit is a mobile instant messaging system which originated in South Africa and is expanding to other countries. Dr Math is a mobile tutoring system which uses MXit as a communication protocol. Primary and secondary school pupils can receive help with the mathematics homework using the Dr Math tutoring system. The pupils use MXit on their cell phones and the tutors use traditional Internet workstations. After exploring how MXit lingo is written, this paper will briefly explore why MXit lingo is written the way it is. By identifying and describing the orthographic conventions visible in the spelling of MXit lingo, although with some theoretical support, insight into the purposeful and functional nature of written, mobile communication will be revealed. In highlighting spelling that is influenced by Black South African English, an attempt will be made to contribute to the empirical development of a field of study that explores the construction of words used in South African mobile communication. Keywords: MXit, Math, letters, writing, orthography Disciplines: Linguistics, mathematics, information technology

  17. Identifying key drivers of greenhouse gas emissions from biomass feedstocks for energy production

    International Nuclear Information System (INIS)

    Johnson, David R.; Curtright, Aimee E.; Willis, Henry H.

    2013-01-01

    Highlights: • Production emissions dominate transportation and processing emissions. • Choice of feedstock, geographic location and prior land use drive emissions profile. • Within scenarios, emissions variability is driven by uncertainty in yields. • Favorable scenarios maximize carbon storage from direct land-use change. • Similarly, biomass production should attempt to minimize indirect land-use change. -- Abstract: Many policies in the United States, at both the federal and state levels, encourage the adoption of renewable energy from biomass. Though largely motivated by a desire to reduce greenhouse gas emissions, these policies do not explicitly identify scenarios in which the use of biomass will produce the greatest benefits. We have modeled “farm-to-hopper” emissions associated with seven biomass feedstocks, under a wide variety of scenarios and production choices, to characterize the uncertainty in emissions. We demonstrate that only a handful of factors have a significant impact on life cycle emissions: choice of feedstock, geographic location, prior land use, and time dynamics. Within a given production scenario, the remaining variability in emissions is driven by uncertainty in feedstock yields and the release rate of N 2 O into the atmosphere from nitrogen fertilizers. With few exceptions, transport and processing choices have relatively little impact on total emissions. These results illustrate the key decisions that will determine the success of biomass programs in reducing the emissions profile of energy production, and our publicly available model provides a useful tool for identifying the most beneficial production scenarios. While model data and results are restricted to biomass production in the contiguous United States, we provide qualitative guidance for identifying favorable production scenarios that should be applicable in other regions

  18. Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Kramer, Sharon; Previsic, Mirko; Nelson, Peter; Woo, Sheri

    2010-06-17

    Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: 4 wave energy generation technologies 3 tidal energy generation technologies 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal

  19. Genomic Landscape Survey Identifies SRSF1 as a Key Oncodriver in Small Cell Lung Cancer.

    Directory of Open Access Journals (Sweden)

    Liyan Jiang

    2016-04-01

    Full Text Available Small cell lung cancer (SCLC is an aggressive disease with poor survival. A few sequencing studies performed on limited number of samples have revealed potential disease-driving genes in SCLC, however, much still remains unknown, particularly in the Asian patient population. Here we conducted whole exome sequencing (WES and transcriptomic sequencing of primary tumors from 99 Chinese SCLC patients. Dysregulation of tumor suppressor genes TP53 and RB1 was observed in 82% and 62% of SCLC patients, respectively, and more than half of the SCLC patients (62% harbored TP53 and RB1 mutation and/or copy number loss. Additionally, Serine/Arginine Splicing Factor 1 (SRSF1 DNA copy number gain and mRNA over-expression was strongly associated with poor survival using both discovery and validation patient cohorts. Functional studies in vitro and in vivo demonstrate that SRSF1 is important for tumorigenicity of SCLC and may play a key role in DNA repair and chemo-sensitivity. These results strongly support SRSF1 as a prognostic biomarker in SCLC and provide a rationale for personalized therapy in SCLC.

  20. Using the Delphi Technique to Identify Key Elements for Effective and Sustainable Visitor Use Planning Frameworks

    Directory of Open Access Journals (Sweden)

    Jessica P. Fefer

    2016-04-01

    Full Text Available Protected areas around the world receive nearly 800 billion visits/year, with international tourism continuing to increase. While protected areas provide necessary benefits to communities and visitors, the increased visitation may negatively impact the resource and the recreational experience, hence the need to manage visitor use in protected areas around the world. This research focused on obtaining information from experts to document their experiences utilizing one visitor use planning framework: Visitor Experience and Resource Protection (VERP. Using the Delphi Technique, 31 experts from seven regions around the world were asked to identify elements necessary for effective visitor management, as well as elements that facilitated or limited success when using VERP. Elements were categorized and rated in terms of importance. Scoring of the final categories was analyzed using Wilcoxon and Median non-parametric statistical tests. Results suggest that planning challenges stem from limitations in organizational capacity to support a long-term, adaptive management process, inferring that VERP may be sufficiently developed, but implementation capacity may not. The results can be used to refine existing frameworks, and to aid in the development of new recreation frameworks.

  1. Using sensitivity analysis to identify key factors for the propagation of a plant epidemic.

    Science.gov (United States)

    Rimbaud, Loup; Bruchou, Claude; Dallot, Sylvie; Pleydell, David R J; Jacquot, Emmanuel; Soubeyrand, Samuel; Thébaud, Gaël

    2018-01-01

    Identifying the key factors underlying the spread of a disease is an essential but challenging prerequisite to design management strategies. To tackle this issue, we propose an approach based on sensitivity analyses of a spatiotemporal stochastic model simulating the spread of a plant epidemic. This work is motivated by the spread of sharka, caused by plum pox virus , in a real landscape. We first carried out a broad-range sensitivity analysis, ignoring any prior information on six epidemiological parameters, to assess their intrinsic influence on model behaviour. A second analysis benefited from the available knowledge on sharka epidemiology and was thus restricted to more realistic values. The broad-range analysis revealed that the mean duration of the latent period is the most influential parameter of the model, whereas the sharka-specific analysis uncovered the strong impact of the connectivity of the first infected orchard. In addition to demonstrating the interest of sensitivity analyses for a stochastic model, this study highlights the impact of variation ranges of target parameters on the outcome of a sensitivity analysis. With regard to sharka management, our results suggest that sharka surveillance may benefit from paying closer attention to highly connected patches whose infection could trigger serious epidemics.

  2. Path analysis suggests phytoene accumulation is the key step limiting the carotenoid pathway in white carrot roots

    Directory of Open Access Journals (Sweden)

    Carlos Antonio Fernandes Santos

    2005-01-01

    Full Text Available Two F2 carrot (Daucus carota L. populations (orange rooted Brasilia x very dark orange rooted High Carotene Mass - HCM cross and the dark orange rooted cultivated variety B493 x white rooted wild carrot Queen Anne's Lace - QAL cross with very unrelated genetic backgrounds were used to investigate intrinsic factors limiting carotenoid accumulation in carrots by applying phenotypic correlation and path analysis to study the relationships between major root carotenes, root color and several other morphological traits. Most of the correlations between traits were close and agreed in sign between the two populations. Root weight had a moderate to highly significant positive correlation with leaf length, root length and top and middle root diameter. Although phenotypic correlations failed to identify the order of the substrates and products in the carotenoid pathway the correct order of substrates and products (phytoene -> zeta-carotene -> lycopene was identified in the causal diagram of beta-carotene for the Brasilia x HCM population. Path analysis of beta-carotene synthesis in the B493 x QAL population suggested that selection for root carotenes had little effect on plant morphological traits. Causal model of beta-carotene and lycopene in the B493 x QAL population suggested that phytoene synthesis is the key step limiting the carotenoid pathway in white carrots. Path analysis, first presented by Sewall Wright to study quantitative traits, appears to be a powerful statistical approach for the identification of key compounds in complex pathways.

  3. Identifying plant traits: a key aspect for suitable species selection in ecological restoration of semiarid slopes

    Science.gov (United States)

    Bochet, Esther; García-Fayos, Patricio

    2017-04-01

    In the context of ecological restoration, one of the greatest challenges for practitioners and scientists is to select suitable species for revegetation purposes. In semiarid environments where restoration projects often fail, little attention has been paid so far to the contribution of plant traits to species success. The objective of this study was to (1) identify plant traits associated with species success on four roadside situations along an erosion-productivity gradient, and (2) to provide an ecological framework for selecting suitable species on the basis of their morphological and functional traits, applied to semiarid environments. We analyzed the association of 10 different plant traits with species success of 296 species surveyed on the four roadside situations in a semiarid region (Valencia, Spain). Plant traits included general plant traits (longevity, woodiness) and more specific root-, seed- and leaf-related traits (root type, sprouting ability, seed mucilage, seed mass, seed susceptibility to removal, specific leaf area and leaf dry matter content). All of them were selected according to the prevailing limiting ecogeomorphological processes acting along the erosion-productivity gradient. We observed strong shifts along the erosion-productivity gradient in the traits associated to species success. At the harshest end of the gradient, the most intensely eroded and driest one, species success was mainly associated to seed resistance to removal by runoff and to resistance to drought. At the opposite end of the gradient, the most productive one, species success was associated to a competitive-ruderal plant strategy (herbaceous successful species with high specific leaf area and low leaf dry matter content). Our study provides an ecologically-based approach for selecting suitable native species on the basis or their morphological and functional traits and supports a differential trait-based selection of species as regards roadslope type and aspect. In

  4. Simulation-based Assessment to Reliably Identify Key Resident Performance Attributes.

    Science.gov (United States)

    Blum, Richard H; Muret-Wagstaff, Sharon L; Boulet, John R; Cooper, Jeffrey B; Petrusa, Emil R; Baker, Keith H; Davidyuk, Galina; Dearden, Jennifer L; Feinstein, David M; Jones, Stephanie B; Kimball, William R; Mitchell, John D; Nadelberg, Robert L; Wiser, Sarah H; Albrecht, Meredith A; Anastasi, Amanda K; Bose, Ruma R; Chang, Laura Y; Culley, Deborah J; Fisher, Lauren J; Grover, Meera; Klainer, Suzanne B; Kveraga, Rikante; Martel, Jeffrey P; McKenna, Shannon S; Minehart, Rebecca D; Mitchell, John D; Mountjoy, Jeremi R; Pawlowski, John B; Pilon, Robert N; Shook, Douglas C; Silver, David A; Warfield, Carol A; Zaleski, Katherine L

    2018-04-01

    Obtaining reliable and valid information on resident performance is critical to patient safety and training program improvement. The goals were to characterize important anesthesia resident performance gaps that are not typically evaluated, and to further validate scores from a multiscenario simulation-based assessment. Seven high-fidelity scenarios reflecting core anesthesiology skills were administered to 51 first-year residents (CA-1s) and 16 third-year residents (CA-3s) from three residency programs. Twenty trained attending anesthesiologists rated resident performances using a seven-point behaviorally anchored rating scale for five domains: (1) formulate a clear plan, (2) modify the plan under changing conditions, (3) communicate effectively, (4) identify performance improvement opportunities, and (5) recognize limits. A second rater assessed 10% of encounters. Scores and variances for each domain, each scenario, and the total were compared. Low domain ratings (1, 2) were examined in detail. Interrater agreement was 0.76; reliability of the seven-scenario assessment was r = 0.70. CA-3s had a significantly higher average total score (4.9 ± 1.1 vs. 4.6 ± 1.1, P = 0.01, effect size = 0.33). CA-3s significantly outscored CA-1s for five of seven scenarios and domains 1, 2, and 3. CA-1s had a significantly higher proportion of worrisome ratings than CA-3s (chi-square = 24.1, P < 0.01, effect size = 1.50). Ninety-eight percent of residents rated the simulations more educational than an average day in the operating room. Sensitivity of the assessment to CA-1 versus CA-3 performance differences for most scenarios and domains supports validity. No differences, by experience level, were detected for two domains associated with reflective practice. Smaller score variances for CA-3s likely reflect a training effect; however, worrisome performance scores for both CA-1s and CA-3s suggest room for improvement.

  5. Identifying Key Features of Student Performance in Educational Video Games and Simulations through Cluster Analysis

    Science.gov (United States)

    Kerr, Deirdre; Chung, Gregory K. W. K.

    2012-01-01

    The assessment cycle of "evidence-centered design" (ECD) provides a framework for treating an educational video game or simulation as an assessment. One of the main steps in the assessment cycle of ECD is the identification of the key features of student performance. While this process is relatively simple for multiple choice tests, when…

  6. The influence of the key limiting factors on the limitations of heat transfer in heat pipes with various working fluids

    Directory of Open Access Journals (Sweden)

    Melnyk R. S.

    2017-04-01

    Full Text Available Aluminium and copper heat pipes with grooved and metal fibrous capillary structure are high effective heat transfer devices. They are used in different cooling systems of electronic equipment like a LED modules, microprocessors, receive-transmit modules and so on. However thus heat pipes have heat transfer limitations. There are few types of this limitations: hydraulic limitation, boiling limitation, liquid entrainment by vapor flow and sonic limitation. There is necessity to know which one of these limitations is determinant for heat pipe due to design process. At a present article calculations of maximum heat transfer ability represented. All these calculations were made for LED cooling by using heat pipes with grooved and metal fibrous capillary structures. Pentane, acetone, isobutane and water were used as a coolants. It was shown that the main operation limit for axial grooved heat pipe, which determinate maximum heat transfer ability due to inclination angle for location of cooling zone higher than evaporation zone case, is entrainment limit for pentane and acetone coolants. Nevertheless, for isobutane coolant the main limitation is a boiling limit. However, for heat pipes with metal fibrous capillary structure the main limitation is a capillary limit. This limitation was a determinant for all calculated coolants: water, pentane and acetone. For high porosity range of capillary structure, capillary limit transfer to sonic limit for heat pipes with water, that means that the vapor velocity increases to sonic velocity and can't grow any more. Due to this, coolant cant in a needed quantity infill condensation zone and the last one drained. For heat pipes with acetone and pentane, capillary limit transfer to boiling limit. All calculations were made for vapor temperature equal to 50°C, and for porosity range from 30% to 90%.

  7. Identifying key research objectives to make European forests greener for bats

    Directory of Open Access Journals (Sweden)

    Danilo Russo

    2016-07-01

    Full Text Available Bats are a biodiverse mammal order providing key ecosystem services such as pest suppression, pollination and seed dispersal. Bats are also very sensitive to human actions, and significant declines in many bat populations have been recorded consequently. Many bat species find crucial roosting and foraging opportunities in European forests. Such forests have historically been exploited by humans and are still influenced by harvesting. One of the consequences of this pressure is the loss of key habitat resources, often making forests inhospitable to bats. Despite the legal protection granted to bats across Europe, the impacts of forestry on bats are still often neglected. Because forest exploitation influences forest structure at several spatial scales, economically viable forestry could become more sustainable and even favour bats. We highlight that a positive future for bat conservation that simultaneously benefits forestry is foreseeable, although more applied research is needed to develop sound management. Key future research topics include the detection of factors influencing the carrying capacity of forests, and determining the impacts of forest management and the economic importance of bats in forests. Predictive tools to inform forest managers are much needed, together with greater synergies between forest managers and bat conservationists.

  8. An Integrated Strategy to Identify Key Genes in Almond Adventitious Shoot Regeneration

    Science.gov (United States)

    Plant genetic transformation usually depends on efficient adventitious regeneration systems. In almond (Prunus dulcis Mill.), regeneration of transgenic adventitious shoots was achieved but with low efficiency. Histological studies identified two main stages of organogenesis in almond explants that ...

  9. Identifying Key Flavors in Strawberries Driving Liking via Internal and External Preference Mapping.

    Science.gov (United States)

    Oliver, Penelope; Cicerale, Sara; Pang, Edwin; Keast, Russell

    2018-04-01

    Australian consumers desire the development of a more flavorsome Australian strawberry cultivar. To aid in the development of well-liked strawberries, the attributes driving liking need to be identified. The objective of this research is to apply Preference Mapping (PM) techniques to the descriptive profile of commercial and newly bred strawberry cultivars, together with consumer preference data to determine the flavors contributing to liking. A trained sensory panel (n = 12) used Quantitative Descriptive Analysis (QDA®) methodology to evaluate two appearance, seven aroma, five texture, 10 flavor and 10 aftertaste attributes of three commercial strawberry cultivars and six elite breeding lines grown in Victoria, Australia. Strawberry consumers (n = 150) assessed their liking of the same strawberry cultivars. QDA® significantly discriminated strawberries on 28 of the 34 sensory attributes. There were significant differences in hedonic ratings of strawberries (F(8,714) = 11.5, P = 0.0001), with Hierarchical Cluster Analysis (HCA) identifying three consumer clusters each displaying differing patterns of preference. Internal and external PM techniques were applied to the data to identify the attributes driving consumer acceptability. Sweet, berry, caramel, fruity and floral attributes were identified as most contributing to liking. Sour, citrus, green, astringent, firm and gritty attributes were conversely associated with a reduction in consumer liking. Elite Lines 2 and 6 have been identified as having the broadest appeal, satisfying between 60% and 70% of consumers in the population assessed, thus the introduction of these cultivars should satisfy the largest group of consumers in the Australian market. The results of this research could be applied to breeding programs, to ensure newly bred cultivars express characteristics that were identified as well-liked amongst consumers. In addition, this research provides evidence for marketing strawberries by

  10. Labont? Identifies Key Issues for Health Promoters in the New World Order

    OpenAIRE

    Raphael, Dennis

    2016-01-01

    For over 35 years Ronald Labonté has been critically analyzing the state of health promotion in Canada and the world. In 1981, he identified the shortcomings of the groundbreaking Lalonde Report by warning of the seductive appeal of so-called lifestyle approaches to health. Since then, he has left a trail of critical work identifying the barriers to — and opportunities for —health promotion work. More recently, he has shown how the rise of economic globalization and acceptance of neo-liberal ...

  11. Identifying key performance indicators in food technology contract R&D

    NARCIS (Netherlands)

    Flipse, S.M.; Sanden, van der M.C.A.; Velden, van der T.; Fortuin, F.T.J.M.; Omta, S.W.F.; Osseweijer, P.

    2013-01-01

    Innovating companies increasingly rely on outsourcing to Contract Research Organisations (CROs) for their Research and Development (R&D), which are largely understudied. This paper presents the outcome of a case study in the field of food technology contract research, identifying context

  12. The Promise of Virtual Teams: Identifying Key Factors in Effectiveness and Failure

    Science.gov (United States)

    Horwitz, Frank M.; Bravington, Desmond; Silvis, Ulrik

    2006-01-01

    Purpose: The aim of the investigation is to identify enabling and disenabling factors in the development and operation of virtual teams; to evaluate the importance of factors such as team development, cross-cultural variables, leadership, communication and social cohesion as contributors to virtual team effectiveness. Design/methodology/approach:…

  13. Mergeomics: a web server for identifying pathological pathways, networks, and key regulators via multidimensional data integration.

    Science.gov (United States)

    Arneson, Douglas; Bhattacharya, Anindya; Shu, Le; Mäkinen, Ville-Petteri; Yang, Xia

    2016-09-09

    Human diseases are commonly the result of multidimensional changes at molecular, cellular, and systemic levels. Recent advances in genomic technologies have enabled an outpour of omics datasets that capture these changes. However, separate analyses of these various data only provide fragmented understanding and do not capture the holistic view of disease mechanisms. To meet the urgent needs for tools that effectively integrate multiple types of omics data to derive biological insights, we have developed Mergeomics, a computational pipeline that integrates multidimensional disease association data with functional genomics and molecular networks to retrieve biological pathways, gene networks, and central regulators critical for disease development. To make the Mergeomics pipeline available to a wider research community, we have implemented an online, user-friendly web server ( http://mergeomics. idre.ucla.edu/ ). The web server features a modular implementation of the Mergeomics pipeline with detailed tutorials. Additionally, it provides curated genomic resources including tissue-specific expression quantitative trait loci, ENCODE functional annotations, biological pathways, and molecular networks, and offers interactive visualization of analytical results. Multiple computational tools including Marker Dependency Filtering (MDF), Marker Set Enrichment Analysis (MSEA), Meta-MSEA, and Weighted Key Driver Analysis (wKDA) can be used separately or in flexible combinations. User-defined summary-level genomic association datasets (e.g., genetic, transcriptomic, epigenomic) related to a particular disease or phenotype can be uploaded and computed real-time to yield biologically interpretable results, which can be viewed online and downloaded for later use. Our Mergeomics web server offers researchers flexible and user-friendly tools to facilitate integration of multidimensional data into holistic views of disease mechanisms in the form of tissue-specific key regulators

  14. Identify and rank key factors influencing the adoption of cloud computing for a healthy Electronics

    Directory of Open Access Journals (Sweden)

    Javad Shukuhy

    2015-02-01

    Full Text Available Cloud computing as a new technology with Internet infrastructure and new approaches can be significant benefits in providing medical services electronically. Aplying this technology in E-Health requires consideration of various factors. The main objective of this study is to identify and rank the factors influencing the adoption of e-health cloud. Based on the Technology-Organization-Environment (TOE framework and Human-Organization-Technology fit (HOT-fit model, 16 sub-factors were identified in four major factors. With survey of 60 experts, academics and experts in health information technology and with the help of fuzzy analytic hierarchy process had ranked these sub-factors and factors. In the literature, considering newness this study, no internal or external study, have not alluded these number of criteria. The results show that when deciding to adopt cloud computing in E-Health, respectively, must be considered technological, human, organizational and environmental factors.

  15. Evaluating predictive models for solar energy growth in the US states and identifying the key drivers

    Science.gov (United States)

    Chakraborty, Joheen; Banerji, Sugata

    2018-03-01

    Driven by a desire to control climate change and reduce the dependence on fossil fuels, governments around the world are increasing the adoption of renewable energy sources. However, among the US states, we observe a wide disparity in renewable penetration. In this study, we have identified and cleaned over a dozen datasets representing solar energy penetration in each US state, and the potentially relevant socioeconomic and other factors that may be driving the growth in solar. We have applied a number of predictive modeling approaches - including machine learning and regression - on these datasets over a 17-year period and evaluated the relative performance of the models. Our goals were: (1) identify the most important factors that are driving the growth in solar, (2) choose the most effective predictive modeling technique for solar growth, and (3) develop a model for predicting next year’s solar growth using this year’s data. We obtained very promising results with random forests (about 90% efficacy) and varying degrees of success with support vector machines and regression techniques (linear, polynomial, ridge). We also identified states with solar growth slower than expected and representing a potential for stronger growth in future.

  16. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal

    DEFF Research Database (Denmark)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    , and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character......Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case...... also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication. The objective is addressed in a literature review and a case study. The literature...

  17. Predicting suicidal ideation in primary care: An approach to identify easily assessable key variables.

    Science.gov (United States)

    Jordan, Pascal; Shedden-Mora, Meike C; Löwe, Bernd

    To obtain predictors of suicidal ideation, which can also be used for an indirect assessment of suicidal ideation (SI). To create a classifier for SI based on variables of the Patient Health Questionnaire (PHQ) and sociodemographic variables, and to obtain an upper bound on the best possible performance of a predictor based on those variables. From a consecutive sample of 9025 primary care patients, 6805 eligible patients (60% female; mean age = 51.5 years) participated. Advanced methods of machine learning were used to derive the prediction equation. Various classifiers were applied and the area under the curve (AUC) was computed as a performance measure. Classifiers based on methods of machine learning outperformed ordinary regression methods and achieved AUCs around 0.87. The key variables in the prediction equation comprised four items - namely feelings of depression/hopelessness, low self-esteem, worrying, and severe sleep disturbances. The generalized anxiety disorder scale (GAD-7) and the somatic symptom subscale (PHQ-15) did not enhance prediction substantially. In predicting suicidal ideation researchers should refrain from using ordinary regression tools. The relevant information is primarily captured by the depression subscale and should be incorporated in a nonlinear model. For clinical practice, a classification tree using only four items of the whole PHQ may be advocated. Copyright © 2018 Elsevier Inc. All rights reserved.

  18. Co-extinction in a host-parasite network: identifying key hosts for network stability.

    Science.gov (United States)

    Dallas, Tad; Cornelius, Emily

    2015-08-17

    Parasites comprise a substantial portion of total biodiversity. Ultimately, this means that host extinction could result in many secondary extinctions of obligate parasites and potentially alter host-parasite network structure. Here, we examined a highly resolved fish-parasite network to determine key hosts responsible for maintaining parasite diversity and network structure (quantified here as nestedness and modularity). We evaluated four possible host extinction orders and compared the resulting co-extinction dynamics to random extinction simulations; including host removal based on estimated extinction risk, parasite species richness and host level contributions to nestedness and modularity. We found that all extinction orders, except the one based on realistic extinction risk, resulted in faster declines in parasite diversity and network structure relative to random biodiversity loss. Further, we determined species-level contributions to network structure were best predicted by parasite species richness and host family. Taken together, we demonstrate that a small proportion of hosts contribute substantially to network structure and that removal of these hosts results in rapid declines in parasite diversity and network structure. As network stability can potentially be inferred through measures of network structure, our findings may provide insight into species traits that confer stability.

  19. Identifying Key Features of Effective Active Learning: The Effects of Writing and Peer Discussion

    Science.gov (United States)

    Pangle, Wiline M.; Wyatt, Kevin H.; Powell, Karli N.; Sherwood, Rachel E.

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. PMID:25185230

  20. A matter of definition--key elements identified in a discourse analysis of definitions of palliative care.

    Science.gov (United States)

    Pastrana, T; Jünger, S; Ostgathe, C; Elsner, F; Radbruch, L

    2008-04-01

    For more than 30 years, the term "palliative care" has been used. From the outset, the term has undergone a series of transformations in its definitions and consequently in its tasks and goals. There remains a lack of consensus on a definition. The aim of this article is to analyse the definitions of palliative care in the specialist literature and to identify the key elements of palliative care using discourse analysis: a qualitative methodology. The literature search focused on definitions of the term 'palliative medicine' and 'palliative care' in the World Wide Web and medical reference books in English and German. A total of 37 English and 26 German definitions were identified and analysed. Our study confirmed the lack of a consistent meaning concerning the investigated terms, reflecting on-going discussion about the nature of the field among palliative care practitioners. Several common key elements were identified. Four main categories emerged from the discourse analysis of the definition of palliative care: target groups, structure, tasks and expertise. In addition, the theoretical principles and goals of palliative care were discussed and found to be key elements, with relief and prevention of suffering and improvement of quality of life as main goals. The identified key elements can contribute to the definition of the concept 'palliative care'. Our study confirms the importance of semantic and ethical influences on palliative care that should be considered in future research on semantics in different languages.

  1. Identifying key genes in rheumatoid arthritis by weighted gene co-expression network analysis.

    Science.gov (United States)

    Ma, Chunhui; Lv, Qi; Teng, Songsong; Yu, Yinxian; Niu, Kerun; Yi, Chengqin

    2017-08-01

    This study aimed to identify rheumatoid arthritis (RA) related genes based on microarray data using the WGCNA (weighted gene co-expression network analysis) method. Two gene expression profile datasets GSE55235 (10 RA samples and 10 healthy controls) and GSE77298 (16 RA samples and seven healthy controls) were downloaded from Gene Expression Omnibus database. Characteristic genes were identified using metaDE package. WGCNA was used to find disease-related networks based on gene expression correlation coefficients, and module significance was defined as the average gene significance of all genes used to assess the correlation between the module and RA status. Genes in the disease-related gene co-expression network were subject to functional annotation and pathway enrichment analysis using Database for Annotation Visualization and Integrated Discovery. Characteristic genes were also mapped to the Connectivity Map to screen small molecules. A total of 599 characteristic genes were identified. For each dataset, characteristic genes in the green, red and turquoise modules were most closely associated with RA, with gene numbers of 54, 43 and 79, respectively. These genes were enriched in totally enriched in 17 Gene Ontology terms, mainly related to immune response (CD97, FYB, CXCL1, IKBKE, CCR1, etc.), inflammatory response (CD97, CXCL1, C3AR1, CCR1, LYZ, etc.) and homeostasis (C3AR1, CCR1, PLN, CCL19, PPT1, etc.). Two small-molecule drugs sanguinarine and papaverine were predicted to have a therapeutic effect against RA. Genes related to immune response, inflammatory response and homeostasis presumably have critical roles in RA pathogenesis. Sanguinarine and papaverine have a potential therapeutic effect against RA. © 2017 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  2. Identifying key topics for a description of sexual behavior among Danish adolescents: A qualitative study

    DEFF Research Database (Denmark)

    Jørgensen, Marianne Johansson; Maindal, Helle Terkildsen; Olesen, Frede

    . Results: Four major categories of risk behavior were identified: Alcohol consumption is associated with “no condom use”, Nights on the town and meetings in foreign counties or at festivals are associated with one night stands and often lead to unsafe sex, Low self-esteem increases the risk of pushing one...... one Danish Folk High School, but with different social and educational backgrounds. The interview guide was developed from literature reviews and hypotheses based on years of experience with sexually transmitted infections. Data were transcribed verbatim and analyzed using qualitative description...

  3. [Breast cancer screening in Austria: Key figures, age limits, screening intervals and evidence].

    Science.gov (United States)

    Jeitler, Klaus; Semlitsch, Thomas; Posch, Nicole; Siebenhofer, Andrea; Horvath, Karl

    2015-01-01

    In January 2014, the first nationwide quality-assured breast cancer screening program addressing women aged ≥ 40 years was introduced in Austria. As part of the process of developing a patient information leaflet, the Evidence Based Medicine (EBM) Review Center of the Medical University of Graz was charged with the task of assessing the potential benefits and harms of breast cancer screening from the available evidence. Based on these results, key figures were derived for mortality, false-positive and false-negative mammography results, and overdiagnosis, considering Austria-specific incidence rates for breast cancer and breast cancer mortality. Furthermore, the current evidence regarding age limits and screening interval, which were the subjects of controversial public discussions, was analyzed. A systematic search for primary and secondary literature was performed and additional evidence was screened, e. g., evaluation reports of European breast cancer screening programs. On the basis of the available evidence and of the Austrian breast cancer mortality and incidence rates, it can be assumed that - depending on the age group - 1 to 4 breast cancer deaths can be avoided per 1,000 women screened in a structured breast cancer screening program, while the overall mortality remains unchanged. On the other hand, 150 to 200 of these 1,000 women will be affected by false-positive results and 1 to 9 women by overdiagnosis due to the structured breast cancer screening. Therefore, the overall benefit-harm balance is uncertain. If women from 40 to 44 or above 70 years of age are considered, who can also participate in the Austrian screening program, even a negative benefit-harm balance seems possible. However, with the implementation of quality standards in breast cancer screening and the dissemination of a patient information leaflet, an improvement in the medical treatment situation, specifically in terms of informed decision-making, can be expected. Copyright © 2015

  4. Bottom-up communication. Identifying opportunities and limitations through an exploratory field-based evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, C.; Irvine, K.N. [Institute of Energy and Sustainable Development, De Montfort University, Leicester, LE1 9BH (United Kingdom)

    2013-02-15

    Communication to promote behaviours like energy saving can use significant resources. What is less clear is the comparative value of different approaches available to communicators. While it is generally agreed that 'bottom-up' approaches, where individuals are actively involved rather than passive, are preferable to 'top-down' authority-led projects, there is a dearth of evidence that verifies why this should be. Additionally, while the literature has examined the mechanics of the different approaches, there has been less attention paid to the associated psychological implications. This paper reports on an exploratory comparative study that examined the effects of six distinct communication activities. The activities used different communication approaches, some participative and others more top-down informational. Two theories, from behavioural studies and communication, were used to identify key variables for consideration in this field-based evaluation. The evaluation aimed to assess not just which activity might be most successful, as this has limited generalisability, but to also gain insight into what psychological impacts might contribute to success. Analysis found support for the general hypothesis that bottom-up approaches have more impact on behaviour change than top-down. The study also identified that, in this instance, the difference in reported behaviour across the activities related partly to the extent to which intentions to change behaviour were implemented. One possible explanation for the difference in reported behaviour change across the activities is that a bottom-up approach may offer a supportive environment where participants can discuss progress with like-minded individuals. A further possible explanation is that despite controlling for intention at an individual level, the pre-existence of strong intentions may have an effect on group success. These suggestive findings point toward the critical need for additional and larger-scale studies

  5. Identifying Key Proteins in Hg Methylation Pathways of Desulfovibrio by Global Proteomics, Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Summers, Anne O. [Univ. of Georgia, Athens, GA (United States). Dept. of Microbiology; Miller, Susan M. [Univ. of California, San Francisco, CA (United States). Dept. of Pharmaceutical Chemistry; Wall, Judy [Univ. of Missouri, Columbia, MO (United States). Dept. of Biochemistry; Lipton, Mary [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-06-18

    Elemental mercury, Hg(0) is a contaminant at many DOE sites, especially at Oak Ridge National Laboratory (ORNL) where the spread of spilled Hg and its effects on microbial populations have been monitored for decades. To explore the microbial interactions with Hg, we have devised a global proteomic approach capable of directly detecting Hg-adducts of proteins. This technique developed in the facultative anaerobe, Escherichia coli, allows us to identify the proteins most vulnerable to acute exposure to organomercurials phenyl- and ethyl-mercury (as surrogates for the highly neurotoxic methyl-Hg) (Polacco, et al, 2011). We have found >300 such proteins in all metabolic functional groups and cellular compartments; most are highly conserved and can serve as markers for acute Hg exposure (Zink, et al. 2016, in preparation). We have also discovered that acute Hg exposure severely disrupts thiol, iron and redox homeostases, and electrolyte balance (LaVoie, et al., 2015) Thus, we proposed to bring these techniques to bear on the central problem of identifying the cellular proteins involved in bacterial uptake and methylation of mercury and its release from the cell.

  6. Identifying key components for an effective case report poster: an observational study.

    Science.gov (United States)

    Willett, Lisa L; Paranjape, Anuradha; Estrada, Carlos

    2009-03-01

    Residents demonstrate scholarly activity by presenting posters at academic meetings. Although recommendations from national organizations are available, evidence identifying which components are most important is not. To develop and test an evaluation tool to measure the quality of case report posters and identify the specific components most in need of improvement. Faculty evaluators reviewed case report posters and provided on-site feedback to presenters at poster sessions of four annual academic general internal medicine meetings. A newly developed ten-item evaluation form measured poster quality for specific components of content, discussion, and format (5-point Likert scale, 1 = lowest, 5 = highest). Evaluation tool performance, including Cronbach alpha and inter-rater reliability, overall poster scores, differences across meetings and evaluators and specific components of the posters most in need of improvement. Forty-five evaluators from 20 medical institutions reviewed 347 posters. Cronbach's alpha of the evaluation form was 0.84 and inter-rater reliability, Spearman's rho 0.49 (p words. Our evaluation tool provides empirical data to guide trainees as they prepare posters for presentation which may improve poster quality and enhance their scholarly productivity.

  7. Identifying key features of effective active learning: the effects of writing and peer discussion.

    Science.gov (United States)

    Linton, Debra L; Pangle, Wiline M; Wyatt, Kevin H; Powell, Karli N; Sherwood, Rachel E

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. © 2014 D. L. Linton et al. CBE—Life Sciences Education © 2014 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  8. Identifying Key Issues and Potential Solutions for Integrated Arrival, Departure, Surface Operations by Surveying Stakeholder Preferences

    Science.gov (United States)

    Aponso, Bimal; Coppenbarger, Richard A.; Jung, Yoon; Quon, Leighton; Lohr, Gary; O’Connor, Neil; Engelland, Shawn

    2015-01-01

    predictability and suggested several key attributes that were necessary to make the concept successful. The goals and objectives of the planned ATD-2 sub-project will incorporate the results of this stakeholder feedback.

  9. Rubella vaccination in India: identifying broad consequences of vaccine introduction and key knowledge gaps.

    Science.gov (United States)

    Winter, A K; Pramanik, S; Lessler, J; Ferrari, M; Grenfell, B T; Metcalf, C J E

    2018-01-01

    Rubella virus infection typically presents as a mild illness in children; however, infection during pregnancy may cause the birth of an infant with congenital rubella syndrome (CRS). As of February 2017, India began introducing rubella-containing vaccine (RCV) into the public-sector childhood vaccination programme. Low-level RCV coverage among children over several years can result in an increase in CRS incidence by increasing the average age of infection without sufficiently reducing rubella incidence. We evaluated the impact of RCV introduction on CRS incidence across India's heterogeneous demographic and epidemiological contexts. We used a deterministic age-structured model that reflects Indian states' rural and urban area-specific demography and vaccination coverage levels to simulate rubella dynamics and estimate CRS incidence with and without RCV introduction to the public sector. Our analysis suggests that current low-level private-sector vaccination has already slightly increased the burden of CRS in India. We additionally found that the effect of public-sector RCV introduction depends on the basic reproductive number, R 0, of rubella. If R 0 is five, a value empirically estimated from an array of settings, CRS incidence post-RCV introduction will likely decrease. However, if R 0 is seven or nine, some states may experience short-term or annual increases in CRS, even if a long-term total reduction in cases (30 years) is expected. Investment in population-based serological surveys and India's fever/rash surveillance system will be key to monitoring the success of the vaccination programme.

  10. Physiologically-based toxicokinetic models help identifying the key factors affecting contaminant uptake during flood events

    Energy Technology Data Exchange (ETDEWEB)

    Brinkmann, Markus; Eichbaum, Kathrin [Department of Ecosystem Analysis, Institute for Environmental Research,ABBt – Aachen Biology and Biotechnology, RWTH Aachen University, Worringerweg 1, 52074 Aachen (Germany); Kammann, Ulrike [Thünen-Institute of Fisheries Ecology, Palmaille 9, 22767 Hamburg (Germany); Hudjetz, Sebastian [Department of Ecosystem Analysis, Institute for Environmental Research,ABBt – Aachen Biology and Biotechnology, RWTH Aachen University, Worringerweg 1, 52074 Aachen (Germany); Institute of Hydraulic Engineering and Water Resources Management, RWTH Aachen University, Mies-van-der-Rohe-Straße 1, 52056 Aachen (Germany); Cofalla, Catrina [Institute of Hydraulic Engineering and Water Resources Management, RWTH Aachen University, Mies-van-der-Rohe-Straße 1, 52056 Aachen (Germany); Buchinger, Sebastian; Reifferscheid, Georg [Federal Institute of Hydrology (BFG), Department G3: Biochemistry, Ecotoxicology, Am Mainzer Tor 1, 56068 Koblenz (Germany); Schüttrumpf, Holger [Institute of Hydraulic Engineering and Water Resources Management, RWTH Aachen University, Mies-van-der-Rohe-Straße 1, 52056 Aachen (Germany); Preuss, Thomas [Department of Environmental Biology and Chemodynamics, Institute for Environmental Research,ABBt- Aachen Biology and Biotechnology, RWTH Aachen University, Worringerweg 1, 52074 Aachen (Germany); and others

    2014-07-01

    Highlights: • A PBTK model for trout was coupled with a sediment equilibrium partitioning model. • The influence of physical exercise on pollutant uptake was studies using the model. • Physical exercise during flood events can increase the level of biliary metabolites. • Cardiac output and effective respiratory volume were identified as relevant factors. • These confounding factors need to be considered also for bioconcentration studies. - Abstract: As a consequence of global climate change, we will be likely facing an increasing frequency and intensity of flood events. Thus, the ecotoxicological relevance of sediment re-suspension is of growing concern. It is vital to understand contaminant uptake from suspended sediments and relate it to effects in aquatic biota. Here we report on a computational study that utilizes a physiologically based toxicokinetic model to predict uptake, metabolism and excretion of sediment-borne pyrene in rainbow trout (Oncorhynchus mykiss). To this end, data from two experimental studies were compared with the model predictions: (a) batch re-suspension experiments with constant concentration of suspended particulate matter at two different temperatures (12 and 24 °C), and (b) simulated flood events in an annular flume. The model predicted both the final concentrations and the kinetics of 1-hydroxypyrene secretion into the gall bladder of exposed rainbow trout well. We were able to show that exhaustive exercise during exposure in simulated flood events can lead to increased levels of biliary metabolites and identified cardiac output and effective respiratory volume as the two most important factors for contaminant uptake. The results of our study clearly demonstrate the relevance and the necessity to investigate uptake of contaminants from suspended sediments under realistic exposure scenarios.

  11. Physiologically-based toxicokinetic models help identifying the key factors affecting contaminant uptake during flood events

    International Nuclear Information System (INIS)

    Brinkmann, Markus; Eichbaum, Kathrin; Kammann, Ulrike; Hudjetz, Sebastian; Cofalla, Catrina; Buchinger, Sebastian; Reifferscheid, Georg; Schüttrumpf, Holger; Preuss, Thomas

    2014-01-01

    Highlights: • A PBTK model for trout was coupled with a sediment equilibrium partitioning model. • The influence of physical exercise on pollutant uptake was studies using the model. • Physical exercise during flood events can increase the level of biliary metabolites. • Cardiac output and effective respiratory volume were identified as relevant factors. • These confounding factors need to be considered also for bioconcentration studies. - Abstract: As a consequence of global climate change, we will be likely facing an increasing frequency and intensity of flood events. Thus, the ecotoxicological relevance of sediment re-suspension is of growing concern. It is vital to understand contaminant uptake from suspended sediments and relate it to effects in aquatic biota. Here we report on a computational study that utilizes a physiologically based toxicokinetic model to predict uptake, metabolism and excretion of sediment-borne pyrene in rainbow trout (Oncorhynchus mykiss). To this end, data from two experimental studies were compared with the model predictions: (a) batch re-suspension experiments with constant concentration of suspended particulate matter at two different temperatures (12 and 24 °C), and (b) simulated flood events in an annular flume. The model predicted both the final concentrations and the kinetics of 1-hydroxypyrene secretion into the gall bladder of exposed rainbow trout well. We were able to show that exhaustive exercise during exposure in simulated flood events can lead to increased levels of biliary metabolites and identified cardiac output and effective respiratory volume as the two most important factors for contaminant uptake. The results of our study clearly demonstrate the relevance and the necessity to investigate uptake of contaminants from suspended sediments under realistic exposure scenarios

  12. A structured elicitation method to identify key direct risk factors for the management of natural resources

    Directory of Open Access Journals (Sweden)

    Michael Smith

    2015-11-01

    Full Text Available The high level of uncertainty inherent in natural resource management requires planners to apply comprehensive risk analyses, often in situations where there are few resources. In this paper, we demonstrate a broadly applicable, novel and structured elicitation approach to identify important direct risk factors. This new approach combines expert calibration and fuzzy based mathematics to capture and aggregate subjective expert estimates of the likelihood that a set of direct risk factors will cause management failure. A specific case study is used to demonstrate the approach; however, the described methods are widely applicable in risk analysis. For the case study, the management target was to retain all species that characterise a set of natural biological elements. The analysis was bounded by the spatial distribution of the biological elements under consideration and a 20-year time frame. Fourteen biological elements were expected to be at risk. Eleven important direct risk factors were identified that related to surrounding land use practices, climate change, problem species (e.g., feral predators, fire and hydrological change. In terms of their overall influence, the two most important risk factors were salinisation and a lack of water which together pose a considerable threat to the survival of nine biological elements. The described approach successfully overcame two concerns arising from previous risk analysis work: (1 the lack of an intuitive, yet comprehensive scoring method enabling the detection and clarification of expert agreement and associated levels of uncertainty; and (2 the ease with which results can be interpreted and communicated while preserving a rich level of detail essential for informed decision making.

  13. Preparedness for physiotherapy in private practice: Novices identify key factors in an interpretive description study.

    Science.gov (United States)

    Atkinson, Robyn; McElroy, Theresa

    2016-04-01

    Physiotherapists in Australia deliver services to a diverse range of clients, across many settings, however little research exists examining graduate preparedness for practice, even in the populous field of private practice. To explore novice physiotherapist perspectives on preparedness for work in private practice. The qualitative approach of interpretive description was used to guide in-depth interviews with 8 novice physiotherapists from 3 universities working in 5 private practices in Melbourne. All interviews were digitally recorded, transcribed verbatim and analyzed thematically. Four main themes influencing graduate preparedness for work in private practice were identified: 1) non-curricular experiences (e.g. sports training) 2) elective curricular: practicum experiences; 3) curricular: attainment of skills specific to private practice; and 4) the private practice setting: supportive colleagues. This combination of non-curricular, curricular, and practice setting factors offered the necessary scaffolding for the graduates to report feeling prepared for work in private practice. Non-curricular activities, radiological instruction, clinical placements, building supportive colleague relations and professional development in private practice are recommended as potential means of building preparedness in novice therapists. Findings have implications for physiotherapy students, educators and private practice clinics looking to recruit new graduates. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Pharmacy patronage: identifying key factors in the decision making process using the determinant attribute approach.

    Science.gov (United States)

    Franic, Duska M; Haddock, Sarah M; Tucker, Leslie Tootle; Wooten, Nathan

    2008-01-01

    To use the determinant attribute approach, a research method commonly used in marketing to identify the wants of various consumer groups, to evaluate consumer pharmacy choice when having a prescription order filled in different pharmacy settings. Cross sectional. Community independent, grocery store, community chain, and discount store pharmacies in Georgia between April 2005 and April 2006. Convenience sample of adult pharmacy consumers (n = 175). Survey measuring consumer preferences on 26 attributes encompassing general pharmacy site features (16 items), pharmacist characteristics (5 items), and pharmacy staff characteristics (5 items). 26 potential determinant attributes for pharmacy selection. 175 consumers were surveyed at community independent (n = 81), grocery store (n = 44), community chain (n = 27), or discount store (n = 23) pharmacy settings. The attributes of pharmacists and staff at all four pharmacy settings were shown to affect pharmacy patronage motives, although consumers frequenting non-community independent pharmacies were also motivated by secondary convenience factors, e.g., hours of operation, and prescription coverage. Most consumers do not perceive pharmacies as merely prescription-distribution centers that vary only by convenience. Prescriptions are not just another economic good. Pharmacy personnel influence pharmacy selection; therefore, optimal staff selection and training is likely the greatest asset and most important investment for ensuring pharmacy success.

  15. Gene expression profiling in Entamoeba histolytica identifies key components in iron uptake and metabolism.

    Directory of Open Access Journals (Sweden)

    Nora Adriana Hernández-Cuevas

    Full Text Available Entamoeba histolytica is an ameboid parasite that causes colonic dysentery and liver abscesses in humans. The parasite encounters dramatic changes in iron concentration during its invasion of the host, with relatively low levels in the intestinal lumen and then relatively high levels in the blood and liver. The liver notably contains sources of iron; therefore, the parasite's ability to use these sources might be relevant to its survival in the liver and thus the pathogenesis of liver abscesses. The objective of the present study was to identify factors involved in iron uptake, use and storage in E. histolytica. We compared the respective transcriptomes of E. histolytica trophozoites grown in normal medium (containing around 169 µM iron, low-iron medium (around 123 µM iron, iron-deficient medium (around 91 µM iron, and iron-deficient medium replenished with hemoglobin. The differentially expressed genes included those coding for the ATP-binding cassette transporters and major facilitator transporters (which share homology with bacterial siderophores and heme transporters and genes involved in heme biosynthesis and degradation. Iron deficiency was associated with increased transcription of genes encoding a subset of cell signaling molecules, some of which have previously been linked to adaptation to the intestinal environment and virulence. The present study is the first to have assessed the transcriptome of E. histolytica grown under various iron concentrations. Our results provide insights into the pathways involved in iron uptake and metabolism in this parasite.

  16. Gene expression profiling in Entamoeba histolytica identifies key components in iron uptake and metabolism.

    Science.gov (United States)

    Hernández-Cuevas, Nora Adriana; Weber, Christian; Hon, Chung-Chau; Guillen, Nancy

    2014-01-01

    Entamoeba histolytica is an ameboid parasite that causes colonic dysentery and liver abscesses in humans. The parasite encounters dramatic changes in iron concentration during its invasion of the host, with relatively low levels in the intestinal lumen and then relatively high levels in the blood and liver. The liver notably contains sources of iron; therefore, the parasite's ability to use these sources might be relevant to its survival in the liver and thus the pathogenesis of liver abscesses. The objective of the present study was to identify factors involved in iron uptake, use and storage in E. histolytica. We compared the respective transcriptomes of E. histolytica trophozoites grown in normal medium (containing around 169 µM iron), low-iron medium (around 123 µM iron), iron-deficient medium (around 91 µM iron), and iron-deficient medium replenished with hemoglobin. The differentially expressed genes included those coding for the ATP-binding cassette transporters and major facilitator transporters (which share homology with bacterial siderophores and heme transporters) and genes involved in heme biosynthesis and degradation. Iron deficiency was associated with increased transcription of genes encoding a subset of cell signaling molecules, some of which have previously been linked to adaptation to the intestinal environment and virulence. The present study is the first to have assessed the transcriptome of E. histolytica grown under various iron concentrations. Our results provide insights into the pathways involved in iron uptake and metabolism in this parasite.

  17. Identifying key soil cyanobacteria easy to isolate and culture for arid soil restoration

    Science.gov (United States)

    Roncero-Ramos, Beatriz; Ángeles Muñoz-Martín, M.; Chamizo, Sonia; Román, Raúl; Rodriguez-Caballero, Emilio; Mateo, Pilar; Cantón, Yolanda

    2017-04-01

    Drylands represent an important fraction of the Earth land's surface. Low cover of vascular plants characterizes these regions, and the large open areas among plants are often colonized by cyanobacteria, mosses, lichens, algae, bryophytes, bacteria and fungi, known as biocrusts. Because these communities are on or within the soil surface, they contribute to improve physicochemical properties of the uppermost soil layers and have important effects on soil fertility and stability, so they could play an important role on soil restoration. Cyanobacteria appear to be a cross component of biocrusts and they have been demonstrated to enhance water availability, soil fertility (fixing atmospheric C and N), and soil aggregation (thanks to their filamentous morphology and the exopolysaccharides they excrete), and significantly reduce water and wind erosion. Besides, they are able to tolerate high temperatures and UV radiation. All these features convert cyanobacteria in pioneer organisms capable of colonizing degraded soils and may be crucial in facilitating the succession of more developed organisms such as vascular plants. Therefore, the use of native cyanobacteria, already adapted to site environmental conditions, could guarantee a successful restoration approach of degraded soils. However, previous to their application for soil restoration, the most representative species inhabiting these soils should be identified. The objective of this study was to identify (morphologically and genetically) and isolate representative native cyanobacteria species from arid soils in SE Spain, characterized for being easily isolated and cultured with the aim of using them to inoculate degraded arid soil. We selected two study areas in Almería, SE Spain, where biocrust cover most of the open spaces between plants: El Cautivo experimental site located in the Tabernas desert and a limestone quarry located at the southeastern edge of the Gádor massif. The first site is characterized by

  18. Fragmentation patterns of evergreen oak woodlands in Southwestern Iberia: identifying key spatial indicators.

    Science.gov (United States)

    Costa, Augusta; Madeira, Manuel; Lima Santos, José; Plieninger, Tobias; Seixas, Júlia

    2014-01-15

    Mediterranean evergreen oak woodlands (composed of Quercus suber L. and Quercus rotundifolia Lam.) are becoming increasingly fragmented in the human-modified landscapes of Southwestern Portugal and Spain. Previous studies have largely neglected to assess the spatial changes of oak woodlands in relation to their surrounding landscape matrix, and to characterize and quantify woodland boundaries and edges. The present study aims to fill this gap by analyzing fragmentation patterns of oak woodlands over a 50-year period (1958-2007) in three landscapes. Using archived aerial imagery from 1958, 1995 and 2007, for two consecutive periods (1958-1995 and 1995-2007), we calculated a set of landscape metrics to compare woodland fragmentation over time. Our results indicated a continuous woodland fragmentation characterized by their edge dynamics. From 1958 to 2007, the replacement of open farmland by shrubland and by new afforestation areas in the oak woodland landscape surrounding matrix, led to the highest values for edge contrast length trends of 5.0 and 12.3, respectively. Linear discriminant analysis was performed to delineate fragmented woodland structures and identify metric variables that characterize woodland spatial configuration. The edge contrast length with open farmland showed a strong correlation with F1 (correlations ranging between 0.55 and 0.98) and may be used as a proxy for oak woodland mixedness in landscape matrix. The edge dynamics of oak woodlands may result in different patterns of oak recruitment and therefore, its study may be helpful in highlighting future baselines for the sustainable management of oak woodlands. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Probing molecular mechanisms of the Hsp90 chaperone: biophysical modeling identifies key regulators of functional dynamics.

    Directory of Open Access Journals (Sweden)

    Anshuman Dixit

    Full Text Available Deciphering functional mechanisms of the Hsp90 chaperone machinery is an important objective in cancer biology aiming to facilitate discovery of targeted anti-cancer therapies. Despite significant advances in understanding structure and function of molecular chaperones, organizing molecular principles that control the relationship between conformational diversity and functional mechanisms of the Hsp90 activity lack a sufficient quantitative characterization. We combined molecular dynamics simulations, principal component analysis, the energy landscape model and structure-functional analysis of Hsp90 regulatory interactions to systematically investigate functional dynamics of the molecular chaperone. This approach has identified a network of conserved regions common to the Hsp90 chaperones that could play a universal role in coordinating functional dynamics, principal collective motions and allosteric signaling of Hsp90. We have found that these functional motifs may be utilized by the molecular chaperone machinery to act collectively as central regulators of Hsp90 dynamics and activity, including the inter-domain communications, control of ATP hydrolysis, and protein client binding. These findings have provided support to a long-standing assertion that allosteric regulation and catalysis may have emerged via common evolutionary routes. The interaction networks regulating functional motions of Hsp90 may be determined by the inherent structural architecture of the molecular chaperone. At the same time, the thermodynamics-based "conformational selection" of functional states is likely to be activated based on the nature of the binding partner. This mechanistic model of Hsp90 dynamics and function is consistent with the notion that allosteric networks orchestrating cooperative protein motions can be formed by evolutionary conserved and sparsely connected residue clusters. Hence, allosteric signaling through a small network of distantly connected

  20. A multivariate and stochastic approach to identify key variables to rank dairy farms on profitability.

    Science.gov (United States)

    Atzori, A S; Tedeschi, L O; Cannas, A

    2013-05-01

    The economic efficiency of dairy farms is the main goal of farmers. The objective of this work was to use routinely available information at the dairy farm level to develop an index of profitability to rank dairy farms and to assist the decision-making process of farmers to increase the economic efficiency of the entire system. A stochastic modeling approach was used to study the relationships between inputs and profitability (i.e., income over feed cost; IOFC) of dairy cattle farms. The IOFC was calculated as: milk revenue + value of male calves + culling revenue - herd feed costs. Two databases were created. The first one was a development database, which was created from technical and economic variables collected in 135 dairy farms. The second one was a synthetic database (sDB) created from 5,000 synthetic dairy farms using the Monte Carlo technique and based on the characteristics of the development database data. The sDB was used to develop a ranking index as follows: (1) principal component analysis (PCA), excluding IOFC, was used to identify principal components (sPC); and (2) coefficient estimates of a multiple regression of the IOFC on the sPC were obtained. Then, the eigenvectors of the sPC were used to compute the principal component values for the original 135 dairy farms that were used with the multiple regression coefficient estimates to predict IOFC (dRI; ranking index from development database). The dRI was used to rank the original 135 dairy farms. The PCA explained 77.6% of the sDB variability and 4 sPC were selected. The sPC were associated with herd profile, milk quality and payment, poor management, and reproduction based on the significant variables of the sPC. The mean IOFC in the sDB was 0.1377 ± 0.0162 euros per liter of milk (€/L). The dRI explained 81% of the variability of the IOFC calculated for the 135 original farms. When the number of farms below and above 1 standard deviation (SD) of the dRI were calculated, we found that 21

  1. A Simple Key for Identifying the Sibling Species of the Malaria Vector Anopheles gambiae (Giles Complex by Polytene Chromosome Cytogenetics

    Directory of Open Access Journals (Sweden)

    Music Temitope OBEMBE

    2018-03-01

    Full Text Available It has been established that Anopheles gambiae complex sibling species are the major Plasmodium malaria vectors in Africa; however, not all the sibling species transmit the infection. Easier molecular methods, PCR-based assays, have been developed to distinguish the several members of the A. gambiae complex. However, malaria vector research in less developed countries, particularly sub-Saharan Africa, is being hampered by the lack of PCR facilities in laboratories and the cost of carrying out the assay within lack of funding. Hence, the present study was designed to develop a simple identification key, based on an affordable method of polytene chromosome cytotaxonomy, for identifying the major P. falciparum vectors. The Identification Key was successfully used to identify two members of the A. gambiae complex, A. gambiae sensu stricto and A. arabiensis, which are the most potent malaria vectors in Africa; even so, it could not be used to establish the infective and the refractory strains.

  2. A genetic screen identifies BRCA2 and PALB2 as key regulators of G2 checkpoint maintenance

    DEFF Research Database (Denmark)

    Menzel, Tobias; Nähse-Kumpf, Viola; Kousholt, Arne Nedergaard

    2011-01-01

    To identify key connections between DNA-damage repair and checkpoint pathways, we performed RNA interference screens for regulators of the ionizing radiation-induced G2 checkpoint, and we identified the breast cancer gene BRCA2. The checkpoint was also abrogated following depletion of PALB2......, an interaction partner of BRCA2. BRCA2 and PALB2 depletion led to premature checkpoint abrogation and earlier activation of the AURORA A-PLK1 checkpoint-recovery pathway. These results indicate that the breast cancer tumour suppressors and homologous recombination repair proteins BRCA2 and PALB2 are main...

  3. Protocol for a thematic synthesis to identify key themes and messages from a palliative care research network.

    LENUS (Irish Health Repository)

    Nicholson, Emma

    2016-10-21

    Research networks that facilitate collaborative research are increasing both regionally and globally and such collaborations contribute greatly to knowledge transfer particularly in health research. The Palliative Care Research Network is an Irish-based network that seeks to create opportunities and engender a collaborative environment to encourage innovative research that is relevant for policy and practice. The current review outlines a methodology to identify cross-cutting messages to identify how dissemination outputs can be optimized to ensure that key messages from this research reaches all knowledge users.

  4. The Single Item Literacy Screener: Evaluation of a brief instrument to identify limited reading ability

    Directory of Open Access Journals (Sweden)

    Chew Lisa D

    2006-03-01

    Full Text Available Abstract Background Reading skills are important for accessing health information, using health care services, managing one's health and achieving desirable health outcomes. Our objective was to assess the diagnostic accuracy of the Single Item Literacy Screener (SILS to identify limited reading ability, one component of health literacy, as measured by the S-TOFHLA. Methods Cross-sectional interview with 999 adults with diabetes residing in Vermont and bordering states. Participants were randomly recruited from Primary Care practices in the Vermont Diabetes Information System June 2003 – December 2004. The main outcome was limited reading ability. The primary predictor was the SILS. Results Of the 999 persons screened, 169 (17% had limited reading ability. The sensitivity of the SILS in detecting limited reading ability was 54% [95% CI: 47%, 61%] and the specificity was 83% [95% CI: 81%, 86%] with an area under the Receiver Operating Characteristics Curve (ROC of 0.73 [95% CI: 0.69, 0.78]. Seven hundred seventy (77% screened negative on the SILS and 692 of these subjects had adequate reading skills (negative predictive value = 0.90 [95% CI: 0.88, 0.92]. Of the 229 who scored positive on the SILS, 92 had limited reading ability (positive predictive value = 0.4 [95% CI: 0.34, 0.47]. Conclusion The SILS is a simple instrument designed to identify patients with limited reading ability who need help reading health-related materials. The SILS performs moderately well at ruling out limited reading ability in adults and allows providers to target additional assessment of health literacy skills to those most in need. Further study of the use of the SILS in clinical settings and with more diverse populations is warranted.

  5. The Impact of IFRS 16 on the Companies’ Key Performance Indicators: Limits, Advantages and Drawbacks

    OpenAIRE

    Alin Eliodor Tanase; Traian Ovidiu Calota; Florin Razvan Oncioiu

    2018-01-01

    t This article focuses on the impact of the new standard IFRS 16 Leases on the companies’ key performance indicators. The magnitude of this impact could be said to change depending on the usage density of the lease in the companies and also depending on the sector they are in. The results show that future transactions may be influenced by IFRS 16 such as sale and leaseback, acquisitions and mergers, and lease vs. buying.

  6. The Impact of IFRS 16 on the Companies’ Key Performance Indicators: Limits, Advantages and Drawbacks

    Directory of Open Access Journals (Sweden)

    Alin Eliodor Tanase

    2018-03-01

    Full Text Available t This article focuses on the impact of the new standard IFRS 16 Leases on the companies’ key performance indicators. The magnitude of this impact could be said to change depending on the usage density of the lease in the companies and also depending on the sector they are in. The results show that future transactions may be influenced by IFRS 16 such as sale and leaseback, acquisitions and mergers, and lease vs. buying.

  7. Modified Principal Component Analysis for Identifying Key Environmental Indicators and Application to a Large-Scale Tidal Flat Reclamation

    Directory of Open Access Journals (Sweden)

    Kejian Chu

    2018-01-01

    Full Text Available Identification of the key environmental indicators (KEIs from a large number of environmental variables is important for environmental management in tidal flat reclamation areas. In this study, a modified principal component analysis approach (MPCA has been developed for determining the KEIs. The MPCA accounts for the two important attributes of the environmental variables: pollution status and temporal variation, in addition to the commonly considered numerical divergence attribute. It also incorporates the distance correlation (dCor to replace the Pearson’s correlation to measure the nonlinear interrelationship between the variables. The proposed method was applied to the Tiaozini sand shoal, a large-scale tidal flat reclamation region in China. Five KEIs were identified as dissolved inorganic nitrogen, Cd, petroleum in the water column, Hg, and total organic carbon in the sediment. The identified KEIs were shown to respond well to the biodiversity of phytoplankton. This demonstrated that the identified KEIs adequately represent the environmental condition in the coastal marine system. Therefore, the MPCA is a practicable method for extracting effective indicators that have key roles in the coastal and marine environment.

  8. An open simulation approach to identify chances and limitations for vulnerable road user (VRU) active safety.

    Science.gov (United States)

    Seiniger, Patrick; Bartels, Oliver; Pastor, Claus; Wisch, Marcus

    2013-01-01

    It is commonly agreed that active safety will have a significant impact on reducing accident figures for pedestrians and probably also bicyclists. However, chances and limitations for active safety systems have only been derived based on accident data and the current state of the art, based on proprietary simulation models. The objective of this article is to investigate these chances and limitations by developing an open simulation model. This article introduces a simulation model, incorporating accident kinematics, driving dynamics, driver reaction times, pedestrian dynamics, performance parameters of different autonomous emergency braking (AEB) generations, as well as legal and logical limitations. The level of detail for available pedestrian accident data is limited. Relevant variables, especially timing of the pedestrian appearance and the pedestrian's moving speed, are estimated using assumptions. The model in this article uses the fact that a pedestrian and a vehicle in an accident must have been in the same spot at the same time and defines the impact position as a relevant accident parameter, which is usually available from accident data. The calculations done within the model identify the possible timing available for braking by an AEB system as well as the possible speed reduction for different accident scenarios as well as for different system configurations. The simulation model identifies the lateral impact position of the pedestrian as a significant parameter for system performance, and the system layout is designed to brake when the accident becomes unavoidable by the vehicle driver. Scenarios with a pedestrian running from behind an obstruction are the most demanding scenarios and will very likely never be avoidable for all vehicle speeds due to physical limits. Scenarios with an unobstructed person walking will very likely be treatable for a wide speed range for next generation AEB systems.

  9. Using Range-Wide Abundance Modeling to Identify Key Conservation Areas for the Micro-Endemic Bolson Tortoise (Gopherus flavomarginatus.

    Directory of Open Access Journals (Sweden)

    Cinthya A Ureña-Aranda

    Full Text Available A widespread biogeographic pattern in nature is that population abundance is not uniform across the geographic range of species: most occurrence sites have relatively low numbers, whereas a few places contain orders of magnitude more individuals. The Bolson tortoise Gopherus flavomarginatus is endemic to a small region of the Chihuahuan Desert in Mexico, where habitat deterioration threatens this species with extinction. In this study we combined field burrows counts and the approach for modeling species abundance based on calculating the distance to the niche centroid to obtain range-wide abundance estimates. For the Bolson tortoise, we found a robust, negative relationship between observed burrows abundance and distance to the niche centroid, with a predictive capacity of 71%. Based on these results we identified four priority areas for the conservation of this microendemic and threatened tortoise. We conclude that this approach may be a useful approximation for identifying key areas for sampling and conservation efforts in elusive and rare species.

  10. Ten key short-term sectoral benchmarks to limit warming to 1.5º C

    NARCIS (Netherlands)

    Kuramochi, Takeshi; Hoehne, N.E.; Schaeffer, M.; Cantzler, Jasmin; Hare, William; Deng, Yvonne; Sterl, Sebastian; Hagemann, Markus; Rocha, Marcia; Yanguas-Parra, Paola Andrea; Mir, Goher-Ur-Rehman; Wong, Lindee; El-Laboudy, Tarik; Wouters, Karlien; Deryng, Delphine; Blok, Kornelis

    2018-01-01

    This article identifies and quantifies the 10 most important benchmarks for climate action to be taken by 2020–2025 to keep the window open for a 1.5°C-consistent GHG emission pathway. We conducted a comprehensive review of existing emissions scenarios, scanned all sectors and the respective

  11. The Use of Key Informant Method for Identifying Children with Blindness and Severe Visual Impairment in Developing Countries.

    Science.gov (United States)

    du Toit, Rènée; Courtright, Paul; Lewallen, Susan

    2017-06-01

    An estimated 19 million children are visually impaired; of these, 1.4 million are irreversibly blind. A key challenge is to identify them early in life to benefit maximally from visual rehabilitation, and/or treatment. This aggregative review and structured literature analysis summarizes evidence of what it is about the key informant (KI) approach that works to identify children with blindness or severe visual impairment (B/SVI) in the community (for whom, to what extent, in what circumstances, in what respect, how and why). Peer-reviewed (PubMed, hand search) and grey literature (Google, World Health Organization website, academic theses, direct requests) were included, and methods and criteria used for identification, productivity (number of children referred per KI), accuracy of referrals (positive predictive value, PPV), age of children with B/SVI, KI definition, sex, information about cost and comparisons aggregated. We included 31 documents describing 22 unique KI programs. Mostly KIs identified children with B/SVI in 1-3 weeks, i.e. "campaign mode." In 60%, KIs were community volunteers, others formal health sector workers (FHSW). Around 0.02-1.56 children per KI (median = 0.25) were successfully recruited. PPV ranged from 12 to 66%. In two studies comparing FHSWs and community KIs, the latter were 8 and 10 times more productive. KIs working in campaign mode may provide an effective approach to identifying children with B/SVI in communities. Including identification of ocular problems and/or other impairments has been recommended. Research on factors that influence effectiveness and on whether KIs continue to contribute could inform programs.

  12. Identifying critical recruitment bottlenecks limiting seedling establishment in a degraded seagrass ecosystem.

    Science.gov (United States)

    Statton, John; Montoya, Leonardo R; Orth, Robert J; Dixon, Kingsley W; Kendrick, Gary A

    2017-11-01

    Identifying early life-stage transitions limiting seagrass recruitment could improve our ability to target demographic processes most responsive to management. Here we determine the magnitude of life-stage transitions along gradients in physical disturbance limiting seedling establishment for the marine angiosperm, Posidonia australis. Transition matrix models and sensitivity analyses were used to identify which transitions were critical for successful seedling establishment during the first year of seed recruitment and projection models were used to predict the most appropriate environments and seeding densities. Total survival probability of seedlings was low (0.001), however, transition probabilities between life-stages differed across the environmental gradients; seedling recruitment was affected by grazing and bioturbation prevailing during the first life-stage transition (1 month), and 4-6 months later during the third life-stage transition when establishing seedlings are physically removed by winter storms. Models projecting population growth from different starting seed densities showed that seeds could replace other more labour intensive and costly methods, such as transplanting adult shoots, if disturbances are moderated sufficiently and if large numbers of seed can be collected in sufficient quantity and delivered to restoration sites efficiently. These outcomes suggest that by improving management of early demographic processes, we could increase recruitment in restoration programs.

  13. Key scattering mechanisms limiting the lateral transport in a modulation-doped polar heterojunction

    Energy Technology Data Exchange (ETDEWEB)

    Tien, Nguyen Thanh, E-mail: nttien@ctu.edu.vn; Thao, Pham Thi Bich [College of Natural Sciences, Can Tho University, 3-2 Road, Can Tho City (Viet Nam); Thao, Dinh Nhu [Center for Theoretical and Computational Physics, College of Education, Hue University, 34 Le Loi Street, Hue City (Viet Nam); Quang, Doan Nhat [Institute of Physics, Vietnamese Academy of Science and Technology, 10 Dao Tan Street, Hanoi (Viet Nam)

    2016-06-07

    We present a study of the lateral transport of a two-dimensional electron gas (2DEG) in a modulation-doped polar heterojunction (HJ). In contrast to previous studies, we assume that the Coulomb correlation among ionized impurities and among charged dislocations in the HJ is so strong that the 2DEG low-temperature mobility is not limited by impurity and dislocation scattering. The mobility, however, is specified by alloy disorder scattering and combined roughness scattering, which is the total effect induced by both the potential barrier and polarization roughness. The obtained results show that the alloy disorder and combined roughness scattering strongly depend on the alloy content and on the near-interface electron distribution. Our theory is capable of explaining the bell-shaped dependence of the lateral mobility on alloy content observed in AlGaN/GaN and on 2DEG density observed in AlN/GaN, which have not previously been explained.

  14. A qualitative case study to identify possible barriers that limit effective elementary science education

    Science.gov (United States)

    Foster, Donald Carey

    The purpose of this case study was to identify barriers that limit the effectiveness of elementary teachers in the teaching of science. It is of the utmost urgency that barriers be first identified, so that possible solutions can be explored to bring about the improvement of elementary science education. This urgency has been imposed by the scheduled national testing of students in science by 2007, as mandated by the No Child Left Behind Act of 2001. Using qualitative case study methods, the researcher conducted interviews with 8 elementary teachers from two schools within one school district who taught 3rd, 4th, and 5th grade. These interviews were designed to gain insight into barriers these elementary teachers perceived as factors limiting their effectiveness in teaching science and preparing students for high-stakes testing. Barriers in the areas of teacher background, typical teaching day, curriculum, inservices, and legislative influences were explored. This study concluded that the barriers explored do have a substantial negative affect on the teaching and learning of science in the elementary grades. Specifically, the barriers revealed in this study include the limited science background of elementary teachers, inadequate class time devoted to science, non-comprehensive curriculum, ineffective or lack of inservice training, and pressures from legislated mandates. But it is also clear that these barriers are so intertwined that one cannot remove these barriers one at a time. It will take a collective effort from all involved, including legislators, administrators, teachers, parents, and students, to alleviate these barriers and discover effective solutions to improve elementary science education.

  15. Identifying the limitations of conventional biofiltration of diffuse methane emissions at long-term operation.

    Science.gov (United States)

    Gómez-Cuervo, S; Hernández, J; Omil, F

    2016-08-01

    There is growing international concern about the increasing levels of greenhouse gases in the atmosphere, particularly CO2 and methane. The emissions of methane derived from human activities are associated with large flows and very low concentrations, such as those emitted from landfills and wastewater treatment plants, among others. The present work was focused on the biological methane degradation at diffuse concentrations (0.2% vv(-1)) in a conventional biofilter using a mixture of compost, perlite and bark chips as carrier. An extensive characterization of the process was carried out at long-term operation (250 days) in a fully monitored pilot plant, achieving stable conditions during the entire period. Operational parameters such as waterings, nitrogen addition and inlet loads and contact time influences were evaluated. Obtained results indicate that empty bed residence times within 4-8 min are crucial to maximize elimination rates. Waterings and the type of nitrogen supplied in the nutrient solution (ammonia or nitrate) have a strong impact on the biofilter performance. The better results compatible with a stable operation were achieved using nitrate, with elimination capacities up to 7.6 ± 1.1 g CH4 m(-3 )h(-1). The operation at low inlet concentrations (IC) implied that removal rates obtained were quite limited (ranging 3-8 g CH4 m(-3 )h(-1)); however, these results could be significantly increased (up to 20.6 g CH4 m(-3) h(-1)) at higher IC, which indicates that the mass transfer from the gas to the liquid layer surrounding the biofilm is a key limitation of the process.

  16. Identifying key factors and strategies for reducing industrial CO2 emissions from a non-Kyoto protocol member's (Taiwan) perspective

    International Nuclear Information System (INIS)

    Lin, Sue J.; Lu, I.J.; Lewis, Charles

    2006-01-01

    In this study we use Divisia index approach to identify key factors affecting CO 2 emission changes of industrial sectors in Taiwan. The changes of CO 2 emission are decomposed into emission coefficient, energy intensity, industrial structure and economic growth. Furthermore, comparisons with USA, Japan, Germany, the Netherlands and South Korea are made to have a better understanding of emission tendency in these countries and to help formulate our CO 2 reduction strategies for responding to the international calls for CO 2 cuts. The results show that economic growth and high energy intensity were two key factors for the rapid increase of industrial CO 2 emission in Taiwan, while adjustment of industrial structure was the main component for the decrease. Although economic development is important, Taiwan must keep pace with the international trends for CO 2 reduction. Among the most important strategies are continuous efforts to improve energy intensity, fuel mix toward lower carbon, setting targets for industrial CO 2 cuts, and advancing green technology through technology transfer. Also, the clean development mechanism (CDM) is expected to play an important role in the future

  17. Identifying finite-time coherent sets from limited quantities of Lagrangian data

    Energy Technology Data Exchange (ETDEWEB)

    Williams, Matthew O. [Program in Applied and Computational Mathematics, Princeton University, New Jersey 08544 (United States); Rypina, Irina I. [Department of Physical Oceanography, Woods Hole Oceanographic Institute, Massachusetts 02543 (United States); Rowley, Clarence W. [Department of Mechanical and Aerospace Engineering, Princeton University, New Jersey 08544 (United States)

    2015-08-15

    A data-driven procedure for identifying the dominant transport barriers in a time-varying flow from limited quantities of Lagrangian data is presented. Our approach partitions state space into coherent pairs, which are sets of initial conditions chosen to minimize the number of trajectories that “leak” from one set to the other under the influence of a stochastic flow field during a pre-specified interval in time. In practice, this partition is computed by solving an optimization problem to obtain a pair of functions whose signs determine set membership. From prior experience with synthetic, “data rich” test problems, and conceptually related methods based on approximations of the Perron-Frobenius operator, we observe that the functions of interest typically appear to be smooth. We exploit this property by using the basis sets associated with spectral or “mesh-free” methods, and as a result, our approach has the potential to more accurately approximate these functions given a fixed amount of data. In practice, this could enable better approximations of the coherent pairs in problems with relatively limited quantities of Lagrangian data, which is usually the case with experimental geophysical data. We apply this method to three examples of increasing complexity: The first is the double gyre, the second is the Bickley Jet, and the third is data from numerically simulated drifters in the Sulu Sea.

  18. Identifying finite-time coherent sets from limited quantities of Lagrangian data

    International Nuclear Information System (INIS)

    Williams, Matthew O.; Rypina, Irina I.; Rowley, Clarence W.

    2015-01-01

    A data-driven procedure for identifying the dominant transport barriers in a time-varying flow from limited quantities of Lagrangian data is presented. Our approach partitions state space into coherent pairs, which are sets of initial conditions chosen to minimize the number of trajectories that “leak” from one set to the other under the influence of a stochastic flow field during a pre-specified interval in time. In practice, this partition is computed by solving an optimization problem to obtain a pair of functions whose signs determine set membership. From prior experience with synthetic, “data rich” test problems, and conceptually related methods based on approximations of the Perron-Frobenius operator, we observe that the functions of interest typically appear to be smooth. We exploit this property by using the basis sets associated with spectral or “mesh-free” methods, and as a result, our approach has the potential to more accurately approximate these functions given a fixed amount of data. In practice, this could enable better approximations of the coherent pairs in problems with relatively limited quantities of Lagrangian data, which is usually the case with experimental geophysical data. We apply this method to three examples of increasing complexity: The first is the double gyre, the second is the Bickley Jet, and the third is data from numerically simulated drifters in the Sulu Sea

  19. Identifying finite-time coherent sets from limited quantities of Lagrangian data.

    Science.gov (United States)

    Williams, Matthew O; Rypina, Irina I; Rowley, Clarence W

    2015-08-01

    A data-driven procedure for identifying the dominant transport barriers in a time-varying flow from limited quantities of Lagrangian data is presented. Our approach partitions state space into coherent pairs, which are sets of initial conditions chosen to minimize the number of trajectories that "leak" from one set to the other under the influence of a stochastic flow field during a pre-specified interval in time. In practice, this partition is computed by solving an optimization problem to obtain a pair of functions whose signs determine set membership. From prior experience with synthetic, "data rich" test problems, and conceptually related methods based on approximations of the Perron-Frobenius operator, we observe that the functions of interest typically appear to be smooth. We exploit this property by using the basis sets associated with spectral or "mesh-free" methods, and as a result, our approach has the potential to more accurately approximate these functions given a fixed amount of data. In practice, this could enable better approximations of the coherent pairs in problems with relatively limited quantities of Lagrangian data, which is usually the case with experimental geophysical data. We apply this method to three examples of increasing complexity: The first is the double gyre, the second is the Bickley Jet, and the third is data from numerically simulated drifters in the Sulu Sea.

  20. In-Silico Integration Approach to Identify a Key miRNA Regulating a Gene Network in Aggressive Prostate Cancer

    Science.gov (United States)

    Colaprico, Antonio; Bontempi, Gianluca; Castiglioni, Isabella

    2018-01-01

    Like other cancer diseases, prostate cancer (PC) is caused by the accumulation of genetic alterations in the cells that drives malignant growth. These alterations are revealed by gene profiling and copy number alteration (CNA) analysis. Moreover, recent evidence suggests that also microRNAs have an important role in PC development. Despite efforts to profile PC, the alterations (gene, CNA, and miRNA) and biological processes that correlate with disease development and progression remain partially elusive. Many gene signatures proposed as diagnostic or prognostic tools in cancer poorly overlap. The identification of co-expressed genes, that are functionally related, can identify a core network of genes associated with PC with a better reproducibility. By combining different approaches, including the integration of mRNA expression profiles, CNAs, and miRNA expression levels, we identified a gene signature of four genes overlapping with other published gene signatures and able to distinguish, in silico, high Gleason-scored PC from normal human tissue, which was further enriched to 19 genes by gene co-expression analysis. From the analysis of miRNAs possibly regulating this network, we found that hsa-miR-153 was highly connected to the genes in the network. Our results identify a four-gene signature with diagnostic and prognostic value in PC and suggest an interesting gene network that could play a key regulatory role in PC development and progression. Furthermore, hsa-miR-153, controlling this network, could be a potential biomarker for theranostics in high Gleason-scored PC. PMID:29562723

  1. Hillslope characterization: Identifying key controls on local-scale plant communities' distribution using remote sensing and subsurface data fusion.

    Science.gov (United States)

    Falco, N.; Wainwright, H. M.; Dafflon, B.; Leger, E.; Peterson, J.; Steltzer, H.; Wilmer, C.; Williams, K. H.; Hubbard, S. S.

    2017-12-01

    Mountainous watershed systems are characterized by extreme heterogeneity in hydrological and pedological properties that influence biotic activities, plant communities and their dynamics. To gain predictive understanding of how ecosystem and watershed system evolve under climate change, it is critical to capture such heterogeneity and to quantify the effect of key environmental variables such as topography, and soil properties. In this study, we exploit advanced geophysical and remote sensing techniques - coupled with machine learning - to better characterize and quantify the interactions between plant communities' distribution and subsurface properties. First, we have developed a remote sensing data fusion framework based on the random forest (RF) classification algorithm to estimate the spatial distribution of plant communities. The framework allows the integration of both plant spectral and structural information, which are derived from multispectral satellite images and airborne LiDAR data. We then use the RF method to evaluate the estimated plant community map, exploiting the subsurface properties (such as bedrock depth, soil moisture and other properties) and geomorphological parameters (such as slope, curvature) as predictors. Datasets include high-resolution geophysical data (electrical resistivity tomography) and LiDAR digital elevation maps. We demonstrate our approach on a mountain hillslope and meadow within the East River watershed in Colorado, which is considered to be a representative headwater catchment in the Upper Colorado Basin. The obtained results show the existence of co-evolution between above and below-ground processes; in particular, dominant shrub communities in wet and flat areas. We show that successful integration of remote sensing data with geophysical measurements allows identifying and quantifying the key environmental controls on plant communities' distribution, and provides insights into their potential changes in the future

  2. Tetrapods on the EDGE: Overcoming data limitations to identify phylogenetic conservation priorities

    Science.gov (United States)

    Gray, Claudia L.; Wearn, Oliver R.; Owen, Nisha R.

    2018-01-01

    The scale of the ongoing biodiversity crisis requires both effective conservation prioritisation and urgent action. As extinction is non-random across the tree of life, it is important to prioritise threatened species which represent large amounts of evolutionary history. The EDGE metric prioritises species based on their Evolutionary Distinctiveness (ED), which measures the relative contribution of a species to the total evolutionary history of their taxonomic group, and Global Endangerment (GE), or extinction risk. EDGE prioritisations rely on adequate phylogenetic and extinction risk data to generate meaningful priorities for conservation. However, comprehensive phylogenetic trees of large taxonomic groups are extremely rare and, even when available, become quickly out-of-date due to the rapid rate of species descriptions and taxonomic revisions. Thus, it is important that conservationists can use the available data to incorporate evolutionary history into conservation prioritisation. We compared published and new methods to estimate missing ED scores for species absent from a phylogenetic tree whilst simultaneously correcting the ED scores of their close taxonomic relatives. We found that following artificial removal of species from a phylogenetic tree, the new method provided the closest estimates of their “true” ED score, differing from the true ED score by an average of less than 1%, compared to the 31% and 38% difference of the previous methods. The previous methods also substantially under- and over-estimated scores as more species were artificially removed from a phylogenetic tree. We therefore used the new method to estimate ED scores for all tetrapods. From these scores we updated EDGE prioritisation rankings for all tetrapod species with IUCN Red List assessments, including the first EDGE prioritisation for reptiles. Further, we identified criteria to identify robust priority species in an effort to further inform conservation action whilst

  3. Scoping review identifies significant number of knowledge translation theories, models and frameworks with limited use.

    Science.gov (United States)

    Strifler, Lisa; Cardoso, Roberta; McGowan, Jessie; Cogo, Elise; Nincic, Vera; Khan, Paul A; Scott, Alistair; Ghassemi, Marco; MacDonald, Heather; Lai, Yonda; Treister, Victoria; Tricco, Andrea C; Straus, Sharon E

    2018-04-13

    To conduct a scoping review of knowledge translation (KT) theories, models and frameworks that have been used to guide dissemination or implementation of evidence-based interventions targeted to prevention and/or management of cancer or other chronic diseases. We used a comprehensive multistage search process from 2000-2016, which included traditional bibliographic database searching, searching using names of theories, models and frameworks, and cited reference searching. Two reviewers independently screened the literature and abstracted data. We found 596 studies reporting on the use of 159 KT theories, models or frameworks. A majority (87%) of the identified theories, models or frameworks were used in five or fewer studies, with 60% used once. The theories, models and frameworks were most commonly used to inform planning/design, implementation and evaluation activities, and least commonly used to inform dissemination and sustainability/scalability activities. Twenty-six were used across the full implementation spectrum (from planning/design to sustainability/scalability) either within or across studies. All were used for at least individual-level behavior change, while 48% were used for organization-level, 33% for community-level and 17% for system-level change. We found a significant number of KT theories, models and frameworks with a limited evidence base describing their use. Copyright © 2018. Published by Elsevier Inc.

  4. Using Upland Rice Root Traits to Identify N Use Efficient Genotypes for Limited Soil Nutrient Conditions

    Energy Technology Data Exchange (ETDEWEB)

    Traore, K.; Traore, O. [INERA / Station de Farakoba, Bobo-Dioulasso (Burkina Faso); Bado, V. B. [Africa Rice Center (AfricaRice), Saint Louis (Senegal)

    2013-11-15

    Crop production in the Sahelian countries of Africa is limited by many factors. The most important are low potential yields of local varieties, low inherent soil fertility and low applications of external inputs (organic and mineral fertilizers). A field experiment was conducted from 2007 to 2008 with the objective to develop and validate screening protocols for plant traits that enhance N acquisition and utilization in upland rice grown in low N soils of two hundred (200) upland rice (Oryza sativa L.) genotypes from WAB, NERICA, CNA, CNAX, IRAT and IR lines. An experiment in small pots was carried out in a greenhouse of Farakoba research center. The pots were filled with a sandy soil and upland rice genotypes were grown during three weeks, harvested and studied for their root characteristics (seminal root length, adventitious root number, lateral root length and number and roots hair density). The small pot method was reliable for root trait characterisation at the seedling stage. A large variability among genotypes was exhibited for the root characteristics. The variability was larger within the NERICA and WAB lines compared to the other lines. The length of the seminal roots varied from 10 to 40 cm, the lateral root number ranged between 3 and 15 and the number of adventitious roots varied between 2 and 7. The selected root traits can be used to identify high nutrients and water use efficient genotypes. (author)

  5. Utility and Limitations of Using Gene Expression Data to Identify Functional Associations.

    Directory of Open Access Journals (Sweden)

    Sahra Uygun

    2016-12-01

    Full Text Available Gene co-expression has been widely used to hypothesize gene function through guilt-by association. However, it is not clear to what degree co-expression is informative, whether it can be applied to genes involved in different biological processes, and how the type of dataset impacts inferences about gene functions. Here our goal is to assess the utility and limitations of using co-expression as a criterion to recover functional associations between genes. By determining the percentage of gene pairs in a metabolic pathway with significant expression correlation, we found that many genes in the same pathway do not have similar transcript profiles and the choice of dataset, annotation quality, gene function, expression similarity measure, and clustering approach significantly impacts the ability to recover functional associations between genes using Arabidopsis thaliana as an example. Some datasets are more informative in capturing coordinated expression profiles and larger data sets are not always better. In addition, to recover the maximum number of known pathways and identify candidate genes with similar functions, it is important to explore rather exhaustively multiple dataset combinations, similarity measures, clustering algorithms and parameters. Finally, we validated the biological relevance of co-expression cluster memberships with an independent phenomics dataset and found that genes that consistently cluster with leucine degradation genes tend to have similar leucine levels in mutants. This study provides a framework for obtaining gene functional associations by maximizing the information that can be obtained from gene expression datasets.

  6. RNA-Seq analysis identifies key genes associated with haustorial development in the root hemiparasite Santalum album

    Directory of Open Access Journals (Sweden)

    Xinhua eZhang

    2015-09-01

    Full Text Available Santalum album (sandalwood is one of the economically important plant species in the Santalaceae for its production of highly valued perfume oils. Sandalwood is also a hemiparasitic tree that obtains some of its water and simple nutrients by tapping into other plants through haustoria which are highly specialized organs in parasitic angiosperms. However, an understanding of the molecular mechanisms involved in haustorium development is limited. In this study, RNA sequencing (RNA-seq analyses were performed to identify changes in gene expression and metabolic pathways associated with the development of the S. album haustorium. A total of 56,011 non-redundant contigs with a mean contig size of 618 bp were obtained by de novo assembly of the transcriptome of haustoria and non-haustorial seedling roots. A substantial number of the identified differentially expressed genes were involved in cell wall metabolism and protein metabolism, as well as mitochondrial electron transport functions. Phytohormone-mediated regulation might play an important role during haustorial development. Especially, auxin signaling is likely to be essential for haustorial initiation, and genes related to cytokinin and gibberellin biosynthesis and metabolism are involved in haustorial development. Our results suggest that genes encoding nodulin-like proteins may be important for haustorial morphogenesis in S. album. The obtained sequence data will become a rich resource for future research in this interesting species. This information improves our understanding of haustorium development in root hemiparasitic species and will allow further exploration of the detailed molecular mechanisms underlying plant parasitism.

  7. A systems toxicology approach identifies Lyn as a key signaling phosphoprotein modulated by mercury in a B lymphocyte cell model

    Energy Technology Data Exchange (ETDEWEB)

    Caruso, Joseph A.; Stemmer, Paul M. [Institute of Environmental Health Sciences, Wayne State University, Detroit, MI (United States); Dombkowski, Alan [Department of Pediatrics, Wayne State University, Detroit, MI (United States); Caruthers, Nicholas J. [Institute of Environmental Health Sciences, Wayne State University, Detroit, MI (United States); Gill, Randall [Department of Immunology and Microbiology, Wayne State University, Detroit, MI (United States); Rosenspire, Allen J., E-mail: arosenspire@wayne.edu [Department of Immunology and Microbiology, Wayne State University, Detroit, MI (United States)

    2014-04-01

    Network and protein–protein interaction analyses of proteins undergoing Hg{sup 2+}-induced phosphorylation and dephosphorylation in Hg{sup 2+}-intoxicated mouse WEHI-231 B cells identified Lyn as the most interconnected node. Lyn is a Src family protein tyrosine kinase known to be intimately involved in the B cell receptor (BCR) signaling pathway. Under normal signaling conditions the tyrosine kinase activity of Lyn is controlled by phosphorylation, primarily of two well known canonical regulatory tyrosine sites, Y-397 and Y-508. However, Lyn has several tyrosine residues that have not yet been determined to play a major role under normal signaling conditions, but are potentially important sites for phosphorylation following mercury exposure. In order to determine how Hg{sup 2+} exposure modulates the phosphorylation of additional residues in Lyn, a targeted MS assay was developed. Initial mass spectrometric surveys of purified Lyn identified 7 phosphorylated tyrosine residues. A quantitative assay was developed from these results using the multiple reaction monitoring (MRM) strategy. WEHI-231 cells were treated with Hg{sup 2+}, pervanadate (a phosphatase inhibitor), or anti-Ig antibody (to stimulate the BCR). Results from these studies showed that the phosphoproteomic profile of Lyn after exposure of the WEHI-231 cells to a low concentration of Hg{sup 2+} closely resembled that of anti-Ig antibody stimulation, whereas exposure to higher concentrations of Hg{sup 2+} led to increases in the phosphorylation of Y-193/Y-194, Y-501 and Y-508 residues. These data indicate that mercury can disrupt a key regulatory signal transduction pathway in B cells and point to phospho-Lyn as a potential biomarker for mercury exposure. - Highlights: • Inorganic mercury (Hg{sup 2+}) induces changes in the WEHI-231 B cell phosphoproteome. • The B cell receptor (BCR) signaling pathway was the pathway most affected by Hg{sup 2+}. • The Src family phosphoprotein kinase Lyn was the

  8. Use of a scenario-neutral approach to identify the key hydro-meteorological attributes that impact runoff from a natural catchment

    Science.gov (United States)

    Guo, Danlu; Westra, Seth; Maier, Holger R.

    2017-11-01

    Scenario-neutral approaches are being used increasingly for assessing the potential impact of climate change on water resource systems, as these approaches allow the performance of these systems to be evaluated independently of climate change projections. However, practical implementations of these approaches are still scarce, with a key limitation being the difficulty of generating a range of plausible future time series of hydro-meteorological data. In this study we apply a recently developed inverse stochastic generation approach to support the scenario-neutral analysis, and thus identify the key hydro-meteorological variables to which the system is most sensitive. The stochastic generator simulates synthetic hydro-meteorological time series that represent plausible future changes in (1) the average, extremes and seasonal patterns of rainfall; and (2) the average values of temperature (Ta), relative humidity (RH) and wind speed (uz) as variables that drive PET. These hydro-meteorological time series are then fed through a conceptual rainfall-runoff model to simulate the potential changes in runoff as a function of changes in the hydro-meteorological variables, and runoff sensitivity is assessed with both correlation and Sobol' sensitivity analyses. The method was applied to a case study catchment in South Australia, and the results showed that the most important hydro-meteorological attributes for runoff were winter rainfall followed by the annual average rainfall, while the PET-related meteorological variables had comparatively little impact. The high importance of winter rainfall can be related to the winter-dominated nature of both the rainfall and runoff regimes in this catchment. The approach illustrated in this study can greatly enhance our understanding of the key hydro-meteorological attributes and processes that are likely to drive catchment runoff under a changing climate, thus enabling the design of tailored climate impact assessments to specific

  9. Identifying key factors for mobilising under-utilised low carbon land resources : A case study on Kalimantan

    NARCIS (Netherlands)

    Goh, Chun Sheng; Junginger, Martin; Potter, Lesley; Faaij, André; Wicke, Birka

    2018-01-01

    Mobilising under-utilised low carbon (ULC) land for future agricultural expansion helps minimising further carbon stock loss. This study examined the regency cases in Kalimantan, a carbon loss hotspot, to understand the key factors for mobilising ULC land via narrative interviews with a range of

  10. Gene Network Construction from Microarray Data Identifies a Key Network Module and Several Candidate Hub Genes in Age-Associated Spatial Learning Impairment.

    Science.gov (United States)

    Uddin, Raihan; Singh, Shiva M

    2017-01-01

    As humans age many suffer from a decrease in normal brain functions including spatial learning impairments. This study aimed to better understand the molecular mechanisms in age-associated spatial learning impairment (ASLI). We used a mathematical modeling approach implemented in Weighted Gene Co-expression Network Analysis (WGCNA) to create and compare gene network models of young (learning unimpaired) and aged (predominantly learning impaired) brains from a set of exploratory datasets in rats in the context of ASLI. The major goal was to overcome some of the limitations previously observed in the traditional meta- and pathway analysis using these data, and identify novel ASLI related genes and their networks based on co-expression relationship of genes. This analysis identified a set of network modules in the young, each of which is highly enriched with genes functioning in broad but distinct GO functional categories or biological pathways. Interestingly, the analysis pointed to a single module that was highly enriched with genes functioning in "learning and memory" related functions and pathways. Subsequent differential network analysis of this "learning and memory" module in the aged (predominantly learning impaired) rats compared to the young learning unimpaired rats allowed us to identify a set of novel ASLI candidate hub genes. Some of these genes show significant repeatability in networks generated from independent young and aged validation datasets. These hub genes are highly co-expressed with other genes in the network, which not only show differential expression but also differential co-expression and differential connectivity across age and learning impairment. The known function of these hub genes indicate that they play key roles in critical pathways, including kinase and phosphatase signaling, in functions related to various ion channels, and in maintaining neuronal integrity relating to synaptic plasticity and memory formation. Taken together, they

  11. Materials Genome in Action: Identifying the Performance Limits of Physical Hydrogen Storage

    Science.gov (United States)

    2017-01-01

    The Materials Genome is in action: the molecular codes for millions of materials have been sequenced, predictive models have been developed, and now the challenge of hydrogen storage is targeted. Renewably generated hydrogen is an attractive transportation fuel with zero carbon emissions, but its storage remains a significant challenge. Nanoporous adsorbents have shown promising physical adsorption of hydrogen approaching targeted capacities, but the scope of studies has remained limited. Here the Nanoporous Materials Genome, containing over 850 000 materials, is analyzed with a variety of computational tools to explore the limits of hydrogen storage. Optimal features that maximize net capacity at room temperature include pore sizes of around 6 Å and void fractions of 0.1, while at cryogenic temperatures pore sizes of 10 Å and void fractions of 0.5 are optimal. Our top candidates are found to be commercially attractive as “cryo-adsorbents”, with promising storage capacities at 77 K and 100 bar with 30% enhancement to 40 g/L, a promising alternative to liquefaction at 20 K and compression at 700 bar. PMID:28413259

  12. Strategic Floodplain Reconnection Along the Lower Tisza and Lower Illinois Rivers: Identifying Opportunities, Tradeoffs, and Limitations

    Science.gov (United States)

    Guida, R.; Remo, J. W.; Secchi, S.; Swanson, T.; Kiss, T.

    2015-12-01

    During the late 19th and into the 20th Centuries, the Tisza and Illinois Rivers were highly altered through the construction of levees and dams to reclaim their floodplain-wetland systems for agriculture and to facilitate navigation. In recent decades, flood levels have continued to rise due to aggradation on the confined floodplains reducing flood-conveyance capacity. As a result, "Room for the River" proposals have gained more prominence. Our overarching hypothesis is that strategically reconnecting these rivers to their floodplains will reduce flood levels and increase ecological habitat while limiting socioeconomic impacts. In this study, we assessed several reconnection scenarios, including levee setbacks and removals, for the Lower Tisza River (LTR; Hungary) and the Lower Illinois River (LIR; Illinois, USA). To model water-surface elevations (WSELs) for the 5- through 500-year flood events, we employed HEC-RAS (1D) and SOBEK (1D/2D) hydraulic models. To determine socioeconomic tradeoffs using these modeled WSELs, we developed a corresponding suite of expected annual damages (EADs) using FEMA's Hazus-MH flood-loss modeling software for buildings and integrated geospatial and soil productivity indices to estimate agricultural losses. To assess ecosystem benefits of reconnection along the LTR, we used historic wetland extent as a proxy for increasing needed floodplain habitats. For the LIR, we performed habitat screening using Land Capability Potential Index and other assessment tools to estimate potential ecosystem benefits. Results indicate that levee removal and/or setbacks may reduce flood heights up to 1.6 m along the LTR and over 1.0 m along the LIR. While urban areas have the highest EADs, several lower-production agricultural areas show potential for reducing flood heights while minimizing damages. Strategic-floodplain reconnection benefits along the LTR and LIR include over half of historically-significant wetlands being reconnected and the creation of

  13. USING THE PARETO DIAGRAM AND FMEA (FAILURE MODE AND EFFECTS ANALYSIS TO IDENTIFY KEY DEFECTS IN A PRODUCT

    Directory of Open Access Journals (Sweden)

    Michał ZASADZIEŃ

    2014-10-01

    Full Text Available The article presents the results of studies conducted in a company manufacturing aluminium forgings for the automotive industry. The aim of the research was to identify the defects which form during the production process as well as the locations and causes of their occurrence. Selected quality management tools were used in the process. Based on the FMEA and the costs generated by the identified defects, a hierarchy of them was created for the company along with a proposal of improvements in case of the most significant ones in order to reduce their number and increase the detection efficiency.

  14. Genome-wide association studies of autoimmune vitiligo identify 23 new risk loci and highlight key pathways and regulatory variants

    NARCIS (Netherlands)

    Jin, Ying; Andersen, Genevieve; Yorgov, Daniel; Ferrara, Tracey M.; Ben, Songtao; Brownson, Kelly M.; Holland, Paulene J.; Birlea, Stanca A.; Siebert, Janet; Hartmann, Anke; Lienert, Anne; van Geel, Nanja; Lambert, Jo; Luiten, Rosalie M.; Wolkerstorfer, Albert; Wietze van der Veen, J. P.; Bennett, Dorothy C.; Taïeb, Alain; Ezzedine, Khaled; Kemp, E. Helen; Gawkrodger, David J.; Weetman, Anthony P.; Kõks, Sulev; Prans, Ele; Kingo, Külli; Karelson, Maire; Wallace, Margaret R.; McCormack, Wayne T.; Overbeck, Andreas; Moretti, Silvia; Colucci, Roberta; Picardo, Mauro; Silverberg, Nanette B.; Olsson, Mats; Valle, Yan; Korobko, Igor; Böhm, Markus; Lim, Henry W.; Hamzavi, Iltefat; Zhou, Li; Mi, Qing-Sheng; Fain, Pamela R.; Santorico, Stephanie A.; Spritz, Richard A.

    2016-01-01

    Vitiligo is an autoimmune disease in which depigmented skin results from the destruction of melanocytes, with epidemiological association with other autoimmune diseases. In previous linkage and genome-wide association studies (GWAS1 and GWAS2), we identified 27 vitiligo susceptibility loci in

  15. A Large-Scale RNAi Screen Identifies SGK1 as a Key Survival Kinase for GBM Stem Cells.

    Science.gov (United States)

    Kulkarni, Shreya; Goel-Bhattacharya, Surbhi; Sengupta, Sejuti; Cochran, Brent H

    2018-01-01

    Glioblastoma multiforme (GBM) is the most common type of primary malignant brain cancer and has a very poor prognosis. A subpopulation of cells known as GBM stem-like cells (GBM-SC) have the capacity to initiate and sustain tumor growth and possess molecular characteristics similar to the parental tumor. GBM-SCs are known to be enriched in hypoxic niches and may contribute to therapeutic resistance. Therefore, to identify genetic determinants important for the proliferation and survival of GBM stem cells, an unbiased pooled shRNA screen of 10,000 genes was conducted under normoxic as well as hypoxic conditions. A number of essential genes were identified that are required for GBM-SC growth, under either or both oxygen conditions, in two different GBM-SC lines. Interestingly, only about a third of the essential genes were common to both cell lines. The oxygen environment significantly impacts the cellular genetic dependencies as 30% of the genes required under hypoxia were not required under normoxic conditions. In addition to identifying essential genes already implicated in GBM such as CDK4, KIF11 , and RAN , the screen also identified new genes that have not been previously implicated in GBM stem cell biology. The importance of the serum and glucocorticoid-regulated kinase 1 (SGK1) for cellular survival was validated in multiple patient-derived GBM stem cell lines using shRNA, CRISPR, and pharmacologic inhibitors. However, SGK1 depletion and inhibition has little effect on traditional serum grown glioma lines and on differentiated GBM-SCs indicating its specific importance in GBM stem cell survival. Implications: This study identifies genes required for the growth and survival of GBM stem cells under both normoxic and hypoxic conditions and finds SGK1 as a novel potential drug target for GBM. Mol Cancer Res; 16(1); 103-14. ©2017 AACR . ©2017 American Association for Cancer Research.

  16. The limits of two-year bioassay exposure regimens for identifying chemical carcinogens.

    Science.gov (United States)

    Huff, James; Jacobson, Michael F; Davis, Devra Lee

    2008-11-01

    Chemical carcinogenesis bioassays in animals have long been recognized and accepted as valid predictors of potential cancer hazards to humans. Most rodent bioassays begin several weeks after birth and expose animals to chemicals or other substances, including workplace and environmental pollutants, for 2 years. New findings indicate the need to extend the timing and duration of exposures used in the rodent bioassay. In this Commentary, we propose that the sensitivity of chemical carcinogenesis bio-assays would be enhanced by exposing rodents beginning in utero and continuing for 30 months (130 weeks) or until their natural deaths at up to about 3 years. Studies of three chemicals of different structures and uses-aspartame, cadmium, and toluene-suggest that exposing experimental animals in utero and continuing exposure for 30 months or until their natural deaths increase the sensitivity of bioassays, avoid false-negative results, and strengthen the value and validity of results for regulatory agencies. Government agencies, drug companies, and the chemical industry should conduct and compare the results of 2-year bioassays of known carcinogens or chemicals for which there is equivocal evidence of carcinogenicity with longer-term studies, with and without in utero exposure. If studies longer than 2 years and/or with in utero exposure are found to better identify potential human carcinogens, then regulatory agencies should promptly revise their testing guidelines, which were established in the 1960s and early 1970s. Changing the timing and dosing of the animal bioassay would enhance protection of workers and consumers who are exposed to potentially dangerous workplace or home contaminants, pollutants, drugs, food additives, and other chemicals throughout their lives.

  17. RNA sequencing of Populus x canadensis roots identifies key molecular mechanisms underlying physiological adaption to excess zinc.

    Directory of Open Access Journals (Sweden)

    Andrea Ariani

    Full Text Available Populus x canadensis clone I-214 exhibits a general indicator phenotype in response to excess Zn, and a higher metal uptake in roots than in shoots with a reduced translocation to aerial parts under hydroponic conditions. This physiological adaptation seems mainly regulated by roots, although the molecular mechanisms that underlie these processes are still poorly understood. Here, differential expression analysis using RNA-sequencing technology was used to identify the molecular mechanisms involved in the response to excess Zn in root. In order to maximize specificity of detection of differentially expressed (DE genes, we consider the intersection of genes identified by three distinct statistical approaches (61 up- and 19 down-regulated and validate them by RT-qPCR, yielding an agreement of 93% between the two experimental techniques. Gene Ontology (GO terms related to oxidation-reduction processes, transport and cellular iron ion homeostasis were enriched among DE genes, highlighting the importance of metal homeostasis in adaptation to excess Zn by P. x canadensis clone I-214. We identified the up-regulation of two Populus metal transporters (ZIP2 and NRAMP1 probably involved in metal uptake, and the down-regulation of a NAS4 gene involved in metal translocation. We identified also four Fe-homeostasis transcription factors (two bHLH38 genes, FIT and BTS that were differentially expressed, probably for reducing Zn-induced Fe-deficiency. In particular, we suggest that the down-regulation of FIT transcription factor could be a mechanism to cope with Zn-induced Fe-deficiency in Populus. These results provide insight into the molecular mechanisms involved in adaption to excess Zn in Populus spp., but could also constitute a starting point for the identification and characterization of molecular markers or biotechnological targets for possible improvement of phytoremediation performances of poplar trees.

  18. Global metabolic analyses identify key differences in metabolite levels between polymyxin-susceptible and polymyxin-resistant Acinetobacter baumannii.

    Science.gov (United States)

    Maifiah, Mohd Hafidz Mahamad; Cheah, Soon-Ee; Johnson, Matthew D; Han, Mei-Ling; Boyce, John D; Thamlikitkul, Visanu; Forrest, Alan; Kaye, Keith S; Hertzog, Paul; Purcell, Anthony W; Song, Jiangning; Velkov, Tony; Creek, Darren J; Li, Jian

    2016-02-29

    Multidrug-resistant Acinetobacter baumannii presents a global medical crisis and polymyxins are used as the last-line therapy. This study aimed to identify metabolic differences between polymyxin-susceptible and polymyxin-resistant A. baumannii using untargeted metabolomics. The metabolome of each A. baumannii strain was measured using liquid chromatography-mass spectrometry. Multivariate and univariate statistics and pathway analyses were employed to elucidate metabolic differences between the polymyxin-susceptible and -resistant A. baumannii strains. Significant differences were identified between the metabolic profiles of the polymyxin-susceptible and -resistant A. baumannii strains. The lipopolysaccharide (LPS) deficient, polymyxin-resistant 19606R showed perturbation in specific amino acid and carbohydrate metabolites, particularly pentose phosphate pathway (PPP) and tricarboxylic acid (TCA) cycle intermediates. Levels of nucleotides were lower in the LPS-deficient 19606R. Furthermore, 19606R exhibited a shift in its glycerophospholipid profile towards increased abundance of short-chain lipids compared to the parent polymyxin-susceptible ATCC 19606. In contrast, in a pair of clinical isolates 03-149.1 (polymyxin-susceptible) and 03-149.2 (polymyxin-resistant, due to modification of lipid A), minor metabolic differences were identified. Notably, peptidoglycan biosynthesis metabolites were significantly depleted in both of the aforementioned polymyxin-resistant strains. This is the first comparative untargeted metabolomics study to show substantial differences in the metabolic profiles of the polymyxin-susceptible and -resistant A. baumannii.

  19. Genome-wide association studies of autoimmune vitiligo identify 23 new risk loci and highlight key pathways and regulatory variants.

    Science.gov (United States)

    Jin, Ying; Andersen, Genevieve; Yorgov, Daniel; Ferrara, Tracey M; Ben, Songtao; Brownson, Kelly M; Holland, Paulene J; Birlea, Stanca A; Siebert, Janet; Hartmann, Anke; Lienert, Anne; van Geel, Nanja; Lambert, Jo; Luiten, Rosalie M; Wolkerstorfer, Albert; Wietze van der Veen, J P; Bennett, Dorothy C; Taïeb, Alain; Ezzedine, Khaled; Kemp, E Helen; Gawkrodger, David J; Weetman, Anthony P; Kõks, Sulev; Prans, Ele; Kingo, Külli; Karelson, Maire; Wallace, Margaret R; McCormack, Wayne T; Overbeck, Andreas; Moretti, Silvia; Colucci, Roberta; Picardo, Mauro; Silverberg, Nanette B; Olsson, Mats; Valle, Yan; Korobko, Igor; Böhm, Markus; Lim, Henry W; Hamzavi, Iltefat; Zhou, Li; Mi, Qing-Sheng; Fain, Pamela R; Santorico, Stephanie A; Spritz, Richard A

    2016-11-01

    Vitiligo is an autoimmune disease in which depigmented skin results from the destruction of melanocytes, with epidemiological association with other autoimmune diseases. In previous linkage and genome-wide association studies (GWAS1 and GWAS2), we identified 27 vitiligo susceptibility loci in patients of European ancestry. We carried out a third GWAS (GWAS3) in European-ancestry subjects, with augmented GWAS1 and GWAS2 controls, genome-wide imputation, and meta-analysis of all three GWAS, followed by an independent replication. The combined analyses, with 4,680 cases and 39,586 controls, identified 23 new significantly associated loci and 7 suggestive loci. Most encode immune and apoptotic regulators, with some also associated with other autoimmune diseases, as well as several melanocyte regulators. Bioinformatic analyses indicate a predominance of causal regulatory variation, some of which corresponds to expression quantitative trait loci (eQTLs) at these loci. Together, the identified genes provide a framework for the genetic architecture and pathobiology of vitiligo, highlight relationships with other autoimmune diseases and melanoma, and offer potential targets for treatment.

  20. Genome-wide association studies of autoimmune vitiligo identify 23 new risk loci and highlight key pathways and regulatory variants

    Science.gov (United States)

    Jin, Ying; Andersen, Genevieve; Yorgov, Daniel; Ferrara, Tracey M; Ben, Songtao; Brownson, Kelly M; Holland, Paulene J; Birlea, Stanca A; Siebert, Janet; Hartmann, Anke; Lienert, Anne; van Geel, Nanja; Lambert, Jo; Luiten, Rosalie M; Wolkerstorfer, Albert; van der Veen, JP Wietze; Bennett, Dorothy C; Taïeb, Alain; Ezzedine, Khaled; Kemp, E Helen; Gawkrodger, David J; Weetman, Anthony P; Kõks, Sulev; Prans, Ele; Kingo, Külli; Karelson, Maire; Wallace, Margaret R; McCormack, Wayne T; Overbeck, Andreas; Moretti, Silvia; Colucci, Roberta; Picardo, Mauro; Silverberg, Nanette B; Olsson, Mats; Valle, Yan; Korobko, Igor; Böhm, Markus; Lim, Henry W.; Hamzavi, Iltefat; Zhou, Li; Mi, Qing-Sheng; Fain, Pamela R.; Santorico, Stephanie A; Spritz, Richard A

    2016-01-01

    Vitiligo is an autoimmune disease in which depigmented skin results from destruction of melanocytes1, with epidemiologic association with other autoimmune diseases2. In previous linkage and genome-wide association studies (GWAS1, GWAS2), we identified 27 vitiligo susceptibility loci in patients of European (EUR) ancestry. We carried out a third GWAS (GWAS3) in EUR subjects, with augmented GWAS1 and GWAS2 controls, genome-wide imputation, and meta-analysis of all three GWAS, followed by an independent replication. The combined analyses, with 4,680 cases and 39,586 controls, identified 23 new loci and 7 suggestive loci, most encoding immune and apoptotic regulators, some also associated with other autoimmune diseases, as well as several melanocyte regulators. Bioinformatic analyses indicate a predominance of causal regulatory variation, some corresponding to eQTL at these loci. Together, the identified genes provide a framework for vitiligo genetic architecture and pathobiology, highlight relationships to other autoimmune diseases and melanoma, and offer potential targets for treatment. PMID:27723757

  1. Secondary Engineering Design Graphics Educator Service Load of Students with Identified Categorical Disabilities and Limited English Proficiency

    Science.gov (United States)

    Ernst, Jeremy V.; Li, Songze; Williams, Thomas O.

    2014-01-01

    The ever-changing student population of engineering design graphics students necessitates broader sets of instructor adeptness. Specifically, preparedness to educate and provide adequate educational access to content for students with identified categorical disabilities and Limited English Proficiency (LEP) is now an essential readiness skill for…

  2. Structural characterization of POM6 Fab and mouse prion protein complex identifies key regions for prions conformational conversion.

    Science.gov (United States)

    Baral, Pravas Kumar; Swayampakula, Mridula; Aguzzi, Adriano; James, Michael N G

    2018-05-01

    Conversion of the cellular prion protein PrP C into its pathogenic isoform PrP S c is the hallmark of prion diseases, fatal neurodegenerative diseases affecting many mammalian species including humans. Anti-prion monoclonal antibodies can arrest the progression of prion diseases by stabilizing the cellular form of the prion protein. Here, we present the crystal structure of the POM6 Fab fragment, in complex with the mouse prion protein (moPrP). The prion epitope of POM6 is in close proximity to the epitope recognized by the purportedly toxic antibody fragment, POM1 Fab also complexed with moPrP. The POM6 Fab recognizes a larger binding interface indicating a likely stronger binding compared to POM1. POM6 and POM1 exhibit distinct biological responses. Structural comparisons of the bound mouse prion proteins from the POM6 Fab:moPrP and POM1 Fab:moPrP complexes reveal several key regions of the prion protein that might be involved in initiating mis-folding events. The structural data of moPrP:POM6 Fab complex are available in the PDB under the accession number www.rcsb.org/pdb/search/structidSearch.do?structureId=6AQ7. © 2018 Federation of European Biochemical Societies.

  3. Community landscapes: an integrative approach to determine overlapping network module hierarchy, identify key nodes and predict network dynamics.

    Directory of Open Access Journals (Sweden)

    István A Kovács

    Full Text Available BACKGROUND: Network communities help the functional organization and evolution of complex networks. However, the development of a method, which is both fast and accurate, provides modular overlaps and partitions of a heterogeneous network, has proven to be rather difficult. METHODOLOGY/PRINCIPAL FINDINGS: Here we introduce the novel concept of ModuLand, an integrative method family determining overlapping network modules as hills of an influence function-based, centrality-type community landscape, and including several widely used modularization methods as special cases. As various adaptations of the method family, we developed several algorithms, which provide an efficient analysis of weighted and directed networks, and (1 determine persvasively overlapping modules with high resolution; (2 uncover a detailed hierarchical network structure allowing an efficient, zoom-in analysis of large networks; (3 allow the determination of key network nodes and (4 help to predict network dynamics. CONCLUSIONS/SIGNIFICANCE: The concept opens a wide range of possibilities to develop new approaches and applications including network routing, classification, comparison and prediction.

  4. Identifying a key physical factor sensitive to the performance of Madden-Julian oscillation simulation in climate models

    Science.gov (United States)

    Kim, Go-Un; Seo, Kyong-Hwan

    2018-01-01

    A key physical factor in regulating the performance of Madden-Julian oscillation (MJO) simulation is examined by using 26 climate model simulations from the World Meteorological Organization's Working Group for Numerical Experimentation/Global Energy and Water Cycle Experiment Atmospheric System Study (WGNE and MJO-Task Force/GASS) global model comparison project. For this, intraseasonal moisture budget equation is analyzed and a simple, efficient physical quantity is developed. The result shows that MJO skill is most sensitive to vertically integrated intraseasonal zonal wind convergence (ZC). In particular, a specific threshold value of the strength of the ZC can be used as distinguishing between good and poor models. An additional finding is that good models exhibit the correct simultaneous convection and large-scale circulation phase relationship. In poor models, however, the peak circulation response appears 3 days after peak rainfall, suggesting unfavorable coupling between convection and circulation. For an improving simulation of the MJO in climate models, we propose that this delay of circulation in response to convection needs to be corrected in the cumulus parameterization scheme.

  5. Genomics and relative expression analysis identifies key genes associated with high female to male flower ratio in Jatropha curcas L.

    Science.gov (United States)

    Gangwar, Manali; Sood, Hemant; Chauhan, Rajinder Singh

    2016-04-01

    Jatropha curcas, has been projected as a major source of biodiesel due to high seed oil content (42 %). A major roadblock for commercialization of Jatropha-based biodiesel is low seed yield per inflorescence, which is affected by low female to male flower ratio (1:25-30). Molecular dissection of female flower development by analyzing genes involved in phase transitions and floral organ development is, therefore, crucial for increasing seed yield. Expression analysis of 42 genes implicated in floral organ development and sex determination was done at six floral developmental stages of a J. curcas genotype (IC561235) with inherently higher female to male flower ratio (1:8-10). Relative expression analysis of these genes was done on low ratio genotype. Genes TFL1, SUP, AP1, CRY2, CUC2, CKX1, TAA1 and PIN1 were associated with reproductive phase transition. Further, genes CUC2, TAA1, CKX1 and PIN1 were associated with female flowering while SUP and CRY2 in female flower transition. Relative expression of these genes with respect to low female flower ratio genotype showed up to ~7 folds increase in transcript abundance of SUP, TAA1, CRY2 and CKX1 genes in intermediate buds but not a significant increase (~1.25 folds) in female flowers, thereby suggesting that these genes possibly play a significant role in increased transition towards female flowering by promoting abortion of male flower primordia. The outcome of study has implications in feedstock improvement of J. curcas through functional validation and eventual utilization of key genes associated with female flowering.

  6. Solution scanning as a key policy tool: identifying management interventions to help maintain and enhance regulating ecosystem services

    Directory of Open Access Journals (Sweden)

    William J. Sutherland

    2014-06-01

    Full Text Available The major task of policy makers and practitioners when confronted with a resource management problem is to decide on the potential solution(s to adopt from a range of available options. However, this process is unlikely to be successful and cost effective without access to an independently verified and comprehensive available list of options. There is currently burgeoning interest in ecosystem services and quantitative assessments of their importance and value. Recognition of the value of ecosystem services to human well-being represents an increasingly important argument for protecting and restoring the natural environment, alongside the moral and ethical justifications for conservation. As well as understanding the benefits of ecosystem services, it is also important to synthesize the practical interventions that are capable of maintaining and/or enhancing these services. Apart from pest regulation, pollination, and global climate regulation, this type of exercise has attracted relatively little attention. Through a systematic consultation exercise, we identify a candidate list of 296 possible interventions across the main regulating services of air quality regulation, climate regulation, water flow regulation, erosion regulation, water purification and waste treatment, disease regulation, pest regulation, pollination and natural hazard regulation. The range of interventions differs greatly between habitats and services depending upon the ease of manipulation and the level of research intensity. Some interventions have the potential to deliver benefits across a range of regulating services, especially those that reduce soil loss and maintain forest cover. Synthesis and applications: Solution scanning is important for questioning existing knowledge and identifying the range of options available to researchers and practitioners, as well as serving as the necessary basis for assessing cost effectiveness and guiding implementation strategies. We

  7. Deleted in breast cancer 1 limits adipose tissue fat accumulation and plays a key role in the development of metabolic syndrome phenotype.

    Science.gov (United States)

    Escande, Carlos; Nin, Veronica; Pirtskhalava, Tamar; Chini, Claudia C S; Tchkonia, Tamar; Kirkland, James L; Chini, Eduardo N

    2015-01-01

    Obesity is often regarded as the primary cause of metabolic syndrome. However, many lines of evidence suggest that obesity may develop as a protective mechanism against tissue damage during caloric surplus and that it is only when the maximum fat accumulation capacity is reached and fatty acid spillover occurs into to peripheral tissues that metabolic diseases develop. In this regard, identifying the molecular mechanisms that modulate adipocyte fat accumulation and fatty acid spillover is imperative. Here we identify the deleted in breast cancer 1 (DBC1) protein as a key regulator of fat storage capacity of adipocytes. We found that knockout (KO) of DBC1 facilitated fat cell differentiation and lipid accumulation and increased fat storage capacity of adipocytes in vitro and in vivo. This effect resulted in a "healthy obesity" phenotype. DBC1 KO mice fed a high-fat diet, although obese, remained insulin sensitive, had lower free fatty acid in plasma, were protected against atherosclerosis and liver steatosis, and lived longer. We propose that DBC1 is part of the molecular machinery that regulates fat storage capacity in adipocytes and participates in the "turn-off" switch that limits adipocyte fat accumulation and leads to fat spillover into peripheral tissues, leading to the deleterious effects of caloric surplus. © 2015 by the American Diabetes Association. Readers may use this article as long as the work is properly cited, the use is educational and not for profit, and the work is not altered.

  8. Integrated RNA-Seq and sRNA-Seq Analysis Identifies Chilling and Freezing Responsive Key Molecular Players and Pathways in Tea Plant (Camellia sinensis)

    Science.gov (United States)

    Zheng, Chao; Zhao, Lei; Wang, Yu; Shen, Jiazhi; Zhang, Yinfei; Jia, Sisi; Li, Yusheng; Ding, Zhaotang

    2015-01-01

    Tea [Camellia sinensis (L) O. Kuntze, Theaceae] is one of the most popular non-alcoholic beverages worldwide. Cold stress is one of the most severe abiotic stresses that limit tea plants’ growth, survival and geographical distribution. However, the genetic regulatory network and signaling pathways involved in cold stress responses in tea plants remain unearthed. Using RNA-Seq, DGE and sRNA-Seq technologies, we performed an integrative analysis of miRNA and mRNA expression profiling and their regulatory network of tea plants under chilling (4℃) and freezing (-5℃) stress. Differentially expressed (DE) miRNA and mRNA profiles were obtained based on fold change analysis, miRNAs and target mRNAs were found to show both coherent and incoherent relationships in the regulatory network. Furthermore, we compared several key pathways (e.g., ‘Photosynthesis’), GO terms (e.g., ‘response to karrikin’) and transcriptional factors (TFs, e.g., DREB1b/CBF1) which were identified as involved in the early chilling and/or freezing response of tea plants. Intriguingly, we found that karrikins, a new group of plant growth regulators, and β-primeverosidase (BPR), a key enzyme functionally relevant with the formation of tea aroma might play an important role in both early chilling and freezing response of tea plants. Quantitative reverse transcriptase-polymerase chain reaction (qRT-PCR) analysis further confirmed the results from RNA-Seq and sRNA-Seq analysis. This is the first study to simultaneously profile the expression patterns of both miRNAs and mRNAs on a genome-wide scale to elucidate the molecular mechanisms of early responses of tea plants to cold stress. In addition to gaining a deeper insight into the cold resistant characteristics of tea plants, we provide a good case study to analyse mRNA/miRNA expression and profiling of non-model plant species using next-generation sequencing technology. PMID:25901577

  9. A Video Analysis of Intra- and Interprofessional Leadership Behaviors Within "The Burns Suite": Identifying Key Leadership Models.

    Science.gov (United States)

    Sadideen, Hazim; Weldon, Sharon-Marie; Saadeddin, Munir; Loon, Mark; Kneebone, Roger

    2016-01-01

    Leadership is particularly important in complex highly interprofessional health care contexts involving a number of staff, some from the same specialty (intraprofessional), and others from different specialties (interprofessional). The authors recently published the concept of "The Burns Suite" (TBS) as a novel simulation tool to deliver interprofessional and teamwork training. It is unclear which leadership behaviors are the most important in an interprofessional burns resuscitation scenario, and whether they can be modeled on to current leadership theory. The purpose of this study was to perform a comprehensive video analysis of leadership behaviors within TBS. A total of 3 burns resuscitation simulations within TBS were recorded. The video analysis was grounded-theory inspired. Using predefined criteria, actions/interactions deemed as leadership behaviors were identified. Using an inductive iterative process, 8 main leadership behaviors were identified. Cohen's κ coefficient was used to measure inter-rater agreement and calculated as κ = 0.7 (substantial agreement). Each video was watched 4 times, focusing on 1 of the 4 team members per viewing (senior surgeon, senior nurse, trainee surgeon, and trainee nurse). The frequency and types of leadership behavior of each of the 4 team members were recorded. Statistical significance to assess any differences was assessed using analysis of variance, whereby a p Leadership behaviors were triangulated with verbal cues and actions from the videos. All 3 scenarios were successfully completed. The mean scenario length was 22 minutes. A total of 362 leadership behaviors were recorded from the 12 participants. The most evident leadership behaviors of all team members were adhering to guidelines (which effectively equates to following Advanced Trauma and Life Support/Emergency Management of Severe Burns resuscitation guidelines and hence "maintaining standards"), followed by making decisions. Although in terms of total

  10. Metabolic profiles of triple-negative and luminal A breast cancer subtypes in African-American identify key metabolic differences.

    Science.gov (United States)

    Tayyari, Fariba; Gowda, G A Nagana; Olopade, Olufunmilayo F; Berg, Richard; Yang, Howard H; Lee, Maxwell P; Ngwa, Wilfred F; Mittal, Suresh K; Raftery, Daniel; Mohammed, Sulma I

    2018-02-20

    Breast cancer, a heterogeneous disease with variable pathophysiology and biology, is classified into four major subtypes. While hormonal- and antibody-targeted therapies are effective in the patients with luminal and HER-2 subtypes, the patients with triple-negative breast cancer (TNBC) subtype do not benefit from these therapies. The incidence rates of TNBC subtype are higher in African-American women, and the evidence indicates that these women have worse prognosis compared to women of European descent. The reasons for this disparity remain unclear but are often attributed to TNBC biology. In this study, we performed metabolic analysis of breast tissues to identify how TNBC differs from luminal A breast cancer (LABC) subtypes within the African-American and Caucasian breast cancer patients, respectively. We used High-Resolution Magic Angle Spinning (HR-MAS) 1H Nuclear magnetic resonance (NMR) to perform the metabolomic analysis of breast cancer and adjacent normal tissues (total n=82 samples). TNBC and LABC subtypes in African American women exhibited different metabolic profiles. Metabolic profiles of these subtypes were also distinct from those revealed in Caucasian women. TNBC in African-American women expressed higher levels of glutathione, choline, and glutamine as well as profound metabolic alterations characterized by decreased mitochondrial respiration and increased glycolysis concomitant with decreased levels of ATP. TNBC in Caucasian women was associated with increased pyrimidine synthesis. These metabolic alterations could potentially be exploited as novel treatment targets for TNBC.

  11. Comparative and functional genomics of Legionella identified eukaryotic like proteins as key players in host-pathogen interactions

    Directory of Open Access Journals (Sweden)

    Laura eGomez-Valero

    2011-10-01

    Full Text Available Although best known for its ability to cause severe pneumonia in people whose immune defenses are weakened, Legionella pneumophila and Legionella longbeachae are two species of a large genus of bacteria that are ubiquitous in nature, where they parasitize protozoa. Adaptation to the host environment and exploitation of host cell functions are critical for the success of these intracellular pathogens. The establishment and publication of the complete genome sequences of L. pneumophila and L. longbeachae isolates paved the way for major breakthroughs in understanding the biology of these organisms. In this review we present the knowledge gained from the analyses and comparison of the complete genome sequences of different L. pneumophila and L. longbeachae strains. Emphasis is given on putative virulence and Legionella life cycle related functions, such as the identification of an extended array of eukaryotic-like proteins, many of which have been shown to modulate host cell functions to the pathogen's advantage. Surprisingly, many of the eukaryotic domain proteins identified in L. pneumophila as well as many substrates of the Dot/Icm type IV secretion system essential for intracellular replication are different between these two species, although they cause the same disease. Finally, evolutionary aspects regarding the eukaryotic like proteins in Legionella are discussed.

  12. Identifying and Prioritizing the Key Factors Influencing Customer Decision Making in Buying Organizational Software (A survey about HAMKARAN Co.

    Directory of Open Access Journals (Sweden)

    shahryar Azizi

    2013-07-01

    Full Text Available Expansion of adopting information systems, specially packed software, facilitate managing the organizational process, hence, identification the factors influence customer buying decision is vital for software providers. This mixed method study tried to identify the factors affecting decision making of buying new organizational software, classify and rank them beside. In-depth interviews with 10 customers of Hamkaran system that had the potential of buying new software have been done and content analysis of these interviews revealed some factors in five categories that became the base of questionnaire design. This study is applied in view of aim, and is descriptive-survey in view of entity. Sample of 177 customers of System Group Co. have been chosen for the study. Kruskal-Wallis test and T test of normality showed all factors to be effective. Then the factors have been prioritized using Frideman test which are as follows: buyer`s internal organizational factors, product feature, factors related to sellers organization, factors related to process and selling promotion, market and environmental factors.

  13. A molecular key for building hyphae aggregates: the role of the newly identified Streptomyces protein HyaS.

    Science.gov (United States)

    Koebsch, Ilona; Overbeck, Jens; Piepmeyer, Sophie; Meschke, Holger; Schrempf, Hildgund

    2009-05-01

    Streptomycetes produce many metabolites with medical and biotechnological applications. During fermentations, their hyphae build aggregates, a process in which the newly identified protein HyaS plays an important role. The corresponding hyaS gene is present within all investigated Streptomyces species. Reporter fusions indicate that transcription of hyaS occurs within substrate hyphae of the Streptomyces lividans wild type (WT). The HyaS protein is dominantly associated with the substrate hyphae. The WT strain forms cylindrically shaped clumps of densely packed substrate hyphae, often fusing to higher aggregates (pellets), which remain stably associated during shaking. Investigations by electron microscopy suggest that HyaS induces tight fusion-like contacts among substrate hyphae. In contrast, the pellets of the designed hyaS disruption mutant ΔH are irregular in shape, contain frequently outgrowing bunches of hyphae, and fuse less frequently. ΔH complemented with a plasmid carrying hyaS resembles the WT phenotype. Biochemical studies indicate that the C-terminal region of HyaS has amine oxidase activity. Investigations of ΔH transformants, each carrying a specifically mutated gene, lead to the conclusion that the in situ oxidase activity correlates with the pellet-inducing role of HyaS, and depends on the presence of certain histidine residues. Furthermore, the level of undecylprodigiosin, a red pigment with antibiotic activity, is influenced by the engineered hyaS subtype within a strain. These data present the first molecular basis for future manipulation of pellets, and concomitant production of secondary metabolites during biotechnological processes. © 2009 The Authors. Journal compilation © 2009 Society for Applied Microbiology and Blackwell Publishing Ltd.

  14. Funnel plot control limits to identify poorly performing healthcare providers when there is uncertainty in the value of the benchmark.

    Science.gov (United States)

    Manktelow, Bradley N; Seaton, Sarah E; Evans, T Alun

    2016-12-01

    There is an increasing use of statistical methods, such as funnel plots, to identify poorly performing healthcare providers. Funnel plots comprise the construction of control limits around a benchmark and providers with outcomes falling outside the limits are investigated as potential outliers. The benchmark is usually estimated from observed data but uncertainty in this estimate is usually ignored when constructing control limits. In this paper, the use of funnel plots in the presence of uncertainty in the value of the benchmark is reviewed for outcomes from a Binomial distribution. Two methods to derive the control limits are shown: (i) prediction intervals; (ii) tolerance intervals Tolerance intervals formally include the uncertainty in the value of the benchmark while prediction intervals do not. The probability properties of 95% control limits derived using each method were investigated through hypothesised scenarios. Neither prediction intervals nor tolerance intervals produce funnel plot control limits that satisfy the nominal probability characteristics when there is uncertainty in the value of the benchmark. This is not necessarily to say that funnel plots have no role to play in healthcare, but that without the development of intervals satisfying the nominal probability characteristics they must be interpreted with care. © The Author(s) 2014.

  15. Limitations and Extensions of the Lock-and-Key Principle: Differences between Gas State, Solution and Solid State Structures

    Directory of Open Access Journals (Sweden)

    Hans-Jörg Schneider

    2015-03-01

    Full Text Available The lock-and-key concept is discussed with respect to necessary extensions. Formation of supramolecular complexes depends not only, and often not even primarily on an optimal geometric fit between host and guest. Induced fit and allosteric interactions have long been known as important modifications. Different binding mechanisms, the medium used and pH effects can exert a major influence on the affinity. Stereoelectronic effects due to lone pair orientation can lead to variation of binding constants by orders of magnitude. Hydrophobic interactions due to high-energy water inside cavities modify the mechanical lock-and-key picture. That optimal affinities are observed if the cavity is only partially filled by the ligand can be in conflict with the lock-and-key principle. In crystals other forces than those between host and guest often dominate, leading to differences between solid state and solution structures. This is exemplified in particular with calixarene complexes, which by X-ray analysis more often than other hosts show guest molecules outside their cavity. In view of this the particular problems with the identification of weak interactions in crystals is discussed.

  16. Ten key short-term sectoral benchmarks to limit warming to 1.5°C

    NARCIS (Netherlands)

    Kuramochi, Takeshi; Höhne, Niklas; Schaeffer, Michiel; Cantzler, Jasmin; Hare, Bill; Deng, Yvonne; Sterl, Sebastian; Hagemann, Markus; Rocha, Marcia; Yanguas-Parra, Paola Andrea; Mir, Goher Ur Rehman; Wong, Lindee; El-Laboudy, Tarik; Wouters, Karlien; Deryng, Delphine; Blok, Kornelis

    2018-01-01

    This article identifies and quantifies the 10 most important benchmarks for climate action to be taken by 2020–2025 to keep the window open for a 1.5°C-consistent GHG emission pathway. We conducted a comprehensive review of existing emissions scenarios, scanned all sectors and the respective

  17. TB preventive therapy for people living with HIV: key considerations for scale-up in resource-limited settings.

    Science.gov (United States)

    Pathmanathan, I; Ahmedov, S; Pevzner, E; Anyalechi, G; Modi, S; Kirking, H; Cavanaugh, J S

    2018-06-01

    Tuberculosis (TB) is the leading cause of death for persons living with the human immunodeficiency virus (PLHIV). TB preventive therapy (TPT) works synergistically with, and independently of, antiretroviral therapy to reduce TB morbidity, mortality and incidence among PLHIV. However, although TPT is a crucial and cost-effective component of HIV care for adults and children and has been recommended as an international standard of care for over a decade, it remains highly underutilized. If we are to end the global TB epidemic, we must address the significant reservoir of tuberculous infection, especially in those, such as PLHIV, who are most likely to progress to TB disease. To do so, we must confront the pervasive perception that barriers to TPT scale-up are insurmountable in resource-limited settings. Here we review available evidence to address several commonly stated obstacles to TPT scale-up, including the need for the tuberculin skin test, limited diagnostic capacity to reliably exclude TB disease, concerns about creating drug resistance, suboptimal patient adherence to therapy, inability to monitor for and prevent adverse events, a 'one size fits all' option for TPT regimen and duration, and uncertainty about TPT use in children, adolescents, and pregnant women. We also discuss TPT delivery in the era of differentiated care for PLHIV, how best to tackle advanced planning for drug procurement and supply chain management, and how to create an enabling environment for TPT scale-up success.

  18. The building blocks of a 'Liveable Neighbourhood': Identifying the key performance indicators for walking of an operational planning policy in Perth, Western Australia.

    Science.gov (United States)

    Hooper, Paula; Knuiman, Matthew; Foster, Sarah; Giles-Corti, Billie

    2015-11-01

    Planning policy makers are requesting clearer guidance on the key design features required to build neighbourhoods that promote active living. Using a backwards stepwise elimination procedure (logistic regression with generalised estimating equations adjusting for demographic characteristics, self-selection factors, stage of construction and scale of development) this study identified specific design features (n=16) from an operational planning policy ("Liveable Neighbourhoods") that showed the strongest associations with walking behaviours (measured using the Neighbourhood Physical Activity Questionnaire). The interacting effects of design features on walking behaviours were also investigated. The urban design features identified were grouped into the "building blocks of a Liveable Neighbourhood", reflecting the scale, importance and sequencing of the design and implementation phases required to create walkable, pedestrian friendly developments. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Genome-wide expression profiling analysis to identify key genes in the anti-HIV mechanism of CD4+ and CD8+ T cells.

    Science.gov (United States)

    Gao, Lijie; Wang, Yunqi; Li, Yi; Dong, Ya; Yang, Aimin; Zhang, Jie; Li, Fengying; Zhang, Rongqiang

    2018-07-01

    Comprehensive bioinformatics analyses were performed to explore the key biomarkers in response to HIV infection of CD4 + and CD8 + T cells. The numbers of CD4 + and CD8 + T cells of HIV infected individuals were analyzed and the GEO database (GSE6740) was screened for differentially expressed genes (DEGs) in HIV infected CD4 + and CD8 + T cells. Gene Ontology enrichment, KEGG pathway analyses, and protein-protein interaction (PPI) network were performed to identify the key pathway and core proteins in anti-HIV virus process of CD4 + and CD8 + T cells. Finally, we analyzed the expressions of key proteins in HIV-infected T cells (GSE6740 dataset) and peripheral blood mononuclear cells(PBMCs) (GSE511 dataset). 1) CD4 + T cells counts and ratio of CD4 + /CD8 + T cells decreased while CD8 + T cells counts increased in HIV positive individuals; 2) 517 DEGs were found in HIV infected CD4 + and CD8 + T cells at acute and chronic stage with the criterial of P-value T cells. The main biological processes of the DEGs were response to virus and defense response to virus. At chronic stage, ISG15 protein, in conjunction with IFN-1 pathway might play key roles in anti-HIV responses of CD4 + T cells; and 4) The expression of ISG15 increased in both T cells and PBMCs after HIV infection. Gene expression profile of CD4 + and CD8 + T cells changed significantly in HIV infection, in which ISG15 gene may play a central role in activating the natural antiviral process of immune cells. © 2018 Wiley Periodicals, Inc.

  20. Reinforcement of the Gas Barrier Properties of Polyethylene and Polyamide Through the Nanocomposite Approach: Key Factors and Limitations

    Directory of Open Access Journals (Sweden)

    Picard E.

    2015-02-01

    Full Text Available In this study, polyamide 6 (PA6 and polyethylene (PE nanocomposites were prepared from melt blending and a detailed characterization of the nanocomposite morphology and gas barrier properties was performed. The choice of the organoclay was adapted to each polymer matrix. Exfoliated morphology and improved gas transport properties were obtained by melt mixing the polar PA6 matrix and the organoclay, whereas a microcomposite with poor barrier properties was formed from the binary PE/organomodified clay mixture. Different modified polyethylenes were examined as compatibilizers for the polyethylene/organoclay system. The effect of compatibilizer molar mass, polarity and content was investigated on the clay dispersion and on the gas barrier properties. The optimal compatibilizer to clay weight ratio was found to be equal to 4 whatever the compatibilizer. However, a high degree of clay delamination was obtained with the high molar mass compatibilizer whereas highly swollen clay aggregates resulted from the incorporation of the low molar mass interfacial agents. Contrary to the PA based system, the barrier properties of PE nanocomposites were not directly related to the clay dispersion state but resulted also from the matrix/clay interfacial interactions. Oxidized wax was identified as a very promising interfacial agent and a step by step study was performed to optimize the gas transport properties of the systems based on PE, oxidized wax and organoclay. In particular, an interesting combination of oxidized wax and high molar mass maleic anhydride grafted polyethylene allowing dividing the gas permeability by a factor 2 in comparison with neat PE was proposed.

  1. Using the Theory of Planned Behavior to identify key beliefs underlying chlamydia testing intentions in a sample of young people living in deprived areas.

    Science.gov (United States)

    Booth, Amy R; Norman, Paul; Harris, Peter R; Goyder, Elizabeth

    2015-09-01

    The Theory of Planned Behavior was used to identify the key behavioural, normative and control beliefs underlying intentions to test regularly for chlamydia among young people living in socially and economically deprived areas - a high-risk group for infection. Participants (N = 278, 53% male; mean age 17 years) were recruited from a vocational college situated in an area in the most deprived national quintile (England). Participants completed measures of behavioural, normative and control beliefs, plus intention to test regularly for chlamydia. The behavioural, normative and control beliefs most strongly correlated with intentions to test regularly for chlamydia were beliefs about stopping the spread of infection, partners' behaviour and the availability of testing. These beliefs represent potential targets for interventions to increase chlamydia testing among young people living in deprived areas. © The Author(s) 2013.

  2. Integrated network analysis identifies fight-club nodes as a class of hubs encompassing key putative switch genes that induce major transcriptome reprogramming during grapevine development.

    Science.gov (United States)

    Palumbo, Maria Concetta; Zenoni, Sara; Fasoli, Marianna; Massonnet, Mélanie; Farina, Lorenzo; Castiglione, Filippo; Pezzotti, Mario; Paci, Paola

    2014-12-01

    We developed an approach that integrates different network-based methods to analyze the correlation network arising from large-scale gene expression data. By studying grapevine (Vitis vinifera) and tomato (Solanum lycopersicum) gene expression atlases and a grapevine berry transcriptomic data set during the transition from immature to mature growth, we identified a category named "fight-club hubs" characterized by a marked negative correlation with the expression profiles of neighboring genes in the network. A special subset named "switch genes" was identified, with the additional property of many significant negative correlations outside their own group in the network. Switch genes are involved in multiple processes and include transcription factors that may be considered master regulators of the previously reported transcriptome remodeling that marks the developmental shift from immature to mature growth. All switch genes, expressed at low levels in vegetative/green tissues, showed a significant increase in mature/woody organs, suggesting a potential regulatory role during the developmental transition. Finally, our analysis of tomato gene expression data sets showed that wild-type switch genes are downregulated in ripening-deficient mutants. The identification of known master regulators of tomato fruit maturation suggests our method is suitable for the detection of key regulators of organ development in different fleshy fruit crops. © 2014 American Society of Plant Biologists. All rights reserved.

  3. Bi-directional gene set enrichment and canonical correlation analysis identify key diet-sensitive pathways and biomarkers of metabolic syndrome

    Directory of Open Access Journals (Sweden)

    Gaora Peadar Ó

    2010-10-01

    Full Text Available Abstract Background Currently, a number of bioinformatics methods are available to generate appropriate lists of genes from a microarray experiment. While these lists represent an accurate primary analysis of the data, fewer options exist to contextualise those lists. The development and validation of such methods is crucial to the wider application of microarray technology in the clinical setting. Two key challenges in clinical bioinformatics involve appropriate statistical modelling of dynamic transcriptomic changes, and extraction of clinically relevant meaning from very large datasets. Results Here, we apply an approach to gene set enrichment analysis that allows for detection of bi-directional enrichment within a gene set. Furthermore, we apply canonical correlation analysis and Fisher's exact test, using plasma marker data with known clinical relevance to aid identification of the most important gene and pathway changes in our transcriptomic dataset. After a 28-day dietary intervention with high-CLA beef, a range of plasma markers indicated a marked improvement in the metabolic health of genetically obese mice. Tissue transcriptomic profiles indicated that the effects were most dramatic in liver (1270 genes significantly changed; p Conclusion Bi-directional gene set enrichment analysis more accurately reflects dynamic regulatory behaviour in biochemical pathways, and as such highlighted biologically relevant changes that were not detected using a traditional approach. In such cases where transcriptomic response to treatment is exceptionally large, canonical correlation analysis in conjunction with Fisher's exact test highlights the subset of pathways showing strongest correlation with the clinical markers of interest. In this case, we have identified selenoamino acid metabolism and steroid biosynthesis as key pathways mediating the observed relationship between metabolic health and high-CLA beef. These results indicate that this type of

  4. Investigating on the fermentation behavior of six lactic acid bacteria strains in barley malt wort reveals limitation in key amino acids and buffer capacity.

    Science.gov (United States)

    Nsogning, Sorelle Dongmo; Fischer, Susann; Becker, Thomas

    2018-08-01

    Understanding lactic acid bacteria (LAB) fermentation behavior in malt wort is a milestone towards flavor improvement of lactic acid fermented malt beverages. Therefore, this study aims to outline deficiencies that may exist in malt wort fermentation. First, based on six LAB strains, cell viability and vitality were evaluated. Second, sugars, organic acids, amino acids, pH value and buffering capacity (BC) were monitored. Finally, the implication of key amino acids, fructose and wort BC on LAB growth was determined. Short growth phase coupled with prompt cell death and a decrease in metabolic activity was observed. Low wort BC caused rapid pH drop with lactic acid accumulation, which conversely increased the BC leading to less pH change at late-stage fermentation. Lactic acid content (≤3.9 g/L) was higher than the reported inhibitory concentration (1.8 g/L). Furthermore, sugars were still available but fructose and key amino acids lysine, arginine and glutamic acid were considerably exhausted (≤98%). Wort supplementations improved cell growth and viability leading to conclude that key amino acid depletion coupled with low BC limits LAB growth in malt wort. Then, a further increase in organic acid reduces LAB viability. This knowledge opens doors for LAB fermentation process optimization in malt wort. Copyright © 2018 Elsevier Ltd. All rights reserved.

  5. How to identify the key factors that affect driver perception of accident risk. A comparison between Italian and Spanish driver behavior.

    Science.gov (United States)

    de Oña, Juan; de Oña, Rocio; Eboli, Laura; Forciniti, Carmen; Mazzulla, Gabriella

    2014-12-01

    Road crashes can be caused by different factors, including infrastructure, vehicles, and human variables. Many research studies have focused solely on identifying the key factors that cause road crashes. From these studies, it emerged that human factors have the most relevant impact on accident severity. More specifically, accident severity depends on several factors related directly to the driver, i.e., driving experience, driver's socio-economic characteristics, and driving behavior and attitudes. In this paper, we investigate driver behaviors and attitudes while driving and specifically focus on different methods for identifying the factors that most affect the driver's perception of accident risk. To this end, we designed and conducted a survey in two different European contexts: the city of Cosenza, which is located in the south of Italy, and the city of Granada, which is located in the south of Spain. Samples of drivers were contacted for their opinions on certain aspects of driving rules and attitudes while driving, and different types of questions were addressed to the drivers to assess their judgments of these aspects. Consequently, different methods of data analysis were applied to determine the aspects that heavily influence driver perception of accident risk. An experiment based on the stated preferences (SP) was carried out with the drivers, and the SP data were analyzed using an ordered probit (OP) model. Interesting findings emerged from different analyses of the data and from the comparisons among the data collected in the two different territorial contexts. We found that both Italian and Spanish drivers consider driving in an altered psychophysical state and violating the overtaking rules to be the most risky behaviors. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. Diagnosing climate change impacts and identifying adaptation strategies by involving key stakeholder organisations and farmers in Sikkim, India: Challenges and opportunities.

    Science.gov (United States)

    Azhoni, Adani; Goyal, Manish Kumar

    2018-06-01

    Narrowing the gap between research, policy making and implementing adaptation remains a challenge in many parts of the world where climate change is likely to severely impact water security. This research aims to narrow this gap by matching the adaptation strategies being framed by policy makers to that of the perspectives of development agencies, researchers and farmers in the Himalayan state of Sikkim in India. Our case study examined the perspectives of various stakeholders for climate change impacts, current adaptation strategies, knowledge gaps and adaptation barriers, particularly in the context of implementing the Sikkim State Action Plan on Climate Change through semi-structured interviews carried out with decision makers in the Sikkim State Government, researchers, consultants, local academia, development agencies and farmers. Using Stakeholders Network Analysis tools, this research unravels the complexities of perceiving climate change impacts, identifying strategies, and implementing adaptation. While farmers are less aware about the global phenomenon of climate change impacts for water security, their knowledge of the local conditions and their close interaction with the State Government Agriculture Department provides them opportunities. Although important steps are being initiated through the Sikkim State Action Plan on Climate Change it is yet to deliver effective means of adaptation implementation and hence, strengthening the networks of close coordination between the various implementing agencies will pay dividends. Knowledge gaps and the need for capacity building identified in this research, based on the understandings of key stakeholders are highly relevant to both the research community and for informing policy. Copyright © 2018 Elsevier B.V. All rights reserved.

  7. Offshore limit of coastal ocean variability identified from hydrography and altimeter data in the eastern Arabian Sea

    Digital Repository Service at National Institute of Oceanography (India)

    Antony, M.K.; Swamy, G.N.; Somayajulu, Y.K.

    In this communication, we describe a hitherto-unknown offshore limit to the coastal ocean variability signatures away from the continental shelf in the eastern Arabian Sea, based on hydrographic observations and satellite altimeter (TOPEX...

  8. Identifying key controls on the behavior of an acidic-U(VI) plume in the Savannah River Site using reactive transport modeling.

    Science.gov (United States)

    Bea, Sergio A; Wainwright, Haruko; Spycher, Nicolas; Faybishenko, Boris; Hubbard, Susan S; Denham, Miles E

    2013-08-01

    Acidic low-level waste radioactive waste solutions were discharged to three unlined seepage basins at the F-Area of the Department of Energy (DOE) Savannah River Site (SRS), South Carolina, USA, from 1955 through 1989. Despite many years of active remediation, the groundwater remains acidic and contaminated with significant levels of U(VI) and other radionuclides. Monitored Natural Attenuation (MNA) is a desired closure strategy for the site, based on the premise that regional flow of clean background groundwater will eventually neutralize the groundwater acidity, immobilizing U(VI) through adsorption. An in situ treatment system is currently in place to accelerate this in the downgradient portion of the plume and similar measures could be taken upgradient if necessary. Understanding the long-term pH and U(VI) adsorption behavior at the site is critical to assess feasibility of MNA along with the in-situ remediation treatments. This paper presents a reactive transport (RT) model and uncertainty quantification (UQ) analyses to explore key controls on the U(VI)-plume evolution and long-term mobility at this site. Two-dimensional numerical RT simulations are run including the saturated and unsaturated (vadose) zones, U(VI) and H(+) adsorption (surface complexation) onto sediments, dissolution and precipitation of Al and Fe minerals, and key hydrodynamic processes are considered. UQ techniques are applied using a new open-source tool that is part of the developing ASCEM reactive transport modeling and analysis framework to: (1) identify the complex physical and geochemical processes that control the U(VI) plume migration in the pH range where the plume is highly mobile, (2) evaluate those physical and geochemical parameters that are most controlling, and (3) predict the future plume evolution constrained by historical, chemical and hydrological data. The RT simulation results show a good agreement with the observed historical pH and concentrations of U(VI), nitrates

  9. How cannabis causes paranoia: using the intravenous administration of ∆9-tetrahydrocannabinol (THC) to identify key cognitive mechanisms leading to paranoia.

    Science.gov (United States)

    Freeman, Daniel; Dunn, Graham; Murray, Robin M; Evans, Nicole; Lister, Rachel; Antley, Angus; Slater, Mel; Godlewska, Beata; Cornish, Robert; Williams, Jonathan; Di Simplicio, Martina; Igoumenou, Artemis; Brenneisen, Rudolf; Tunbridge, Elizabeth M; Harrison, Paul J; Harmer, Catherine J; Cowen, Philip; Morrison, Paul D

    2015-03-01

    Paranoia is receiving increasing attention in its own right, since it is a central experience of psychotic disorders and a marker of the health of a society. Paranoia is associated with use of the most commonly taken illicit drug, cannabis. The objective was to determine whether the principal psychoactive ingredient of cannabis-∆(9)-tetrahydrocannabinol (THC)-causes paranoia and to use the drug as a probe to identify key cognitive mechanisms underlying paranoia. A randomized, placebo-controlled, between-groups test of the effects of intravenous THC was conducted. A total of 121 individuals with paranoid ideation were randomized to receive placebo, THC, or THC preceded by a cognitive awareness condition. Paranoia was assessed extensively via a real social situation, an immersive virtual reality experiment, and standard self-report and interviewer measures. Putative causal factors were assessed. Principal components analysis was used to create a composite paranoia score and composite causal variables to be tested in a mediation analysis. THC significantly increased paranoia, negative affect (anxiety, worry, depression, negative thoughts about the self), and a range of anomalous experiences, and reduced working memory capacity. The increase in negative affect and in anomalous experiences fully accounted for the increase in paranoia. Working memory changes did not lead to paranoia. Making participants aware of the effects of THC had little impact. In this largest study of intravenous THC, it was definitively demonstrated that the drug triggers paranoid thoughts in vulnerable individuals. The most likely mechanism of action causing paranoia was the generation of negative affect and anomalous experiences. © The Author 2014. Published by Oxford University Press on behalf of the Maryland Psychiatric Research Center.

  10. Sulfur Denitrosylation by an Engineered Trx-like DsbG Enzyme Identifies Nucleophilic Cysteine Hydrogen Bonds as Key Functional Determinant.

    Science.gov (United States)

    Lafaye, Céline; Van Molle, Inge; Tamu Dufe, Veronica; Wahni, Khadija; Boudier, Ariane; Leroy, Pierre; Collet, Jean-François; Messens, Joris

    2016-07-15

    Exposure of bacteria to NO results in the nitrosylation of cysteine thiols in proteins and low molecular weight thiols such as GSH. The cells possess enzymatic systems that catalyze the denitrosylation of these modified sulfurs. An important player in these systems is thioredoxin (Trx), a ubiquitous, cytoplasmic oxidoreductase that can denitrosylate proteins in vivo and S-nitrosoglutathione (GSNO) in vitro However, a periplasmic or extracellular denitrosylase has not been identified, raising the question of how extracytoplasmic proteins are repaired after nitrosative damage. In this study, we tested whether DsbG and DsbC, two Trx family proteins that function in reducing pathways in the Escherichia coli periplasm, also possess denitrosylating activity. Both DsbG and DsbC are poorly reactive toward GSNO. Moreover, DsbG is unable to denitrosylate its specific substrate protein, YbiS. Remarkably, by borrowing the CGPC active site of E. coli Trx-1 in combination with a T200M point mutation, we transformed DsbG into an enzyme highly reactive toward GSNO and YbiS. The pKa of the nucleophilic cysteine, as well as the redox and thermodynamic properties of the engineered DsbG are dramatically changed and become similar to those of E. coli Trx-1. X-ray structural insights suggest that this results from a loss of two direct hydrogen bonds to the nucleophilic cysteine sulfur in the DsbG mutant. Our results highlight the plasticity of the Trx structural fold and reveal that the subtle change of the number of hydrogen bonds in the active site of Trx-like proteins is the key factor that thermodynamically controls reactivity toward nitrosylated compounds. © 2016 by The American Society for Biochemistry and Molecular Biology, Inc.

  11. Identifying Key Features, Cutting Edge Cloud Resources, and Artificial Intelligence Tools to Achieve User-Friendly Water Science in the Cloud

    Science.gov (United States)

    Pierce, S. A.

    2017-12-01

    Decision making for groundwater systems is becoming increasingly important, as shifting water demands increasingly impact aquifers. As buffer systems, aquifers provide room for resilient responses and augment the actual timeframe for hydrological response. Yet the pace impacts, climate shifts, and degradation of water resources is accelerating. To meet these new drivers, groundwater science is transitioning toward the emerging field of Integrated Water Resources Management, or IWRM. IWRM incorporates a broad array of dimensions, methods, and tools to address problems that tend to be complex. Computational tools and accessible cyberinfrastructure (CI) are needed to cross the chasm between science and society. Fortunately cloud computing environments, such as the new Jetstream system, are evolving rapidly. While still targeting scientific user groups systems such as, Jetstream, offer configurable cyberinfrastructure to enable interactive computing and data analysis resources on demand. The web-based interfaces allow researchers to rapidly customize virtual machines, modify computing architecture and increase the usability and access for broader audiences to advanced compute environments. The result enables dexterous configurations and opening up opportunities for IWRM modelers to expand the reach of analyses, number of case studies, and quality of engagement with stakeholders and decision makers. The acute need to identify improved IWRM solutions paired with advanced computational resources refocuses the attention of IWRM researchers on applications, workflows, and intelligent systems that are capable of accelerating progress. IWRM must address key drivers of community concern, implement transdisciplinary methodologies, adapt and apply decision support tools in order to effectively support decisions about groundwater resource management. This presentation will provide an overview of advanced computing services in the cloud using integrated groundwater management case

  12. Trait assembly of woody plants in communities across sub-alpine gradients: Identifying the role of limiting similarity

    NARCIS (Netherlands)

    Yan, B.; Zhang, J.; Liu, Y.; Li, Z.; Huang, X.; Yang, W.; Prinzing, A.

    2012-01-01

    Questions - Plant species can be assembled into communities through habitat filtering or species competition, but their relative roles are still debated. We do not know whether there is limited similarity between co-existing species when accounting for the parallel effect of abiotic habitat

  13. Improving the key biodiversity areas approach for effective conservation planning

    CSIR Research Space (South Africa)

    Knight, AT

    2007-03-01

    Full Text Available The key biodiversity areas (KBA) approach aims to identify globally important areas for species conservation. Although a similar methodology has been used successfully to identify important Bird Areas, the authors have identified five limitations...

  14. Increasing the Photoautotrophic Growth Rate of Synechocystis sp. PCC 6803 by Identifying the Limitations of Its Cultivation.

    Science.gov (United States)

    van Alphen, Pascal; Abedini Najafabadi, Hamed; Branco Dos Santos, Filipe; Hellingwerf, Klaas J

    2018-03-25

    Many conditions have to be optimized in order to be able to grow the cyanobacterium Synechocystis sp. PCC 6803 (Synechocystis) for an extended period of time under physiologically well-defined and constant conditions. It is still poorly understood what limits growth of this organism in batch and continuous cultures in BG-11, the standard medium used to grow Synechocystis. Through a series of batch experiments in flasks and continuous mode experiments in advanced photobioreactors, it is shown that the limiting nutrient during batch cultivation is sulfate, the depletion of which leads to ROS formation and rapid bleaching of pigments after entry into stationary phase. In continuous mode, however, the limiting nutrient is iron. Optimizing these growth conditions resulted in a so far highest growth rate of 0.16 h -1 (4.3 h doubling time), which is significantly higher than the textbook value of 0.09 h -1 (8 h doubling time). An improved medium, BG-11 for prolonged cultivation (BG-11-PC) is introduced, that allows for controlled, extended cultivation of Synechocystis, under well-defined physiological conditions. The data present here have implications for mass-culturing of cyanobacteria. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. A pilot study using scripted ventilation conditions to identify key factors affecting indoor pollutant concentration and air exchange rate in a residence.

    Science.gov (United States)

    Johnson, Ted; Myers, Jeffrey; Kelly, Thomas; Wisbith, Anthony; Ollison, Will

    2004-01-01

    A pilot study was conducted using an occupied, single-family test house in Columbus, OH, to determine whether a script-based protocol could be used to obtain data useful in identifying the key factors affecting air-exchange rate (AER) and the relationship between indoor and outdoor concentrations of selected traffic-related air pollutants. The test script called for hourly changes to elements of the test house considered likely to influence air flow and AER, including the position (open or closed) of each window and door and the operation (on/off) of the furnace, air conditioner, and ceiling fans. The script was implemented over a 3-day period (January 30-February 1, 2002) during which technicians collected hourly-average data for AER, indoor, and outdoor air concentrations for six pollutants (benzene, formaldehyde (HCHO), polycyclic aromatic hydrocarbons (PAH), carbon monoxide (CO), nitric oxide (NO), and nitrogen oxides (NO(x))), and selected meteorological variables. Consistent with expectations, AER tended to increase with the number of open exterior windows and doors. The 39 AER values measured during the study when all exterior doors and windows were closed varied from 0.36 to 2.29 h(-1) with a geometric mean (GM) of 0.77 h(-1) and a geometric standard deviation (GSD) of 1.435. The 27 AER values measured when at least one exterior door or window was opened varied from 0.50 to 15.8 h(-1) with a GM of 1.98 h(-1) and a GSD of 1.902. AER was also affected by temperature and wind speed, most noticeably when exterior windows and doors were closed. Results of a series of stepwise linear regression analyses suggest that (1) outdoor pollutant concentration and (2) indoor pollutant concentration during the preceding hour were the "variables of choice" for predicting indoor pollutant concentration in the test house under the conditions of this study. Depending on the pollutant and ventilation conditions, one or more of the following variables produced a small, but

  16. Optical pre-screening in breast screening programs: Can we identify women who benefit most from limited mammography resources?

    Science.gov (United States)

    Walter, Jane; Loshchenov, Maxim; Zhilkin, Vladimir; Peake, Rachel; Stone, Jennifer; Lilge, Lothar

    2017-04-01

    Background: In excess of 60% of all cancers are detected in low and middle-income countries, with breast cancer (BC) the dominant malignancy for women. Incidence rates continue to climb, most noticeably in the less than 50-year-old population. Expansion of mammography infrastructure and resources is lacking, resulting in over 60% of women diagnosed with stage III/IV BC in the majority of these countries. Optical Breast Spectroscopy (OBS) was shown to correlate well with mammographic breast density (MBD). OBS could aid breast screening programs in low- and middle-income countries by lowering the number of mammographs required for complete population coverage. However, its performance needs to be tested in large population trails to ensure high sensitivity and acceptable specificity. Methods: For the planned studies in low- and middle-income countries in different continents, online methods need to be implemented to monitor the performance and data collection by these devices, operated by trained nurses. Based on existing datasets, procedures were developed to validate an individual woman's data integrity and to identify operator errors versus system malfunctions. Results: Using a dataset comprising spectra from 360 women collected by 2 instruments in different locations and with 3 different trained operators, automated methods were developed to identify 100% of the source or photodetector malfunctions as well as incorrect calibrations and 96% of instances of insufficient tissue contact. Conclusions: Implementing the dataset validation locally in each instrument and tethered to a cloud database will allow the planned clinical trials to proceed.

  17. Get the Basics Right: A Description of the Key Priorities for Establishing a Neonatal Service in a Resource-Limited Setting in Cambodia.

    Science.gov (United States)

    Fox-Lewis, Shivani; Genasci Smith, Wyatt; Lor, Vary; McKellar, Gregor; Phal, Chea; Fox-Lewis, Andrew; Turner, Paul; Neou, Leakhena; Turner, Claudia

    2018-05-28

    Worldwide, reduction in under-five mortality has not sufficiently included neonates, who represent 45% of deaths in children of age under five years. The least progress has been observed in resource-limited settings. This mixed methods study conducted at a Cambodian non-governmental paediatric hospital described the key priorities of the ongoing neonatal service. Routinely collected data from the hospital and microbiology databases included the number of admissions, discharges and deaths and the number of cases of bacteraemias (2011-2016). Semi-structured interviews with the management staff explored the essential features of the service. There were 2127 neonatal admissions and 247 deaths. The incidence of facility-based neonatal mortality decreased by 81%. Bacteraemic healthcare-associated infections decreased by 68%. A dedicated area for neonatal care was perceived as crucial, allowing better infection control and delivery of staff training. In this hospital, the neonatal service prioritized basic measures, particularly, having a dedicated neonatal area. Facility-based mortality and bacteraemic healthcare-associated infections decreased.

  18. Critical and shielding parametric studies with the Monte Carlo code TRIPOLI to identify the key points to take into account during the transportation of blanket assemblies with high ratio of americium

    International Nuclear Information System (INIS)

    Gosmain, Cecile-Aline

    2011-01-01

    In the framework of French research program on Generation IV sodium cooled fast reactor, one possible option consists in burning minor actinides in this kind of Advanced Sodium Technological Reactor. Two types of transmutation mode are studied in the world : the homogeneous mode of transmutation where actinides are scattered with very low enrichment ratio in fissile assemblies and the heterogeneous mode where fissile core is surrounded by blanket assemblies filled with minor actinides with ratio of incorporated actinides up to 20%. Depending on which element is considered to be burnt and on its content, these minor actinides contents imply constraints on assemblies' transportation between Nuclear Power Plants and fuel cycle facilities. In this study, we present some academic studies in order to identify some key constraints linked to the residual power and neutron/gamma load of such kind of blanket assemblies. To simplify the approach, we considered a modeling of a 'model cask' dedicated to the transportation of a unique irradiated blanket assembly loaded with 20% of Americium and basically inspired from an existent cask designed initially for the damaged fissile Superphenix assembly transport. Thermal calculations performed with EDF-SYRTHES code have shown that due to thermal limitations on cladding temperature, the decay time to be considered before transportation is 20 years. This study is based on explicit 3D representations of the cask and the contained blanket assembly with the Monte Carlo code TRIPOLI/JEFF3.1.1 library and concludes that after such a decay time, the transportation of a unique Americium radial blanket is feasible only if the design of our model cask is modified in order to comply with the dose limitation criterion. (author)

  19. Use of gas chromatography-olfactometry to identify key odorant compounds in dark chocolate. Comparison of samples before and after conching.

    Science.gov (United States)

    Counet, Christine; Callemien, Delphine; Ouwerx, Caroline; Collin, Sonia

    2002-04-10

    After vacuum distillation and liquid-liquid extraction, the volatile fractions of dark chocolates were analyzed by gas chromatography-olfactometry and gas chromatography-mass spectrometry. Aroma extract dilution analysis revealed the presence of 33 potent odorants in the neutral/basic fraction. Three of these had a strong chocolate flavor: 2-methylpropanal, 2-methylbutanal, and 3-methylbutanal. Many others were characterized by cocoa/praline-flavored/nutty/coffee notes: 2,3-dimethylpyrazine, trimethylpyrazine, tetramethylpyrazine, 3(or 2),5-dimethyl-2(or 3)-ethylpyrazine, 3,5(or 6)-diethyl-2-methylpyrazine, and furfurylpyrrole. Comparisons carried out before and after conching indicate that although no new key odorant is synthesized during the heating process, levels of 2-phenyl-5-methyl-2-hexenal, Furaneol, and branched pyrazines are significantly increased while most Strecker aldehydes are lost by evaporation.

  20. Identifying and Supporting English Learner Students with Learning Disabilities: Key Issues in the Literature and State Practice. REL 2015-086

    Science.gov (United States)

    Burr, Elizabeth; Haas, Eric; Ferriere, Karen

    2015-01-01

    While the literature on learning disabilities and on second-language acquisition is relatively extensive within the field of education, less is known about the specific characteristics and representation of English learner students with learning disabilities. Because there are no definitive resources and processes for identifying and determining…

  1. Limites e possibilidades da identificação de risco de autismo no primeiro ano de vida Limits and possibilities of identifying autism within the first year of life

    Directory of Open Access Journals (Sweden)

    Mariana Luisa Garcia

    2011-01-01

    Full Text Available Identificar risco de autismo no primeiro ano de vida possibilita intervir precocemente para um prognóstico mais favorável em crianças com autismo. O objetivo deste artigo é discutir limites e possibilidades metodológicas que viabilizem a identificação de sinais de risco de autismo entre 0-12 meses. A metodologia empregada em 24 estudos (retrospectivos e prospectivos sobre identificação de sinais precoces e seus resultados foram analisados. Verificou-se que os limites da identificação de risco de autismo no primeiro ano parecem residir na buscar por categorias comportamentais discretas e que as possibilidades podem residir em analisar categorias de interação e de ordem afetiva.Identifying signs of autism in the first year of life is justified by early intervention and better prognostic. This article aims at discussing methodological limits and possibilities of identifying risk of autism at 0-12 months. Methodology from 24 retrospective and prospective early signs studies and their outcomes were analyzed. Limits of identifying risk of autism in the 1st year of life lies in observing discrete behavioral categories, and possibilities seem to lie in analyzing interactional and affective categories.

  2. Identification of miRNA Signatures Associated with Epithelial Ovarian Cancer Chemoresistance with Further Biological and Functional Validation of Identified Key miRNAs

    Science.gov (United States)

    2012-08-01

    separated on 12% SDS PAGE gels and transferred to nitrocellulose membranes. After blocking with 5% non- fat milk (Labscientific, Inc) in TBS-Tween buffer... Raw mass spectrometric data were processed and analyzed for variations in the spectral counts of peptides between sample sets and bioinformatics was...accomplished using Ingenuity Pathways Analysis (IPA). Results: The total numbers of proteins and peptides identified are listed in the table

  3. Identifying the key processes for technology transfer through spin-offs in academic institutions : a case study in Flanders and The Netherlands

    OpenAIRE

    Meysman, Jasmine; Cleyn, De, Sven H.; Braet, Johan

    2017-01-01

    Abstract: The position and role of technology transfer offices within universities and academic institutions have changed under influence of todays society, with diminishing government subsidies and technology transfer related policies having their impact on the technology transfer processes. In order to find out what the effect of this impact is, we performed a multiple-case study on six technology transfer offices in Flanders and The Netherlands. As a result of the study, we identified two ...

  4. Identifying the Areas Benefitting from the Prevention of Wind Erosion by the Key Ecological Function Area for the Protection of Desertification in Hunshandake, China

    Directory of Open Access Journals (Sweden)

    Yu Xiao

    2017-10-01

    Full Text Available Research on the spatial flow of ecosystem services can help to identify the spatial relationships between service-providing areas (SPAs and service-benefitting areas (SBAs. In this study, we used the Hybrid Single-Particle Lagrangian Integrated Trajectory (HYSPLIT model to stimulate the flow paths of the wind erosion prevented by ecosystems in Hunshandake, China. By interpolating these paths, the SBAs were identified, and their benefits in terms of land cover, population, and Gross Domestic Product (GDP were determined. The results indicated that the flow paths mostly extended to the eastern part of the study area, and the estimated cover of the SBAs was 39.21% of the total area of China. The grid cells through which many (≥10% of the trajectories passed were mainly located in the western part of north-eastern China and the eastern part of northern China. The benefitting population accounted for 74.51% of the total population of China, and the GDP was 67.11% of the total in 2010. Based on this research, we described a quantitative relationship between the SPAs and the SBAs and identified the actual beneficiaries. This work may provide scientific knowledge that can be used by decision makers to develop management strategies, such as ecological compensation to mitigate damage from sandstorms in the study area.

  5. Kinome-wide shRNA Screen Identifies the Receptor Tyrosine Kinase AXL as a Key Regulator for Mesenchymal Glioblastoma Stem-like Cells

    Directory of Open Access Journals (Sweden)

    Peng Cheng

    2015-05-01

    Full Text Available Glioblastoma is a highly lethal cancer for which novel therapeutics are urgently needed. Two distinct subtypes of glioblastoma stem-like cells (GSCs were recently identified: mesenchymal (MES and proneural (PN. To identify mechanisms to target the more aggressive MES GSCs, we combined transcriptomic expression analysis and kinome-wide short hairpin RNA screening of MES and PN GSCs. In comparison to PN GSCs, we found significant upregulation and phosphorylation of the receptor tyrosine kinase AXL in MES GSCs. Knockdown of AXL significantly decreased MES GSC self-renewal capacity in vitro and inhibited the growth of glioblastoma patient-derived xenografts. Moreover, inhibition of AXL with shRNA or pharmacologic inhibitors also increased cell death significantly more in MES GSCs. Clinically, AXL expression was elevated in the MES GBM subtype and significantly correlated with poor prognosis in multiple cancers. In conclusion, we identified AXL as a potential molecular target for novel approaches to treat glioblastoma and other solid cancers.

  6. Labonté Identifies Key Issues for Health Promoters in the New World Order Comment on "Health Promotion in an Age of Normative Equity and Rampant Inequality".

    Science.gov (United States)

    Raphael, Dennis Raphael

    2016-11-02

    For over 35 years Ronald Labonté has been critically analyzing the state of health promotion in Canada and the world. In 1981, he identified the shortcomings of the groundbreaking Lalonde Report by warning of the seductive appeal of so-called lifestyle approaches to health. Since then, he has left a trail of critical work identifying the barriers to - and opportunities for -health promotion work. More recently, he has shown how the rise of economic globalization and acceptance of neo-liberal ideology has come to threaten the health of those in both developed and developing nations. In his recent commentary, Labonté shows how the United Nations' 2015 Sustainable Development Goals (SDGs) can offer a new direction for health promoters in these difficult times. © 2017 The Author(s); Published by Kerman University of Medical Sciences. This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

  7. Integrated analysis of oral tongue squamous cell carcinoma identifies key variants and pathways linked to risk habits, HPV, clinical parameters and tumor recurrence [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Neeraja Krishnan

    2015-11-01

    Full Text Available Oral tongue squamous cell carcinomas (OTSCC are a homogeneous group of tumors characterized by aggressive behavior, early spread to lymph nodes and a higher rate of regional failure. Additionally, the incidence of OTSCC among younger population (<50yrs is on the rise; many of whom lack the typical associated risk factors of alcohol and/or tobacco exposure. We present data on single nucleotide variations (SNVs, indels, regions with loss of heterozygosity (LOH, and copy number variations (CNVs from fifty-paired oral tongue primary tumors and link the significant somatic variants with clinical parameters, epidemiological factors including human papilloma virus (HPV infection and tumor recurrence. Apart from the frequent somatic variants harbored in TP53, CASP8, RASA1, NOTCH and CDKN2A genes, significant amplifications and/or deletions were detected in chromosomes 6-9, and 11 in the tumors. Variants in CASP8 and CDKN2A were mutually exclusive. CDKN2A, PIK3CA, RASA1 and DMD variants were exclusively linked to smoking, chewing, HPV infection and tumor stage. We also performed a whole-genome gene expression study that identified matrix metalloproteases to be highly expressed in tumors and linked pathways involving arachidonic acid and NF-k-B to habits and distant metastasis, respectively. Functional knockdown studies in cell lines demonstrated the role of CASP8 in a HPV-negative OTSCC cell line. Finally, we identified a 38-gene minimal signature that predicts tumor recurrence using an ensemble machine-learning method. Taken together, this study links molecular signatures to various clinical and epidemiological factors in a homogeneous tumor population with a relatively high HPV prevalence.

  8. Identifying the key factors in increasing recycling and reducing residual household waste: a case study of the Flemish region of Belgium.

    Science.gov (United States)

    Gellynck, X; Jacobsen, R; Verhelst, P

    2011-10-01

    The competent waste authority in the Flemish region of Belgium created the 'Implementation plan household waste 2003-2007' and the 'Implementation plan sustainable management 2010-2015' to comply with EU regulation. It incorporates European and regional requirements and describes strategies, goals, actions and instruments for the collection and treatment of household waste. The central mandatory goal is to reduce and maintain the amount of residual household waste to 150 kg per capita per year between 2010-2015. In literature, a reasonable body of information has been published on the effectiveness and efficiency of a variety of policy instruments, but the information is complex, often contradictory and difficult to interpret. The objective of this paper is to identify, through the development of a binary logistic regression model, those variables of the waste collection scheme that help municipalities to reach the mandatory 150 kg goal. The model covers a number of variables for household characteristics, provision of recycling services, frequency of waste collection and charging for waste services. This paper, however, is not about waste prevention and reuse. The dataset originates from 2003. Four out of 12 variables in the model contributed significantly: income per capita, cost of residual waste collection, collection frequency and separate curbside collection of organic waste. Copyright © 2011 Elsevier Ltd. All rights reserved.

  9. Network analysis of patient flow in two UK acute care hospitals identifies key sub-networks for A&E performance.

    Science.gov (United States)

    Bean, Daniel M; Stringer, Clive; Beeknoo, Neeraj; Teo, James; Dobson, Richard J B

    2017-01-01

    The topology of the patient flow network in a hospital is complex, comprising hundreds of overlapping patient journeys, and is a determinant of operational efficiency. To understand the network architecture of patient flow, we performed a data-driven network analysis of patient flow through two acute hospital sites of King's College Hospital NHS Foundation Trust. Administration databases were queried for all intra-hospital patient transfers in an 18-month period and modelled as a dynamic weighted directed graph. A 'core' subnetwork containing only 13-17% of all edges channelled 83-90% of the patient flow, while an 'ephemeral' network constituted the remainder. Unsupervised cluster analysis and differential network analysis identified sub-networks where traffic is most associated with A&E performance. Increased flow to clinical decision units was associated with the best A&E performance in both sites. The component analysis also detected a weekend effect on patient transfers which was not associated with performance. We have performed the first data-driven hypothesis-free analysis of patient flow which can enhance understanding of whole healthcare systems. Such analysis can drive transformation in healthcare as it has in industries such as manufacturing.

  10. Identifying Keys to Success in Innovative Teaching: Student Engagement and Instructional Practices as Predictors of Student Learning in a Course Using a Team-Based Learning Approach

    Directory of Open Access Journals (Sweden)

    Rosa M. Alvarez-Bell

    2017-09-01

    Full Text Available When implementing innovative teaching techniques, instructors often seek to gauge the success of their methods. Proposing one approach to assessing classroom innovation, this study examines the ability of students’ ratings of engagement and instructional practices to predict their learning in a cooperative (team-based framework. After identifying the factor structures underlying measures of student engagement and instructional practices, these factors were used as predictors of self-reported student learning in a general chemistry course delivered using a team-based learning approach. Exploratory factor analyses showed a four-factor structure of engagement: teamwork involvement, investment in the learning process, feelings about team-based learning, level of academic challenge; and a three-factor structure of instructional practices: instructional guidance, fostering self-directed learning skills, and cognitive level. Multiple linear regression revealed that feelings about team-based learning and perceptions of instructional guidance had significant effects on learning, beyond other predictors, while controlling gender, GPA, class level, number of credit hours, whether students began college at their current institution, expected highest level of education, racial or ethnic identification, and parental level of education. These results yield insight into student perceptions about team-based learning, and how to measure learning in a team-based learning framework, with implications for how to evaluate innovative instructional methods.

  11. Paving the Way to Successful Implementation: Identifying Key Barriers to Use of Technology-Based Therapeutic Tools for Behavioral Health Care.

    Science.gov (United States)

    Ramsey, Alex; Lord, Sarah; Torrey, John; Marsch, Lisa; Lardiere, Michael

    2016-01-01

    This study aimed to identify barriers to use of technology for behavioral health care from the perspective of care decision makers at community behavioral health organizations. As part of a larger survey of technology readiness, 260 care decision makers completed an open-ended question about perceived barriers to use of technology. Using the Consolidated Framework for Implementation Research (CFIR), qualitative analyses yielded barrier themes related to characteristics of technology (e.g., cost and privacy), potential end users (e.g., technology literacy and attitudes about technology), organization structure and climate (e.g., budget and infrastructure), and factors external to organizations (e.g., broadband accessibility and reimbursement policies). Number of reported barriers was higher among respondents representing agencies with lower annual budgets and smaller client bases relative to higher budget, larger clientele organizations. Individual barriers were differentially associated with budget, size of client base, and geographic location. Results are discussed in light of implementation science frameworks and proactive strategies to address perceived obstacles to adoption and use of technology-based behavioral health tools.

  12. Large-scale recruitment limitation in Mediterranean pines : The role of Quercus ilex and forest successional advance as key regional drivers

    NARCIS (Netherlands)

    Carnicer, Jofre; Coll, Marta; Pons, Xavier; Ninyerola, Miquel; Vayreda, Jordi; Penuelas, Josep

    Aim Large-scale patterns of limitations in tree recruitment remain poorly described in the Mediterranean Basin, and this information is required to assess the impacts of global warming on forests. Here, we unveil the existence of opposite trends of recruitment limitation between the dominant genera

  13. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal – a case study from health science [version 2; referees: 1 approved, 2 approved with reservations

    Directory of Open Access Journals (Sweden)

    Heidi Holst Madsen

    2016-09-01

    Full Text Available Unique identifiers (UID are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI, incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of

  14. Identifying Key Actors in Heterogeneous Networks

    Science.gov (United States)

    2017-11-29

    Department of Defense (DOD) present social situations that are outside the scope and violate the assumptions of existing formal social science models. SNA by...assumptions of these existing social science models. SNA by its very construction focuses on dyadic relations and standard SNA metrics are focused only on...problematic for our purposes of determining relative valuations among vertices, but it is in contrast to the behavior of valuations like the Shapley value

  15. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  16. From invasion to latency: intracellular noise and cell motility as key controls of the competition between resource-limited cellular populations

    KAUST Repository

    Guerrero, Pilar

    2015-04-02

    © 2015, Springer-Verlag Berlin Heidelberg. In this paper we analyse stochastic models of the competition between two resource-limited cell populations which differ in their response to nutrient availability: the resident population exhibits a switch-like response behaviour while the invading population exhibits a bistable response. We investigate how noise in the intracellular regulatory pathways and cell motility influence the fate of the incumbent and invading populations. We focus initially on a spatially homogeneous system and study in detail the role of intracellular noise. We show that in such well-mixed systems, two distinct regimes exist: In the low (intracellular) noise limit, the invader has the ability to invade the resident population, whereas in the high noise regime competition between the two populations is found to be neutral and, in accordance with neutral evolution theory, invasion is a random event. Careful examination of the system dynamics leads us to conclude that (i) even if the invader is unable to invade, the distribution of survival times, PS(t), has a fat-tail behaviour (PS(t)∼t-1) which implies that small colonies of mutants can coexist with the resident population for arbitrarily long times, and (ii) the bistable structure of the invading population increases the stability of the latent population, thus increasing their long-term likelihood of survival, by decreasing the intensity of the noise at the population level. We also examine the effects of spatial inhomogeneity. In the low noise limit we find that cell motility is positively correlated with the aggressiveness of the invader as defined by the time the invader takes to invade the resident population: the faster the invasion, the more aggressive the invader.

  17. From invasion to latency: intracellular noise and cell motility as key controls of the competition between resource-limited cellular populations

    KAUST Repository

    Guerrero, Pilar; Byrne, Helen M.; Maini, Philip K.; Alarcó n, Tomá s

    2015-01-01

    © 2015, Springer-Verlag Berlin Heidelberg. In this paper we analyse stochastic models of the competition between two resource-limited cell populations which differ in their response to nutrient availability: the resident population exhibits a switch-like response behaviour while the invading population exhibits a bistable response. We investigate how noise in the intracellular regulatory pathways and cell motility influence the fate of the incumbent and invading populations. We focus initially on a spatially homogeneous system and study in detail the role of intracellular noise. We show that in such well-mixed systems, two distinct regimes exist: In the low (intracellular) noise limit, the invader has the ability to invade the resident population, whereas in the high noise regime competition between the two populations is found to be neutral and, in accordance with neutral evolution theory, invasion is a random event. Careful examination of the system dynamics leads us to conclude that (i) even if the invader is unable to invade, the distribution of survival times, PS(t), has a fat-tail behaviour (PS(t)∼t-1) which implies that small colonies of mutants can coexist with the resident population for arbitrarily long times, and (ii) the bistable structure of the invading population increases the stability of the latent population, thus increasing their long-term likelihood of survival, by decreasing the intensity of the noise at the population level. We also examine the effects of spatial inhomogeneity. In the low noise limit we find that cell motility is positively correlated with the aggressiveness of the invader as defined by the time the invader takes to invade the resident population: the faster the invasion, the more aggressive the invader.

  18. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  19. Limitations of variable number of tandem repeat typing identified through whole genome sequencing of Mycobacterium avium subsp. paratuberculosis on a national and herd level.

    Science.gov (United States)

    Ahlstrom, Christina; Barkema, Herman W; Stevenson, Karen; Zadoks, Ruth N; Biek, Roman; Kao, Rowland; Trewby, Hannah; Haupstein, Deb; Kelton, David F; Fecteau, Gilles; Labrecque, Olivia; Keefe, Greg P; McKenna, Shawn L B; De Buck, Jeroen

    2015-03-08

    identify closely and distantly related isolates, limiting the applicability of using this typing scheme to study the molecular epidemiology of MAP at a national and herd-level.

  20. Key issues

    International Nuclear Information System (INIS)

    Cook, N.G.W.

    1980-01-01

    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  1. The yeast three-hybrid system as an experimental platform to identify proteins interacting with small signaling molecules in plant cells: Potential and limitations

    Directory of Open Access Journals (Sweden)

    Stéphanie eCottier

    2011-12-01

    Full Text Available Chemical genetics is a powerful scientific strategy that utilizes small bioactive molecules as experimental tools to unravel biological processes. Bioactive compounds occurring in nature represent an enormous diversity of structures that can be used to dissect functions of biological systems. Once the bioactivity of a natural or synthetic compound has been critically evaluated the challenge remains to identify its molecular target and mode of action, which usually is a time consuming and labor-intensive process. To facilitate this task, we decided to implement the yeast three-hybrid (Y3H technology as a general experimental platform to scan the whole Arabidopsis proteome for targets of small signaling molecules. The Y3H technology is based on the yeast two-hybrid system and allows direct cloning of proteins that interact in vivo with a synthetic hybrid ligand, which comprises the biologically active molecule of interest covalently linked to methotrexate (Mtx. In yeast nucleus the hybrid ligand connects two fusion proteins: the Mtx part binding to dihydrofolate reductase fused to a DNA binding domain (encoded in the yeast strain, and the bioactive molecule part binding to its potential protein target fused to a DNA activating domain (encoded on a cDNA expression vector. During cDNA library screening, the formation of this ternary, transcriptional activator complex leads to reporter gene activation in yeast cells, and thereby allows selection of the putative targets of small bioactive molecules of interest. Here we present the strategy and experimental details for construction and application of a Y3H platform, including chemical synthesis of different hybrid ligands, construction of suitable cDNA libraries, the choice of yeast strains, and appropriate screening conditions. Based on the results obtained and the current literature we discussed the perspectives and limitations of the Y3H approach for identifying targets of small bioactive molecules.

  2. Calculation of the detection limits for radionuclides identified in gamma-ray spectra based on post-processing peak analysis results.

    Science.gov (United States)

    Korun, M; Vodenik, B; Zorko, B

    2018-03-01

    A new method for calculating the detection limits of gamma-ray spectrometry measurements is presented. The method is applicable for gamma-ray emitters, irrespective of the influences of the peaked background, the origin of the background and the overlap with other peaks. It offers the opportunity for multi-gamma-ray emitters to calculate the common detection limit, corresponding to more peaks. The detection limit is calculated by approximating the dependence of the uncertainty in the indication on its value with a second-order polynomial. In this approach the relation between the input quantities and the detection limit are described by an explicit expression and can be easy investigated. The detection limit is calculated from the data usually provided by the reports of peak-analyzing programs: the peak areas and their uncertainties. As a result, the need to use individual channel contents for calculating the detection limit is bypassed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Integrated Network Analysis Identifies Fight-Club Nodes as a Class of Hubs Encompassing Key Putative Switch Genes That Induce Major Transcriptome Reprogramming during Grapevine Development[W][OPEN

    Science.gov (United States)

    Palumbo, Maria Concetta; Zenoni, Sara; Fasoli, Marianna; Massonnet, Mélanie; Farina, Lorenzo; Castiglione, Filippo; Pezzotti, Mario; Paci, Paola

    2014-01-01

    We developed an approach that integrates different network-based methods to analyze the correlation network arising from large-scale gene expression data. By studying grapevine (Vitis vinifera) and tomato (Solanum lycopersicum) gene expression atlases and a grapevine berry transcriptomic data set during the transition from immature to mature growth, we identified a category named “fight-club hubs” characterized by a marked negative correlation with the expression profiles of neighboring genes in the network. A special subset named “switch genes” was identified, with the additional property of many significant negative correlations outside their own group in the network. Switch genes are involved in multiple processes and include transcription factors that may be considered master regulators of the previously reported transcriptome remodeling that marks the developmental shift from immature to mature growth. All switch genes, expressed at low levels in vegetative/green tissues, showed a significant increase in mature/woody organs, suggesting a potential regulatory role during the developmental transition. Finally, our analysis of tomato gene expression data sets showed that wild-type switch genes are downregulated in ripening-deficient mutants. The identification of known master regulators of tomato fruit maturation suggests our method is suitable for the detection of key regulators of organ development in different fleshy fruit crops. PMID:25490918

  4. Hierarchical super-structure identified by polarized light microscopy, electron microscopy and nanoindentation: Implications for the limits of biological control over the growth mode of abalone sea shells

    Directory of Open Access Journals (Sweden)

    Schneider Andreas S

    2012-09-01

    Full Text Available Abstract Background Mollusc shells are commonly investigated using high-resolution imaging techniques based on cryo-fixation. Less detailed information is available regarding the light-optical properties. Sea shells of Haliotis pulcherina were embedded for polishing in defined orientations in order to investigate the interface between prismatic calcite and nacreous aragonite by standard materialographic methods. A polished thin section of the interface was prepared with a defined thickness of 60 μm for quantitative birefringence analysis using polarized light and LC-PolScope microscopy. Scanning electron microscopy images were obtained for comparison. In order to study structural-mechanical relationships, nanoindentation experiments were performed. Results Incident light microscopy revealed a super-structure in semi-transparent regions of the polished cross-section under a defined angle. This super-structure is not visible in transmitted birefringence analysis due to the blurred polarization of small nacre platelets and numerous organic interfaces. The relative orientation and homogeneity of calcite prisms was directly identified, some of them with their optical axes exactly normal to the imaging plane. Co-oriented "prism colonies" were identified by polarized light analyses. The nacreous super-structure was also visualized by secondary electron imaging under defined angles. The domains of the super-structure were interpreted to consist of crystallographically aligned platelet stacks. Nanoindentation experiments showed that mechanical properties changed with the same periodicity as the domain size. Conclusions In this study, we have demonstrated that insights into the growth mechanisms of nacre can be obtained by conventional light-optical methods. For example, we observed super-structures formed by co-oriented nacre platelets as previously identified using X-ray Photo-electron Emission Microscopy (X-PEEM [Gilbert et al., Journal of the

  5. Genetic and pharmacological screens converge in identifying FLIP, BCL2 and IAP proteins as key regulators of sensitivity to the TRAIL-inducing anti-cancer agent ONC201/TIC10

    OpenAIRE

    Allen, Joshua E.; Prabhu, Varun V.; Talekar, Mala; van den Heuvel, AP; Lim, Bora; Dicker, David T.; Fritz, Jennifer L.; Beck, Adam; El-Deiry, Wafik S.

    2015-01-01

    ONC201/TIC10 is a small molecule inducer of the TRAIL gene under current investigation as a novel anticancer agent. In this study, we identify critical molecular determinants of ONC201 sensitivity offering potential utility as pharmacodynamic or predictive response markers. By screening a library of kinase siRNAs in combination with a subcytotoxic dose of ONC201, we identified several kinases that ablated tumor cell sensitivity, including the MAPK pathway inducer KSR1. Unexpectedly, KSR1 sile...

  6. Labonté Identifies Key Issues for Health Promoters in the New World Order; Comment on “Health Promotion in an Age of Normative Equity and Rampant Inequality”

    Directory of Open Access Journals (Sweden)

    Dennis Raphael

    2017-07-01

    Full Text Available For over 35 years Ronald Labonté has been critically analyzing the state of health promotion in Canada and the world. In 1981, he identified the shortcomings of the groundbreaking Lalonde Report by warning of the seductive appeal of so-called lifestyle approaches to health. Since then, he has left a trail of critical work identifying the barriers to — and opportunities for —health promotion work. More recently, he has shown how the rise of economic globalization and acceptance of neo-liberal ideology has come to threaten the health of those in both developed and developing nations. In his recent commentary, Labonté shows how the United Nations’ 2015 Sustainable Development Goals (SDGs can offer a new direction for health promoters in these difficult times.

  7. A Novel Application of a Hybrid Delphi-Analytic Hierarchy Process (AHP) Technique: Identifying Key Success Factors in the Strategic Alignment of Collaborative Heterarchical Transportation Networks for Supply Chains

    OpenAIRE

    Yasanur Kayikci; Volker Stix; Larry J. LeBlanc; Michael R. Bartolacci

    2014-01-01

    This research studies heterarchical collaboration in logistical transport. Specifically, it utilizes a hybrid Delphi-Analytic Hierarchy Process (AHP) approach to explore the relevant criteria for the formation and maintenance of a strategic alignment for heterarchical transport collaboration. The importance of this work is that it applies a novel hybrid approach for identifying criteria for success to a little-studied form of supply chain collaboration: heterarchical collaborative transport. ...

  8. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  9. Molecular dynamics simulations of Hsp40 J-domain mutants identifies disruption of the critical HPD-motif as the key factor for impaired curing in vivo of the yeast prion [URE3].

    Science.gov (United States)

    Xue, You-Lin; Wang, Hao; Riedy, Michael; Roberts, Brittany-Lee; Sun, Yuna; Song, Yong-Bo; Jones, Gary W; Masison, Daniel C; Song, Youtao

    2018-05-01

    Genetic screens using Saccharomyces cerevisiae have identified an array of Hsp40 (Ydj1p) J-domain mutants that are impaired in the ability to cure the yeast [URE3] prion through disrupting functional interactions with Hsp70. However, biochemical analysis of some of these Hsp40 J-domain mutants has so far failed to provide major insight into the specific functional changes in Hsp40-Hsp70 interactions. To explore the detailed structural and dynamic properties of the Hsp40 J-domain, 20 ns molecular dynamic simulations of 4 mutants (D9A, D36A, A30T, and F45S) and wild-type J-domain were performed, followed by Hsp70 docking simulations. Results demonstrated that although the Hsp70 interaction mechanism of the mutants may vary, the major structural change was targeted to the critical HPD motif of the J-domain. Our computational analysis fits well with previous yeast genetics studies regarding highlighting the importance of J-domain function in prion propagation. During the molecular dynamics simulations several important residues were identified and predicted to play an essential role in J-domain structure. Among these residues, Y26 and F45 were confirmed, using both in silico and in vivo methods, as being critical for Ydj1p function.

  10. Genetic and pharmacological screens converge in identifying FLIP, BCL2 and IAP proteins as key regulators of sensitivity to the TRAIL-inducing anti-cancer agent ONC201/TIC10

    Science.gov (United States)

    Allen, Joshua E.; Prabhu, Varun V.; Talekar, Mala; van den Heuvel, AP; Lim, Bora; Dicker, David T.; Fritz, Jennifer L.; Beck, Adam; El-Deiry, Wafik S.

    2015-01-01

    ONC201/TIC10 is a small molecule inducer of the TRAIL gene under current investigation as a novel anticancer agent. In this study, we identify critical molecular determinants of ONC201 sensitivity offering potential utility as pharmacodynamic or predictive response markers. By screening a library of kinase siRNAs in combination with a subcytotoxic dose of ONC201, we identified several kinases that ablated tumor cell sensitivity, including the MAPK pathway inducer KSR1. Unexpectedly, KSR1 silencing did not affect MAPK signaling in the presence or absence of ONC201, but instead reduced expression of the anti-apoptotic proteins FLIP, Mcl-1, Bcl-2, cIAP1, cIAP2, and survivin. In parallel to this work, we also conducted a synergy screen in which ONC201 was combined with approved small molecule anticancer drugs. In multiple cancer cell populations, ONC201 synergized with diverse drug classes including the multi-kinase inhibitor sorafenib. Notably, combining ONC201 and sorafenib led to synergistic induction of TRAIL and its receptor DR5 along with a potent induction of cell death. In a mouse xenograft model of hepatocellular carcinoma, we demonstrated that ONC201 and sorafenib cooperatively and safely triggered tumor regressions. Overall, our results established a set of determinants for ONC201 sensitivity that may predict therapeutic response, particularly in settings of sorafenib co-treatment to enhance anticancer responses. PMID:25681273

  11. Genetic and Pharmacological Screens Converge in Identifying FLIP, BCL2, and IAP Proteins as Key Regulators of Sensitivity to the TRAIL-Inducing Anticancer Agent ONC201/TIC10.

    Science.gov (United States)

    Allen, Joshua E; Prabhu, Varun V; Talekar, Mala; van den Heuvel, A Pieter J; Lim, Bora; Dicker, David T; Fritz, Jennifer L; Beck, Adam; El-Deiry, Wafik S

    2015-04-15

    ONC201/TIC10 is a small-molecule inducer of the TRAIL gene under current investigation as a novel anticancer agent. In this study, we identify critical molecular determinants of ONC201 sensitivity offering potential utility as pharmacodynamic or predictive response markers. By screening a library of kinase siRNAs in combination with a subcytotoxic dose of ONC201, we identified several kinases that ablated tumor cell sensitivity, including the MAPK pathway-inducer KSR1. Unexpectedly, KSR1 silencing did not affect MAPK signaling in the presence or absence of ONC201, but instead reduced expression of the antiapoptotic proteins FLIP, Mcl-1, Bcl-2, cIAP1, cIAP2, and survivin. In parallel to this work, we also conducted a synergy screen in which ONC201 was combined with approved small-molecule anticancer drugs. In multiple cancer cell populations, ONC201 synergized with diverse drug classes, including the multikinase inhibitor sorafenib. Notably, combining ONC201 and sorafenib led to synergistic induction of TRAIL and its receptor DR5 along with a potent induction of cell death. In a mouse xenograft model of hepatocellular carcinoma, we demonstrated that ONC201 and sorafenib cooperatively and safely triggered tumor regressions. Overall, our results established a set of determinants for ONC201 sensitivity that may predict therapeutic response, particularly in settings of sorafenib cotreatment to enhance anticancer responses. ©2015 American Association for Cancer Research.

  12. Imperfect DNA mirror repeats in the gag gene of HIV-1 (HXB2 identify key functional domains and coincide with protein structural elements in each of the mature proteins

    Directory of Open Access Journals (Sweden)

    Lang Dorothy M

    2007-10-01

    Full Text Available Abstract Background A DNA mirror repeat is a sequence segment delimited on the basis of its containing a center of symmetry on a single strand, e.g. 5'-GCATGGTACG-3'. It is most frequently described in association with a functionally significant site in a genomic sequence, and its occurrence is regarded as noteworthy, if not unusual. However, imperfect mirror repeats (IMRs having ≥ 50% symmetry are common in the protein coding DNA of monomeric proteins and their distribution has been found to coincide with protein structural elements – helices, β sheets and turns. In this study, the distribution of IMRs is evaluated in a polyprotein – to determine whether IMRs may be related to the position or order of protein cleavage or other hierarchal aspects of protein function. The gag gene of HIV-1 [GenBank:K03455] was selected for the study because its protein motifs and structural components are well documented. Results There is a highly specific relationship between IMRs and structural and functional aspects of the Gag polyprotein. The five longest IMRs in the polyprotein translate a key functional segment in each of the five cleavage products. Throughout the protein, IMRs coincide with functionally significant segments of the protein. A detailed annotation of the protein, which combines structural, functional and IMR data illustrates these associations. There is a significant statistical correlation between the ends of IMRs and the ends of PSEs in each of the mature proteins. Weakly symmetric IMRs (≥ 33% are related to cleavage positions and processes. Conclusion The frequency and distribution of IMRs in HIV-1 Gag indicates that DNA symmetry is a fundamental property of protein coding DNA and that different levels of symmetry are associated with different functional aspects of the gene and its protein. The interaction between IMRs and protein structure and function is precise and interwoven over the entire length of the polyprotein. The

  13. Intra-family role expectations and reluctance to change identified as key barriers to expanding vegetable consumption patterns during interactive family-based program for Appalachian low-income food preparers.

    Science.gov (United States)

    Brown, J Lynne; Wenrich, Tionni R

    2012-08-01

    Few Americans eat sufficient vegetables, especially the protective deep orange and dark green vegetables. To address this, a community-based wellness program to broaden vegetables served at evening meals targeting Appalachian food preparers and their families was tested in a randomized, controlled intervention. Food preparers (n=50) were predominately married (88%), white (98%), and female (94%), with several children living at home. Experimental food preparers (n=25) attended the program sessions and controls (n=25) were mailed relevant handouts and recipes. At program sessions, participants received nutrition information, hands-on cooking instruction, and prepared recipes to take home for family evaluation. As qualitative assessment, 10 couples from each treatment group (n=20 couples) were randomly selected for baseline and immediate post-intervention interviews to explore impact on the food preparer's family. These in-depth interviews with the food preparer and their adult partner were tape-recorded and transcribed verbatim. Two researchers conducted thematic analysis using constant comparison. Family flexibility about food choices was assessed using roles, rules, and power concepts from Family Systems Theory. Interviews at baseline revealed dinner vegetable variety was very limited because food preparers served only what everyone liked (a role expectation) and deferred to male partner and children's narrow vegetable preferences (power). Control couples reported no change in vegetable dinner variety post-intervention. Most experimental couples reported in-home tasting and evaluation was worthwhile and somewhat broadened vegetables served at dinners. But the role expectation of serving only what everyone liked and the practice of honoring powerful family members' vegetable preferences remained major barriers to change. Copyright © 2012 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.

  14. A key to the Mexican and Central America Genera of Anthonomini (Curculionidae, Curculioninae)

    Science.gov (United States)

    Hernández, Macotulio Soto; Jones, Robert W.; Castillo, Pedro Reyes

    2013-01-01

    Abstract Presently the only keys available for identification of genera of Anthonomini are limited to those of the United States of America and Canada. A dichotomous key is presented to identify all genera of Mexican and Central American Anthonomini. Previous keys do not include the genera Achia, Botanebius, Loncophorus, Loncophorellus and Melexerus. A brief synopsis is given for each genus and photographs of representative species are included. PMID:23717181

  15. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  16. Identifying key processes in the hydrochemistry of a basin through ...

    Indian Academy of Sciences (India)

    through the combined use of factor and regression models. Sandow Mark ... Department of Earth Science, University of Ghana, Legon, Accra, Ghana. ∗ ... influence groundwater hydrochemistry and deter- mine its .... 1600 mm) due to the differences in climatic zones. .... dropped so that it does not cloud the results of the.

  17. Identifying Key Factors Relevant for Base Camp Siting

    Science.gov (United States)

    2017-12-01

    centers. 3.2.6.3 Religious and historical sites Respecting sacred sites helps build rapport with the host nation. 3.2.6.4 Local infrastructure...churches, mosques, national libraries, hospitals, cemeteries, historical ruins, religious sites, cultural areas, and other protected sites...controlled and protected wells. • Electricity: town engineer • Academic: government and religious leaders • Trash: private business (local

  18. Family planning dialogue: Identifying the key determinants of young ...

    African Journals Online (AJOL)

    ANBR

    planning information and services for sexually active young women – in ... towards ensuring the equitable distribution of resources and accessible basic services. 99 ...... denial and disengagement affecting intergenerational dialogue in many ...

  19. Identifying depression among adolescents using three key questions

    DEFF Research Database (Denmark)

    Haugen, Wenche; Haavet, Ole Rikard; Sirpal, Manjit Kaur

    2016-01-01

    Depression rammer mange voksne mennesker. Dette studie, som er omtalt i BMJ, viser, at et spørgeskema med blot tre spørgsmål ret præcist kan identificere voksne med depression. Undersøgelsen viser også, at de samme spørgsmål med fordel kan stilles verbalt ved diagnosticering af depression hos unge...... mennesker. Studiet ledsages af en redaktionel kommentar, der understreger betydningen af diagnosticering af depression hos mennesker. Mange unge har kun sjældent kontakt med deres praktiserende læge. Derfor kan mange gå i lang tid med depression, uden at det bliver opdaget og behandlet. De tre enkle...... spørgsmål, der kredser om interesse (eller mangel på interesse) for daglige aktiviteter og følelser som nedtrykthed eller håbløshed, kan være et godt pejlemærke for evt. depression hos unge, som ellers let kan blive overset....

  20. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  1. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  2. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  3. In silico serotyping of E. coli from short read data identifies limited novel O-loci but extensive diversity of O:H serotype combinations within and between pathogenic lineages.

    Science.gov (United States)

    Ingle, Danielle J; Valcanis, Mary; Kuzevski, Alex; Tauschek, Marija; Inouye, Michael; Stinear, Tim; Levine, Myron M; Robins-Browne, Roy M; Holt, Kathryn E

    2016-07-01

    The lipopolysaccharide (O) and flagellar (H) surface antigens of Escherichia coli are targets for serotyping that have traditionally been used to identify pathogenic lineages. These surface antigens are important for the survival of E. coli within mammalian hosts. However, traditional serotyping has several limitations, and public health reference laboratories are increasingly moving towards whole genome sequencing (WGS) to characterize bacterial isolates. Here we present a method to rapidly and accurately serotype E. coli isolates from raw, short read WGS data. Our approach bypasses the need for de novo genome assembly by directly screening WGS reads against a curated database of alleles linked to known and novel E. coli O-groups and H-types (the EcOH database) using the software package srst2. We validated the approach by comparing in silico results for 197 enteropathogenic E. coli isolates with those obtained by serological phenotyping in an independent laboratory. We then demonstrated the utility of our method to characterize isolates in public health and clinical settings, and to explore the genetic diversity of >1500 E. coli genomes from multiple sources. Importantly, we showed that transfer of O- and H-antigen loci between E. coli chromosomal backbones is common, with little evidence of constraints by host or pathotype, suggesting that E. coli ' strain space' may be virtually unlimited, even within specific pathotypes. Our findings show that serotyping is most useful when used in combination with strain genotyping to characterize microevolution events within an inferred population structure.

  4. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  5. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  6. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  7. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  8. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  9. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  10. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  11. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  12. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  13. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  14. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  15. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  16. The New START Treaty: Central Limits and Key Provisions

    Science.gov (United States)

    2014-08-27

    article-by-article analysis can be found at http://www.state.gov/t/ avc /newstart/c44126.htm. 2 For a brief summary of the original START Treaty, as...2014, http://www.state.gov/t/ avc /rls/224236.htm . The fact sheet does not display warhead subtotals for each delivery system; it only includes an...of Strategic Offensive Forces, Fact Sheet, Washington, DC, April 1, 2014, http://www.state.gov/t/ avc /rls/228652.htm. The New START Treaty: Central

  17. Secret Key Agreement: Fundamental Limits and Practical Challenges

    KAUST Repository

    Rezki, Zouheir; Zorgui, Marwen; Alomair, Basel; Alouini, Mohamed-Slim

    2017-01-01

    that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising

  18. Key Facts about Tularemia

    Science.gov (United States)

    ... Submit What's this? Submit Button Key Facts About Tularemia Recommend on Facebook Tweet Share Compartir This fact ... and Prevention (CDC) Tularemia Web site . What is Tularemia? Tularemia is a potentially serious illness that occurs ...

  19. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  20. The Key Lake project

    International Nuclear Information System (INIS)

    Glattes, G.

    1985-01-01

    Aspects of project financing for the share of the Canadian subsidiary of Uranerzbergbau-GmbH, Bonn, in the uranium mining and milling facility at Key Lake, Saskatchewan, by a Canadian bank syndicate. (orig.) [de

  1. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  2. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  3. Eight Key Facets of Small Business Management.

    Science.gov (United States)

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  4. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  5. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  6. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  7. Detector dead-time effects and paralyzability in high-speed quantum key distribution

    International Nuclear Information System (INIS)

    Rogers, Daniel J; Bienfang, Joshua C; Nakassis, Anastase; Xu Hai; Clark, Charles W

    2007-01-01

    Recent advances in quantum key distribution (QKD) have given rise to systems that operate at transmission periods significantly shorter than the dead times of their component single-photon detectors. As systems continue to increase in transmission rate, security concerns associated with detector dead times can limit the production rate of sifted bits. We present a model of high-speed QKD in this limit that identifies an optimum transmission rate for a system with given link loss and detector response characteristics

  8. Current limiters

    Energy Technology Data Exchange (ETDEWEB)

    Loescher, D.H. [Sandia National Labs., Albuquerque, NM (United States). Systems Surety Assessment Dept.; Noren, K. [Univ. of Idaho, Moscow, ID (United States). Dept. of Electrical Engineering

    1996-09-01

    The current that flows between the electrical test equipment and the nuclear explosive must be limited to safe levels during electrical tests conducted on nuclear explosives at the DOE Pantex facility. The safest way to limit the current is to use batteries that can provide only acceptably low current into a short circuit; unfortunately this is not always possible. When it is not possible, current limiters, along with other design features, are used to limit the current. Three types of current limiters, the fuse blower, the resistor limiter, and the MOSFET-pass-transistor limiters, are used extensively in Pantex test equipment. Detailed failure mode and effects analyses were conducted on these limiters. Two other types of limiters were also analyzed. It was found that there is no best type of limiter that should be used in all applications. The fuse blower has advantages when many circuits must be monitored, a low insertion voltage drop is important, and size and weight must be kept low. However, this limiter has many failure modes that can lead to the loss of over current protection. The resistor limiter is simple and inexpensive, but is normally usable only on circuits for which the nominal current is less than a few tens of milliamperes. The MOSFET limiter can be used on high current circuits, but it has a number of single point failure modes that can lead to a loss of protective action. Because bad component placement or poor wire routing can defeat any limiter, placement and routing must be designed carefully and documented thoroughly.

  9. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  10. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  11. Turn key contracts

    International Nuclear Information System (INIS)

    Feretic, D.

    1975-01-01

    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW) [de

  12. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  13. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  14. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  15. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  16. Quench limits

    International Nuclear Information System (INIS)

    Sapinski, M.

    2012-01-01

    With thirteen beam induced quenches and numerous Machine Development tests, the current knowledge of LHC magnets quench limits still contains a lot of unknowns. Various approaches to determine the quench limits are reviewed and results of the tests are presented. Attempt to reconstruct a coherent picture emerging from these results is taken. The available methods of computation of the quench levels are presented together with dedicated particle shower simulations which are necessary to understand the tests. The future experiments, needed to reach better understanding of quench limits as well as limits for the machine operation are investigated. The possible strategies to set BLM (Beam Loss Monitor) thresholds are discussed. (author)

  17. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  18. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  19. Dose limits

    International Nuclear Information System (INIS)

    Fitoussi, L.

    1987-12-01

    The dose limit is defined to be the level of harmfulness which must not be exceeded, so that an activity can be exercised in a regular manner without running a risk unacceptable to man and the society. The paper examines the effects of radiation categorised into stochastic and non-stochastic. Dose limits for workers and the public are discussed

  20. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  1. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  2. Inverse Limits

    CERN Document Server

    Ingram, WT

    2012-01-01

    Inverse limits provide a powerful tool for constructing complicated spaces from simple ones. They also turn the study of a dynamical system consisting of a space and a self-map into a study of a (likely more complicated) space and a self-homeomorphism. In four chapters along with an appendix containing background material the authors develop the theory of inverse limits. The book begins with an introduction through inverse limits on [0,1] before moving to a general treatment of the subject. Special topics in continuum theory complete the book. Although it is not a book on dynamics, the influen

  3. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  4. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  5. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  6. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  7. Key figures. Year 2006

    International Nuclear Information System (INIS)

    2006-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2006. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  8. Key figures. Year 2005

    International Nuclear Information System (INIS)

    2005-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2005. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  9. Soil fauna: key to new carbon models

    OpenAIRE

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; Jiménez, Juan José

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined ...

  10. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    Science.gov (United States)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  11. Key challenges to expanding renewable energy

    International Nuclear Information System (INIS)

    Stram, Bruce N.

    2016-01-01

    The key advantage of renewables is that they are free of direct pollution and carbon emissions. Given concern over global warming caused by carbon emissions, there are substantial policy efforts to increase renewable penetrations. The purpose of this paper is to outline and evaluate the challenges presented by increasing penetrations of renewable electricity generation. These generation sources primarily include solar and wind which are growing rapidly and are new enough to the grid that the impact of high penetrations is not fully understood. The intrinsic nature of solar and wind power is very likely to present greater system challenges than “conventional” sources. Within limits, those challenges can be overcome, but at a cost. Later sections of the paper will draw on a variety of sources to identify a range of such costs, at least as they are foreseen by researchers helping prepare ambitious plans for grids to obtain high shares (30–50%) of their megawatt hours from primarily solar and wind generation. Energy poverty issues are outlined and related to renewable costs issues. - Highlights: •Integration of intermittent renewables with existing power grids. •Renewable ramping and over production issues. •Renewable caused system costs. •Energy poverty circumstances and consequences.

  12. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  13. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  14. Smooth Phase Interpolated Keying

    Science.gov (United States)

    Borah, Deva K.

    2007-01-01

    Smooth phase interpolated keying (SPIK) is an improved method of computing smooth phase-modulation waveforms for radio communication systems that convey digital information. SPIK is applicable to a variety of phase-shift-keying (PSK) modulation schemes, including quaternary PSK (QPSK), octonary PSK (8PSK), and 16PSK. In comparison with a related prior method, SPIK offers advantages of better performance and less complexity of implementation. In a PSK scheme, the underlying information waveform that one seeks to convey consists of discrete rectangular steps, but the spectral width of such a waveform is excessive for practical radio communication. Therefore, the problem is to smooth the step phase waveform in such a manner as to maintain power and bandwidth efficiency without incurring an unacceptably large error rate and without introducing undesired variations in the amplitude of the affected radio signal. Although the ideal constellation of PSK phasor points does not cause amplitude variations, filtering of the modulation waveform (in which, typically, a rectangular pulse is converted to a square-root raised cosine pulse) causes amplitude fluctuations. If a power-efficient nonlinear amplifier is used in the radio communication system, the fluctuating-amplitude signal can undergo significant spectral regrowth, thus compromising the bandwidth efficiency of the system. In the related prior method, one seeks to solve the problem in a procedure that comprises two major steps: phase-value generation and phase interpolation. SPIK follows the two-step approach of the related prior method, but the details of the steps are different. In the phase-value-generation step, the phase values of symbols in the PSK constellation are determined by a phase function that is said to be maximally smooth and that is chosen to minimize the spectral spread of the modulated signal. In this step, the constellation is divided into two groups by assigning, to information symbols, phase values

  15. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  16. SNP interaction pattern identifier (SIPI)

    DEFF Research Database (Denmark)

    Lin, Hui Yi; Chen, Dung Tsa; Huang, Po Yu

    2017-01-01

    Motivation: Testing SNP-SNP interactions is considered as a key for overcoming bottlenecks of genetic association studies. However, related statistical methods for testing SNP-SNP interactions are underdeveloped. Results: We propose the SNP Interaction Pattern Identifier (SIPI), which tests 45...

  17. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  18. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  19. Creativity Management Key Elements

    Directory of Open Access Journals (Sweden)

    Rosa María Fuchs Ángeles

    2015-09-01

    Full Text Available Organizations are constantly looking towards innovation. In order to reach it they must foment creativity. This paper analyzes a series of elements considered in the organizational creativity management and proposes a model with the indispensable factors that organizations should consider to reach it. These elements are: culture and organizational environment, strategy, structure, communication, relation with customers, human resources (recruiting, training, job design, compensation, promotion, and performance evaluation, long term orientation and the organizational life cycle. Having the analysis of those elements as a basis, the indispensable pillars on management creativity are identified. The proposed model is based on 5 pillars: the alignment between strategic, culture and organizational structure, called by the authors 'Holy Trinity'; intern publicity; customer’s voice; recognition and a look towards future. Finally, the case of an innovative Peruvian enterprise is presented from the model’s perspective and the study conclusions.

  20. URBAN POLITICS: KEY APPROACHES

    Directory of Open Access Journals (Sweden)

    Ledyaeva Ol'ga Mikhaylovna

    2012-10-01

    Full Text Available Several approaches that underlie urban politics are discussed in the paper. They include neo-liberalism, political economy discourse, elitist/pluralist debates, and postmodernism. The neoliberal approach focuses on the limited role of the state and individual responsibility. The legal framework protects both the rights and responsibilities of individuals and regulates the operation of the market. It is the market that fosters individual choices and provides goods and services by virtue of the processes which are flexible, efficient and transparent. The political economy approaches (regulation theory, public choice theory, neo-Marxism explain urban politics via the analysis of national and international economic processes and changes in contemporary capitalism. Changes in national and international economies determine what solutions are possible. The discourse has been influenced by the debate on globalization of capital and labour markets. Modern elitism and neopluralism are represented by theories of "growth machines" and "urban regimes". The former focuses on bargaining alliances between political and business leaders in order to manage the urban system and to promote its growth. The latter develops neopluralist explanations of power within local communities with an emphasis on the fragmented nature of the government where local authorities lack comprehensive governing powers. Postmodernism views the city as the site of the crisis of late capitalism which leads to segregation of neighbourhoods onto prosperous areas and ghettoes. In contrast to the modern city, the postmodern city is not defined by its industrial base; rather, it is determined by its consumerist environment of malls and museums, characterized by revivalist architecture. At the same time, the suburban shopping mall and a motorway network make nonsense of the idea of the city as a unique and well-defined space. These and other approaches encompass a wide spectrum of possibilities

  1. KeyPathwayMiner 4.0

    DEFF Research Database (Denmark)

    Alcaraz, Nicolas; Pauling, Josch; Batra, Richa

    2014-01-01

    release of KeyPathwayMiner (version 4.0) that is not limited to analyses of single omics data sets, e.g. gene expression, but is able to directly combine several different omics data types. Version 4.0 can further integrate existing knowledge by adding a search bias towards sub-networks that contain...... (avoid) genes provided in a positive (negative) list. Finally the new release now also provides a set of novel visualization features and has been implemented as an app for the standard bioinformatics network analysis tool: Cytoscape. CONCLUSION: With KeyPathwayMiner 4.0, we publish a Cytoscape app...

  2. Limiting factor analysis of high availability nuclear plants (boiling water reactors). Final report

    International Nuclear Information System (INIS)

    Frederick, L.G.; Brady, R.M.; Shor, S.W.W.; McCusker, J.T.; Alden, W.M.; Kovacs, S.

    1979-08-01

    The pertinent results are presented of a 16-month study conducted for Electric Power Research Institute by General Electric Company, Bechtel Power Corporation, and Philadelphia Electric Company. The study centered around the Peach Bottom 2 Atomic Power Station, but also included limited study of operations at 20 additional operating boiling water reactors. The purpose of the study was to identify and evaluate key factors limiting plant availability, and to identify potential improvements for eliminating or alleviating those limitations. The key limiting factors were found to be refueling activities; activities related to the reactor fuel; reactor scrams; activities related to 20 operating systems or major components; delays due to radiation, turbid water during refueling operations, facilities/working conditions, and dirt/foreign material; and general maintenance/repair of valves and piping. Existing programs to reduce the effect on plant unavailability are identified, and suggestions for further action are made

  3. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  4. Introduction strategies raise key questions.

    Science.gov (United States)

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  5. Limitations in global information on species occurrences

    Directory of Open Access Journals (Sweden)

    Carsten Meyer

    2016-07-01

    Full Text Available Detailed information on species distributions is crucial for answering central questions in biogeography, ecology, evolutionary biology and conservation. Millions of species occurrence records have been mobilized via international data-sharing networks, but inherent biases, gaps and uncertainties hamper broader application. In my PhD thesis, I presented the first comprehensive analyses of global patterns and drivers of these limitations across different taxonomic groups and spatial scales. Integrating 300 million occurrence records for terrestrial vertebrates and plants with comprehensive taxonomic databases, expert range maps and regional checklists, I demonstrated extensive taxonomic, geographical and temporal biases, gaps and uncertainties. I identified key socio-economic drivers of data bias across different taxonomic groups and spatial scales. The results of my dissertation provide an empirical baseline for effectively accounting for data limitations in distribution models, as well as for prioritizing and monitoring efforts to collate additional occurrence information.

  6. Habitat Restoration as a Key Conservation Lever for Woodland Caribou: A review of restoration programs and key learnings from Alberta

    Directory of Open Access Journals (Sweden)

    Paula Bentham

    2015-12-01

    Full Text Available The Recovery Strategy for the Woodland Caribou (Rangifer tarandus caribou, Boreal Population in Canada (EC, 2012, identifies coordinated actions to reclaim woodland caribou habitat as a key step to meeting current and future caribou population objectives. Actions include restoring industrial landscape features such as roads, seismic lines, pipelines, cut-lines, and cleared areas in an effort to reduce landscape fragmentation and the changes in caribou population dynamics associated with changing predator-prey dynamics in highly fragmented landscapes. Reliance on habitat restoration as a recovery action within the federal recovery strategy is high, considering all Alberta populations have less than 65% undisturbed habitat, which is identified in the recovery strategy as a threshold providing a 60% chance that a local population will be self-sustaining. Alberta’s Provincial Woodland Caribou Policy also identifies habitat restoration as a critical component of long-term caribou habitat management. We review and discuss the history of caribou habitat restoration programs in Alberta and present outcomes and highlights of a caribou habitat restoration workshop attended by over 80 representatives from oil and gas, forestry, provincial and federal regulators, academia and consulting who have worked on restoration programs. Restoration initiatives in Alberta began in 2001 and have generally focused on construction methods, revegetation treatments, access control programs, and limiting plant species favourable to alternate prey. Specific treatments include tree planting initiatives, coarse woody debris management along linear features, and efforts for multi-company and multi-stakeholder coordinated habitat restoration on caribou range. Lessons learned from these programs have been incorporated into large scale habitat restoration projects near Grande Prairie, Cold Lake, and Fort McMurray. A key outcome of our review is the opportunity to provide a

  7. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  8. Thermodynamic limit for coherence-limited solar power conversion

    Science.gov (United States)

    Mashaal, Heylal; Gordon, Jeffrey M.

    2014-09-01

    The spatial coherence of solar beam radiation is a key constraint in solar rectenna conversion. Here, we present a derivation of the thermodynamic limit for coherence-limited solar power conversion - an expansion of Landsberg's elegant basic bound, originally limited to incoherent converters at maximum flux concentration. First, we generalize Landsberg's work to arbitrary concentration and angular confinement. Then we derive how the values are further lowered for coherence-limited converters. The results do not depend on a particular conversion strategy. As such, they pertain to systems that span geometric to physical optics, as well as classical to quantum physics. Our findings indicate promising potential for solar rectenna conversion.

  9. Marketing with limited budget

    OpenAIRE

    Smirnova, Daria

    2017-01-01

    The purpose of this research-based thesis was to get an idea how managers of two small resembling hotels of a specific region deal with marketing process with a limited budget. In addition, the aim of the thesis was to examine if hotel managers who were interviewed perceive marketing only in the way of ‘promotion’ rather than marketing research, marketing mix and marketing environment theories. It was also found out if hotel managers of those hotels consider marketing as a key to successful h...

  10. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  11. Aedes albopictus and Its Environmental Limits in Europe.

    Science.gov (United States)

    Cunze, Sarah; Kochmann, Judith; Koch, Lisa K; Klimpel, Sven

    2016-01-01

    The Asian tiger mosquito Aedes albopictus, native to South East Asia, is listed as one of the worst invasive vector species worldwide. In Europe the species is currently restricted to Southern Europe, but due to the ongoing climate change, Ae. albopictus is expected to expand its potential range further northwards. In addition to modelling the habitat suitability for Ae. albopictus under current and future climatic conditions in Europe by means of the maximum entropy approach, we here focused on the drivers of the habitat suitability prediction. We explored the most limiting factors for Aedes albopictus in Europe under current and future climatic conditions, a method which has been neglected in species distribution modelling so far. Ae. albopictus is one of the best-studied mosquito species, which allowed us to evaluate the applied Maxent approach for most limiting factor mapping. We identified three key limiting factors for Ae. albopictus in Europe under current climatic conditions: winter temperature in Eastern Europe, summer temperature in Southern Europe. Model findings were in good accordance with commonly known establishment thresholds in Europe based on climate chamber experiments and derived from the geographical distribution of the species. Under future climatic conditions low winter temperature were modelled to remain the most limiting factor in Eastern Europe, whereas in Central Europe annual mean temperature and summer temperatures were modelled to be replaced by summer precipitation, respectively, as most limiting factors. Changes in the climatic conditions in terms of the identified key limiting factors will be of great relevance regarding the invasive potential of the Ae. albopictus. Thus, our results may help to understand the key drivers of the suggested range expansion under climate change and may help to improve monitoring programmes. The applied approach of investigating limiting factors has proven to yield valuable results and may also provide

  12. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  13. 104 Key words: Moringa, marinade, bacteria, fungi, catfish, smoke ...

    African Journals Online (AJOL)

    Osondu

    2013-01-16

    Jan 16, 2013 ... spoilage thus limiting economic loss and possible heath risk to consumers. Key words: Moringa, marinade, bacteria, fungi, catfish, smoke-dried. Introduction ..... were reared because E. coli is an indicator organism and its ...

  14. Small Private Key PKS on an Embedded Microprocessor

    OpenAIRE

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor...

  15. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  16. Selecting of key safety parameters in reactor nuclear safety supervision

    International Nuclear Information System (INIS)

    He Fan; Yu Hong

    2014-01-01

    The safety parameters indicate the operational states and safety of research reactor are the basis of nuclear safety supervision institution to carry out effective supervision to nuclear facilities. In this paper, the selecting of key safety parameters presented by the research reactor operating unit to National Nuclear Safety Administration that can express the research reactor operational states and safety when operational occurrence or nuclear accident happens, and the interrelationship between them are discussed. Analysis shows that, the key parameters to nuclear safety supervision of research reactor including design limits, operational limits and conditions, safety system settings, safety limits, acceptable limits and emergency action level etc. (authors)

  17. Projecting biodiversity and wood production in future forest landscapes: 15 key modeling considerations.

    Science.gov (United States)

    Felton, Adam; Ranius, Thomas; Roberge, Jean-Michel; Öhman, Karin; Lämås, Tomas; Hynynen, Jari; Juutinen, Artti; Mönkkönen, Mikko; Nilsson, Urban; Lundmark, Tomas; Nordin, Annika

    2017-07-15

    A variety of modeling approaches can be used to project the future development of forest systems, and help to assess the implications of different management alternatives for biodiversity and ecosystem services. This diversity of approaches does however present both an opportunity and an obstacle for those trying to decide which modeling technique to apply, and interpreting the management implications of model output. Furthermore, the breadth of issues relevant to addressing key questions related to forest ecology, conservation biology, silviculture, economics, requires insights stemming from a number of distinct scientific disciplines. As forest planners, conservation ecologists, ecological economists and silviculturalists, experienced with modeling trade-offs and synergies between biodiversity and wood biomass production, we identified fifteen key considerations relevant to assessing the pros and cons of alternative modeling approaches. Specifically we identified key considerations linked to study question formulation, modeling forest dynamics, forest processes, study landscapes, spatial and temporal aspects, and the key response metrics - biodiversity and wood biomass production, as well as dealing with trade-offs and uncertainties. We also provide illustrative examples from the modeling literature stemming from the key considerations assessed. We use our findings to reiterate the need for explicitly addressing and conveying the limitations and uncertainties of any modeling approach taken, and the need for interdisciplinary research efforts when addressing the conservation of biodiversity and sustainable use of environmental resources. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Key Supplier Relationship Management: The Case of Croatian Medium-Sized and Large Manufacturing Companies

    Directory of Open Access Journals (Sweden)

    Dario Miočević

    2011-06-01

    Full Text Available The key supplier relationship management represents a vital organizational process. Companies should pay attention not only to managing customer relationships but also to managing relationships with suppliers in order to perform well. They should identify the extent to which a certain supplier adds value through the procurement process. In this line of reasoning, both theory and practice make a distinction between strategic (key and non-strategic (transactional suppliers. By employing the segmentation of the supply market, companies balance their supplier portfolio and are capable of identifying the key suppliers. They can also develop specific programs and initiatives that are aimed at preserving these relationships. In the empirical part of the paper, a survey was conducted on a sample of 123 medium-sized and large Croatian manufacturing companies. The structural model involving the relationship between the key supplier relationship management and value-oriented purchasing was tested. The results indicate that there is a statistically direct, positive and significant relationship between these two constructs. Likewise, the results stress that a theoretical conceptualization and operationalization of the key supplier relationship management construct is both valid and justified. Finally, the theoretical and practical implications and limitations of this study are offered.

  19. Identifying Topics in Microblogs Using Wikipedia.

    Directory of Open Access Journals (Sweden)

    Ahmet Yıldırım

    Full Text Available Twitter is an extremely high volume platform for user generated contributions regarding any topic. The wealth of content created at real-time in massive quantities calls for automated approaches to identify the topics of the contributions. Such topics can be utilized in numerous ways, such as public opinion mining, marketing, entertainment, and disaster management. Towards this end, approaches to relate single or partial posts to knowledge base items have been proposed. However, in microblogging systems like Twitter, topics emerge from the culmination of a large number of contributions. Therefore, identifying topics based on collections of posts, where individual posts contribute to some aspect of the greater topic is necessary. Models, such as Latent Dirichlet Allocation (LDA, propose algorithms for relating collections of posts to sets of keywords that represent underlying topics. In these approaches, figuring out what the specific topic(s the keyword sets represent remains as a separate task. Another issue in topic detection is the scope, which is often limited to specific domain, such as health. This work proposes an approach for identifying domain-independent specific topics related to sets of posts. In this approach, individual posts are processed and then aggregated to identify key tokens, which are then mapped to specific topics. Wikipedia article titles are selected to represent topics, since they are up to date, user-generated, sophisticated articles that span topics of human interest. This paper describes the proposed approach, a prototype implementation, and a case study based on data gathered during the heavily contributed periods corresponding to the four US election debates in 2012. The manually evaluated results (0.96 precision and other observations from the study are discussed in detail.

  20. Identifying Topics in Microblogs Using Wikipedia.

    Science.gov (United States)

    Yıldırım, Ahmet; Üsküdarlı, Suzan; Özgür, Arzucan

    2016-01-01

    Twitter is an extremely high volume platform for user generated contributions regarding any topic. The wealth of content created at real-time in massive quantities calls for automated approaches to identify the topics of the contributions. Such topics can be utilized in numerous ways, such as public opinion mining, marketing, entertainment, and disaster management. Towards this end, approaches to relate single or partial posts to knowledge base items have been proposed. However, in microblogging systems like Twitter, topics emerge from the culmination of a large number of contributions. Therefore, identifying topics based on collections of posts, where individual posts contribute to some aspect of the greater topic is necessary. Models, such as Latent Dirichlet Allocation (LDA), propose algorithms for relating collections of posts to sets of keywords that represent underlying topics. In these approaches, figuring out what the specific topic(s) the keyword sets represent remains as a separate task. Another issue in topic detection is the scope, which is often limited to specific domain, such as health. This work proposes an approach for identifying domain-independent specific topics related to sets of posts. In this approach, individual posts are processed and then aggregated to identify key tokens, which are then mapped to specific topics. Wikipedia article titles are selected to represent topics, since they are up to date, user-generated, sophisticated articles that span topics of human interest. This paper describes the proposed approach, a prototype implementation, and a case study based on data gathered during the heavily contributed periods corresponding to the four US election debates in 2012. The manually evaluated results (0.96 precision) and other observations from the study are discussed in detail.

  1. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  2. Local and regional energy companies offering energy services: Key activities and implications for the business model

    International Nuclear Information System (INIS)

    Kindström, Daniel; Ottosson, Mikael

    2016-01-01

    Highlights: • Many companies providing energy services are experiencing difficulties. • This research identifies key activities for the provision of energy services. • Findings are aggregated to the business-model level providing managerial insights. • This research identifies two different business model innovation paths. • Energy companies may need to renew parts of, or the entire, business model. - Abstract: Energy services play a key role in increasing energy efficiency in the industry. The key actors in these services are the local and regional energy companies that are increasingly implementing energy services as part of their market offering and developing service portfolios. Although expectations for energy services have been high, progress has so far been limited, and many companies offering energy services, including energy companies, are experiencing difficulties in implementing energy services and providing them to the market. Overall, this research examines what is needed for local and regional energy companies to successfully implement energy services (and consequently provide them to the market). In doing this, a two-stage process is used: first, we identify key activities for the successful implementation of energy services, and second, we aggregate the findings to the business model level. This research demonstrates that to succeed in implementing energy services, an energy company may need to renew parts or all of its existing product-based business model, formulate a new business model, or develop coexisting multiple business models. By discussing two distinct business model innovation processes, this research demonstrates that there can be different paths to success.

  3. Limitations on blanket performance

    International Nuclear Information System (INIS)

    Malang, S.

    1999-01-01

    The limitations on the performance of breeding blankets in a fusion power plant are evaluated. The breeding blankets will be key components of a plant and their limitations with regard to power density, thermal efficiency and lifetime could determine to a large degree the attractiveness of a power plant. The performance of two rather well known blanket concepts under development in the frame of the European Blanket Programme is assessed and their limitations are compared with more advanced (and more speculative) concepts. An important issue is the question of which material (structure, breeder, multiplier, coatings) will limit the performance and what improvement would be possible with a 'better' structural material. This evaluation is based on the premise that the performance of the power plant will be limited by the blankets (including first wall) and not by other components, e.g. divertors, or the plasma itself. However, the justness of this premise remains to be seen. It is shown that the different blanket concepts cover a large range of allowable power densities and achievable thermal efficiencies, and it is concluded that there is a high incentive to go for better performance in spite of possibly higher blanket cost. However, such high performance blankets are usually based on materials and technologies not yet developed and there is a rather high risk that the development could fail. Therefore, it is explained that a part of the development effort should be devoted to concepts where the materials and technologies are more or less in hand in order to ensure that blankets for a DEMO reactor can be developed and tested in a given time frame. (orig.)

  4. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  5. Key economic sectors and services

    NARCIS (Netherlands)

    Arent, Douglas J.; Tol, Richard S.J.; Faust, Eberhard; Hella, Joseph P.; Kumar, Surender; Strzepek, Kenneth M.; Tóth, Ferenc L.; Yan, Denghua; Abdulla, Amjad; Kheshgi, Haroon; Xu, He; Ngeh, Julius

    2015-01-01

    Introduction and Context This chapter discusses the implications of climate change on key economic sectors and services, for example, economic activity. Other chapters discuss impacts from a physical, chemical, biological, or social perspective. Economic impacts cannot be isolated; therefore, there

  6. Key Injury and Violence Data

    Science.gov (United States)

    ... Traumatic Brain Injury Violence Prevention Key Injury and Violence Data Recommend on Facebook Tweet Share Compartir Injuries ... of death among persons 1-44. Injury- and violence-related deaths are only part of the problem ...

  7. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  8. The Limits of Exercise Physiology

    DEFF Research Database (Denmark)

    Gabriel, Brendan M; Zierath, Juleen R

    2017-01-01

    Many of the established positive health benefits of exercise have been documented by historical discoveries in the field of exercise physiology. These investigations often assess limits: the limits of performance, or the limits of exercise-induced health benefits. Indeed, several key findings have...... been informed by studying highly trained athletes, in addition to healthy or unhealthy people. Recent progress has been made in regard to skeletal muscle metabolism and personalized exercise regimes. In this perspective, we review some of the historical milestones of exercise physiology, discuss how...

  9. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  10. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  11. LBTool: A stochastic toolkit for leave-based key updates

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    Quantitative techniques have been successfully employed in verification of information and communication systems. However, the use of such techniques are still rare in the area of security. In this paper, we present a toolkit that implements transient analysis on a key update method for wireless...... sensor networks. The analysis aims to find out the probability of a network key being compromised at a specific time point, which result in fluctuations over time for a specific key update method called Leave-based key update. For such a problem, the use of current tools is limited in many ways...

  12. Key Research Issues in Clostridium difficile

    Directory of Open Access Journals (Sweden)

    George Zhanel

    2005-01-01

    Full Text Available Clostridium difficile is an emerging pathogen that causes C difficile-associated diarrhea, an important nosocomial infection. Control of this infection remains a challenge, and much needs to be determined about the antimicrobial resistance of the organism, antibiotic stewardship, contamination of the patient environment, and various host factors that determine susceptibility or resistance to infection. A national symposium focusing on C difficile infections, the Clostridium difficile Symposium on Emerging Issues and Research, was hosted on November 23, 2004, by the Department of Medical Microbiology and Infectious Diseases at the University of Manitoba, Winnipeg, Manitoba, in partnership with the Canadian Institutes of Health Research. This symposium, which aimed to summarize key research issues regarding C difficile infections in Canada, had the following objectives: to provide a forum for learning and discussion about C difficile and its impact on the health of Canadians; to identify the key research issues that should be addressed; and to explore potential research funding opportunities and collaboration. The present report summarizes key research issues identified for C difficile infections in Canada by addressing four major themes: diagnosis and surveillance, infection prevention and control, antibiotic stewardship, and clinical management.

  13. IMPlementation of A Relatives' Toolkit (IMPART study): an iterative case study to identify key factors impacting on the implementation of a web-based supported self-management intervention for relatives of people with psychosis or bipolar experiences in a National Health Service: a study protocol.

    Science.gov (United States)

    Lobban, Fiona; Appleton, Victoria; Appelbe, Duncan; Barraclough, Johanna; Bowland, Julie; Fisher, Naomi R; Foster, Sheena; Johnson, Sonia; Lewis, Elizabeth; Mateus, Céu; Mezes, Barbara; Murray, Elizabeth; O'Hanlon, Puffin; Pinfold, Vanessa; Rycroft-Malone, Jo; Siddle, Ron; Smith, Jo; Sutton, Chris J; Walker, Andrew; Jones, Steven H

    2017-12-28

    Web-based interventions to support people to manage long-term health conditions are available and effective but rarely used in clinical services. The aim of this study is to identify critical factors impacting on the implementation of an online supported self-management intervention for relatives of people with recent onset psychosis or bipolar disorder into routine clinical care and to use this information to inform an implementation plan to facilitate widespread use and inform wider implementation of digital health interventions. A multiple case study design within six early intervention in psychosis (EIP) services in England, will be used to test and refine theory-driven hypotheses about factors impacting on implementation of the Relatives' Education And Coping Toolkit (REACT). Qualitative data including behavioural observation, document analysis, and in-depth interviews collected in the first two EIP services (wave 1) and analysed using framework analysis, combined with quantitative data describing levels of use by staff and relatives and impact on relatives' distress and wellbeing, will be used to identify factors impacting on implementation. Consultation via stakeholder workshops with staff and relatives and co-facilitated by relatives in the research team will inform development of an implementation plan to address these factors, which will be evaluated and refined in the four subsequent EIP services in waves 2 and 3. Transferability of the implementation plan to non-participating services will be explored. Observation of implementation in a real world clinical setting, across carefully sampled services, in real time provides a unique opportunity to understand factors impacting on implementation likely to be generalizable to other web-based interventions, as well as informing further development of implementation theories. However, there are inherent challenges in investigating implementation without influencing the process under observation. We outline our

  14. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  15. Characteristics of evolving models of care for arthritis: A key informant study

    Directory of Open Access Journals (Sweden)

    Veinot Paula

    2008-07-01

    Full Text Available Abstract Background The burden of arthritis is increasing in the face of diminishing health human resources to deliver care. In response, innovative models of care delivery are developing to facilitate access to quality care. Most models have developed in response to local needs with limited evaluation. The primary objective of this study is to a examine the range of models of care that deliver specialist services using a medical/surgical specialist and at least one other health care provider and b document the strengths and challenges of the identified models. A secondary objective is to identify key elements of best practice models of care for arthritis. Methods Semi-structured interviews were conducted with a sample of key informants with expertise in arthritis from jurisdictions with primarily publicly-funded health care systems. Qualitative data were analyzed using a constant comparative approach to identify common types of models of care, strengths and challenges of models, and key components of arthritis care. Results Seventy-four key informants were interviewed from six countries. Five main types of models of care emerged. 1 Specialized arthritis programs deliver comprehensive, multidisciplinary team care for arthritis. Two models were identified using health care providers (e.g. nurses or physiotherapists in expanded clinical roles: 2 triage of patients with musculoskeletal conditions to the appropriate services including specialists; and 3 ongoing management in collaboration with a specialist. Two models promoting rural access were 4 rural consultation support and 5 telemedicine. Key informants described important components of models of care including knowledgeable health professionals and patients. Conclusion A range of models of care for arthritis have been developed. This classification can be used as a framework for discussing care delivery. Areas for development include integration of care across the continuum, including primary

  16. Partitioned key-value store with atomic memory operations

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2017-02-07

    A partitioned key-value store is provided that supports atomic memory operations. A server performs a memory operation in a partitioned key-value store by receiving a request from an application for at least one atomic memory operation, the atomic memory operation comprising a memory address identifier; and, in response to the atomic memory operation, performing one or more of (i) reading a client-side memory location identified by the memory address identifier and storing one or more key-value pairs from the client-side memory location in a local key-value store of the server; and (ii) obtaining one or more key-value pairs from the local key-value store of the server and writing the obtained one or more key-value pairs into the client-side memory location identified by the memory address identifier. The server can perform functions obtained from a client-side memory location and return a result to the client using one or more of the atomic memory operations.

  17. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  18. Key Lake spill. Final report

    International Nuclear Information System (INIS)

    1984-03-01

    On January 5, 1984 contaminated water overflowed a storage reservoir at the Key Lake uranium mill onto the ice on a neighboring lake, into a muskeg area and onto a road. Outflow continued for two days, partially undercutting a retaining dyke. This report concludes the spill was the result of poor operation by the Key Lake Mining Corp.. The environmental impact will be minimal after cleanup. Improvements can be made in the regulatory process, and it is necessary to prepare for possible future mishaps

  19. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  20. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  1. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  2. Structural and Psycho-Social Limits to Climate Change Adaptation in the Great Barrier Reef Region.

    Science.gov (United States)

    Evans, Louisa S; Hicks, Christina C; Adger, W Neil; Barnett, Jon; Perry, Allison L; Fidelman, Pedro; Tobin, Renae

    2016-01-01

    Adaptation, as a strategy to respond to climate change, has limits: there are conditions under which adaptation strategies fail to alleviate impacts from climate change. Research has primarily focused on identifying absolute bio-physical limits. This paper contributes empirical insight to an emerging literature on the social limits to adaptation. Such limits arise from the ways in which societies perceive, experience and respond to climate change. Using qualitative data from multi-stakeholder workshops and key-informant interviews with representatives of the fisheries and tourism sectors of the Great Barrier Reef region, we identify psycho-social and structural limits associated with key adaptation strategies, and examine how these are perceived as more or less absolute across levels of organisation. We find that actors experience social limits to adaptation when: i) the effort of pursuing a strategy exceeds the benefits of desired adaptation outcomes; ii) the particular strategy does not address the actual source of vulnerability, and; iii) the benefits derived from adaptation are undermined by external factors. We also find that social limits are not necessarily more absolute at higher levels of organisation: respondents perceived considerable opportunities to address some psycho-social limits at the national-international interface, while they considered some social limits at the local and regional levels to be effectively absolute.

  3. Structural and Psycho-Social Limits to Climate Change Adaptation in the Great Barrier Reef Region.

    Directory of Open Access Journals (Sweden)

    Louisa S Evans

    Full Text Available Adaptation, as a strategy to respond to climate change, has limits: there are conditions under which adaptation strategies fail to alleviate impacts from climate change. Research has primarily focused on identifying absolute bio-physical limits. This paper contributes empirical insight to an emerging literature on the social limits to adaptation. Such limits arise from the ways in which societies perceive, experience and respond to climate change. Using qualitative data from multi-stakeholder workshops and key-informant interviews with representatives of the fisheries and tourism sectors of the Great Barrier Reef region, we identify psycho-social and structural limits associated with key adaptation strategies, and examine how these are perceived as more or less absolute across levels of organisation. We find that actors experience social limits to adaptation when: i the effort of pursuing a strategy exceeds the benefits of desired adaptation outcomes; ii the particular strategy does not address the actual source of vulnerability, and; iii the benefits derived from adaptation are undermined by external factors. We also find that social limits are not necessarily more absolute at higher levels of organisation: respondents perceived considerable opportunities to address some psycho-social limits at the national-international interface, while they considered some social limits at the local and regional levels to be effectively absolute.

  4. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so that dif...... that different structural problems can be reproduced successfully....

  5. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  6. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  7. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  8. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  9. Water dynamics clue to key residues in protein folding

    International Nuclear Information System (INIS)

    Gao, Meng; Zhu, Huaiqiu; Yao, Xin-Qiu; She, Zhen-Su

    2010-01-01

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  10. Thoughts on identifiers

    CERN Multimedia

    CERN. Geneva

    2005-01-01

    As business processes and information transactions have become an inextricably intertwined with the Web, the importance of assignment, registration, discovery, and maintenance of identifiers has increased. In spite of this, integrated frameworks for managing identifiers have been slow to emerge. Instead, identification systems arise (quite naturally) from immediate business needs without consideration for how they fit into larger information architectures. In addition, many legacy identifier systems further complicate the landscape, making it difficult for content managers to select and deploy identifier systems that meet both the business case and long term information management objectives. This presentation will outline a model for evaluating identifier applications and the functional requirements of the systems necessary to support them. The model is based on a layered analysis of the characteristics of identifier systems, including: * Functional characteristics * Technology * Policy * Business * Social T...

  11. Identifiability in stochastic models

    CERN Document Server

    1992-01-01

    The problem of identifiability is basic to all statistical methods and data analysis, occurring in such diverse areas as Reliability Theory, Survival Analysis, and Econometrics, where stochastic modeling is widely used. Mathematics dealing with identifiability per se is closely related to the so-called branch of ""characterization problems"" in Probability Theory. This book brings together relevant material on identifiability as it occurs in these diverse fields.

  12. An examination of the flame spread limits in a dual fuel engine

    Energy Technology Data Exchange (ETDEWEB)

    Badr, O.; Karim, G.A.; Liu, B. [Calgary Univ., Dept. of Mechanical Engineering, Calgary, AB (Canada)

    1999-10-01

    The performance of a gas-fuelled diesel engine (dual fuel) is examined at light load and an effective threshold limit to the combustion of the gaseous fuel through bulk flame spread is identified. The relationship of such a limit to some of the key operating parameters is then discussed. A comparison between the measured values of the limit with those corresponding to the lower flammability limits of the gaseous fuel when evaluated under the prevailing cylinder conditions during pilot diesel fuel ignition showed similar trends. It is suggested that such a similarity may form a basis for estimating the lean operation limits for duel a fuel combustion in engines. A simple approach for estimating the limiting equivalence ratio for the apparent bulk flame spread limit is described for a methane-fuelled dual fuel engine. (Author)

  13. Ebola Virus Infection Modelling and Identifiability Problems

    Directory of Open Access Journals (Sweden)

    Van-Kinh eNguyen

    2015-04-01

    Full Text Available The recent outbreaks of Ebola virus (EBOV infections have underlined the impact of the virus as a major threat for human health. Due to the high biosafety classification of EBOV (level 4, basic research is very limited. Therefore, the development of new avenues of thinking to advance quantitative comprehension of the virus and its interaction with the host cells is urgently neededto tackle this lethal disease. Mathematical modelling of the EBOV dynamics can be instrumental to interpret Ebola infection kinetics on quantitative grounds. To the best of our knowledge, a mathematical modelling approach to unravel the interaction between EBOV and the host cells isstill missing. In this paper, a mathematical model based on differential equations is used to represent the basic interactions between EBOV and wild-type Vero cells in vitro. Parameter sets that represent infectivity of pathogens are estimated for EBOV infection and compared with influenza virus infection kinetics. The average infecting time of wild-type Vero cells in EBOV is slower than in influenza infection. Simulation results suggest that the slow infecting time of EBOV could be compensated by its efficient replication. This study reveals several identifiability problems and what kind of experiments are necessary to advance the quantification of EBOV infection. A first mathematical approach of EBOV dynamics and the estimation of standard parametersin viral infections kinetics is the key contribution of this work, paving the way for future modelling work on EBOV infection.

  14. Geotechnics - the key to ground water protection

    DEFF Research Database (Denmark)

    Baumann, Jens; Foged, Niels; Jørgensen, Peter

    2000-01-01

    During the past 5 to 10 years research into ground water protection has proved that fractures in clay till may increase the hydraulic conductivity and herby the vulnerability of the ground water considerably. However, research has not identified a non-expensive and efficient method to map...... the fracture conditions of the various clay tills. Tests performed at the Danish Geotechnical Institute with large undisturbed columns of clay till show that there is a relation between the strength of the clay till and the hydraulic conductivity. Geotechnical methods may therefore be the key to determine...

  15. Key figures for the regional- and distribution grid

    International Nuclear Information System (INIS)

    Vikingstad, S.

    1996-02-01

    In Norway, improving the efficiency of the hydroelectric grid operation is a stated goal of the Energy Act. Several studies have identified potential profits of such improvement. This publication focuses on costs and improvement potentials. Publication of key figures may stimulate grid owners, boards and administrations to improve the operating efficiency of their grids. The publication shows key figures for the regional- and distribution grid and is based on accounting data for 1994. The key figures are divided into: (1) Cost structure: The key figures express the relative contributions of each cost component to the total income of the grid, (2) Costs and physical quantities: The key figures show the cost of delivering the transport services, (3) Physical quantities: The key figures describe the working conditions of the energy utility. It appears that the cost structure of the sector varies considerably. The same is true of the cost related to the delivery of grid services. 30 figs., 6 tabs

  16. Measuring social inclusion--a key outcome in global mental health.

    Science.gov (United States)

    Baumgartner, Joy Noel; Burns, Jonathan K

    2014-04-01

    Social inclusion is increasingly recognized as a key outcome for evaluating global mental health programmes and interventions. Whereas social inclusion as an outcome is not a new concept in the field of mental health, its measurement has been hampered by varying definitions, concepts and instruments. To move the field forward, this paper reviews the currently available instruments which measure social inclusion and are reported in the literature, realizing that no single measure will be appropriate for all studies or contexts. A systematic literature search of English language peer-reviewed articles published through February 2013 was undertaken to identify scales specifically developed to measure social inclusion or social/community integration among populations with mental disorders. Five instruments were identified through the search criteria. The scales are discussed in terms of their theoretical underpinnings, domains and/or key items and their potential for use in global settings. Whereas numerous reviewed abstracts discussed mental health and social inclusion or social integration, very few were concerned with direct measurement of the construct. All identified scales were developed in high-income countries with limited attention paid to how the scale could be adapted for cross-cultural use. Social inclusion is increasingly highlighted as a key outcome for global mental health policies and programmes, yet its measurement is underdeveloped. There is need for a global cross-cultural measure that has been developed and tested in diverse settings. However, until that need is met, some of the scales presented here may be amenable to adaptation.

  17. Key papers in prostate cancer.

    Science.gov (United States)

    Rodney, Simon; Shah, Taimur Tariq; Patel, Hitendra R H; Arya, Manit

    2014-11-01

    Prostate cancer is the most common cancer and second leading cause of death in men. The evidence base for the diagnosis and treatment of prostate cancer is continually changing. We aim to review and discuss past and contemporary papers on these topics to provoke debate and highlight key dilemmas faced by the urological community. We review key papers on prostate-specific antigen screening, radical prostatectomy versus surveillance strategies, targeted therapies, timing of radiotherapy and alternative anti-androgen therapeutics. Previously, the majority of patients, irrespective of risk, underwent radical open surgical procedures associated with considerable morbidity and mortality. Evidence is emerging that not all prostate cancers are alike and that low-grade disease can be safely managed by surveillance strategies and localized treatment to the prostate. The question remains as to how to accurately stage the disease and ultimately choose which treatment pathway to follow.

  18. Key Topics in Sports Medicine

    OpenAIRE

    2006-01-01

    Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1) Sports injuries, rehabilitation and injury prevention, 2) Exercise physiology, fitness testing and training, 3) Drugs in sport, 4) Exercise and health promotion, 5) Sport and exercise for special and clinical populations, 6) The ps...

  19. Key issues for passive safety

    International Nuclear Information System (INIS)

    Hayns, M.R.

    1996-01-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ''review paper'' as such and only record the highlights. (author)

  20. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  1. Key issues for passive safety

    Energy Technology Data Exchange (ETDEWEB)

    Hayns, M R [AEA Technology, Harwell, Didcot (United Kingdom). European Institutions; Hicken, E F [Forschungszentrum Juelich GmbH (Germany)

    1996-12-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ``review paper`` as such and only record the highlights. (author).

  2. Low carbon development. Key issues

    Energy Technology Data Exchange (ETDEWEB)

    Urban, Frauke; Nordensvaard, Johan (eds.)

    2013-03-07

    This comprehensive textbook addresses the interface between international development and climate change in a carbon constrained world. It discusses the key conceptual, empirical and policy-related issues of low carbon development and takes an international and interdisciplinary approach to the subject by drawing on insights from across the natural sciences and social sciences whilst embedding the discussion in a global context. The first part explores the concept of low carbon development and explains the need for low carbon development in a carbon constrained world. The book then discusses the key issues of socio-economic, political and technological nature for low carbon development, exploring topics such as the political economy, social justice, financing and carbon markets, and technologies and innovation for low carbon development. This is followed by key issues for low carbon development in policy and practice, which is presented based on cross-cutting issues such as low carbon energy, forestry, agriculture and transportation. Afterwards, practical case studies are discussed from low carbon development in low income countries in Africa, middle income countries in Asia and Latin America and high income countries in Europe and North America.

  3. Detector decoy quantum key distribution

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2009-01-01

    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is especially suited to those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement-based quantum key distribution scheme with an untrusted source without the need for a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single-photon security proof to its physical, full optical implementation. We show that in this scenario, the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.

  4. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  5. SARS: Key factors in crisis management.

    Science.gov (United States)

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  6. A Recommended Set of Key Arctic Indicators

    Science.gov (United States)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  7. Key attributes of expert NRL referees.

    Science.gov (United States)

    Morris, Gavin; O'Connor, Donna

    2017-05-01

    Experiential knowledge of elite National Rugby League (NRL) referees was investigated to determine the key attributes contributing to expert officiating performance. Fourteen current first-grade NRL referees were asked to identify the key attributes they believed contributed to their expert refereeing performance. The modified Delphi method involved a 3-round process of an initial semi-structured interview followed by 2 questionnaires to reach consensus of opinion. The data revealed 25 attributes that were rated as most important that underpin expert NRL refereeing performance. Results illustrate the significance of the cognitive category, with the top 6 ranked attributes all cognitive skills. Of these, the referees ranked decision-making accuracy as the most important attribute, followed by reading the game, communication, game understanding, game management and knowledge of the rules. Player rapport, positioning and teamwork were the top ranked game skill attributes underpinning performance excellence. Expert referees also highlighted a number of psychological attributes (e.g., concentration, composure and mental toughness) that were significant to performance. There were only 2 physiological attributes (fitness, aerobic endurance) that were identified as significant to elite officiating performance. In summary, expert consensus was attained which successfully provided a hierarchy of the most significant attributes of expert NRL refereeing performance.

  8. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.; Ferreira, Luciana C.; Sequeira, Ana M.M.; Meekan, Mark G.; Duarte, Carlos M.; Bailey, Helen; Bailleul, Fred; Bowen, W. Don; Caley, M. Julian; Costa, Daniel P.; Eguí luz, Victor M.; Fossette, Sabrina; Friedlaender, Ari S.; Gales, Nick; Gleiss, Adrian C.; Gunn, John; Harcourt, Rob; Hazen, Elliott L.; Heithaus, Michael R.; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L.; Lowe, Christopher G.; Madsen, Peter T.; Marsh, Helene; Phillips, Richard A.; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A.; Simpfendorfer, Colin A.; Sims, David W.; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N.; Wikelski, Martin; Womble, Jamie N.; Thums, Michele

    2016-01-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  9. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.

    2016-03-12

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  10. Identifying Strategic Scientific Opportunities

    Science.gov (United States)

    As NCI's central scientific strategy office, CRS collaborates with the institute's divisions, offices, and centers to identify research opportunities to advance NCI's vision for the future of cancer research.

  11. Anti-schistosomal intervention targets identified by lifecycle transcriptomic analyses.

    Directory of Open Access Journals (Sweden)

    Jennifer M Fitzpatrick

    2009-11-01

    Full Text Available Novel methods to identify anthelmintic drug and vaccine targets are urgently needed, especially for those parasite species currently being controlled by singular, often limited strategies. A clearer understanding of the transcriptional components underpinning helminth development will enable identification of exploitable molecules essential for successful parasite/host interactions. Towards this end, we present a combinatorial, bioinformatics-led approach, employing both statistical and network analyses of transcriptomic data, for identifying new immunoprophylactic and therapeutic lead targets to combat schistosomiasis.Utilisation of a Schistosoma mansoni oligonucleotide DNA microarray consisting of 37,632 elements enabled gene expression profiling from 15 distinct parasite lifecycle stages, spanning three unique ecological niches. Statistical approaches of data analysis revealed differential expression of 973 gene products that minimally describe the three major characteristics of schistosome development: asexual processes within intermediate snail hosts, sexual maturation within definitive vertebrate hosts and sexual dimorphism amongst adult male and female worms. Furthermore, we identified a group of 338 constitutively expressed schistosome gene products (including 41 transcripts sharing no sequence similarity outside the Platyhelminthes, which are likely to be essential for schistosome lifecycle progression. While highly informative, statistics-led bioinformatics mining of the transcriptional dataset has limitations, including the inability to identify higher order relationships between differentially expressed transcripts and lifecycle stages. Network analysis, coupled to Gene Ontology enrichment investigations, facilitated a re-examination of the dataset and identified 387 clusters (containing 12,132 gene products displaying novel examples of developmentally regulated classes (including 294 schistosomula and/or adult transcripts with no

  12. Legislation on violence against women: overview of key components.

    Science.gov (United States)

    Ortiz-Barreda, Gaby; Vives-Cases, Carmen

    2013-01-01

    This study aimed to determine if legislation on violence against women (VAW) worldwide contains key components recommended by the Pan American Health Organization (PAHO) and the United Nations (UN) to help strengthen VAW prevention and provide better integrated victim protection, support, and care. A systematic search for VAW legislation using international legal databases and other electronic sources plus data from previous research identified 124 countries/territories with some type of VAW legislation. Full legal texts were found for legislation from 104 countries/territories. Those available in English, Portuguese, and Spanish were downloaded and compiled and the selection criteria applied (use of any of the common terms related to VAW, including intimate partner violence (IPV), and reference to at least two of six sectors (education, health, judicial system, mass media, police, and social services) with regard to VAW interventions (protection, support, and care). A final sample from 80 countries/territories was selected and analyzed for the presence of key components recommended by PAHO and the UN (reference to the term "violence against women" in the title; definitions of different types of VAW; identification of women as beneficiaries; and promotion of (reference to) the participation of multiple sectors in VAW interventions). Few countries/territories specifically identified women as the beneficiaries of their VAW legislation, including those that labeled their legislation "domestic violence" law ( n = 51), of which only two explicitly mentioned women as complainants/survivors. Only 28 countries/territories defined the main forms of VAW (economic, physical, psychological, and sexual) in their VAW legislation. Most highlighted the role of the judicial system, followed by that of social services and the police. Only 28 mentioned the health sector. Despite considerable efforts worldwide to strengthen VAW legislation, most VAW laws do not incorporate the key

  13. Identifying Breast Cancer Oncogenes

    Science.gov (United States)

    2011-10-01

    cells we observed that it promoted transformation of HMLE cells, suggesting a tumor suppressive role of Merlin in breast cancer (Figure 4B). A...08-1-0767 TITLE: Identifying Breast Cancer Oncogenes PRINCIPAL INVESTIGATOR: Yashaswi Shrestha...Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 W81XWH-08-1-0767 Identifying Breast Cancer Oncogenes Yashaswi Shrestha Dana-Farber

  14. Structural identifiability of cyclic graphical models of biological networks with latent variables.

    Science.gov (United States)

    Wang, Yulin; Lu, Na; Miao, Hongyu

    2016-06-13

    Graphical models have long been used to describe biological networks for a variety of important tasks such as the determination of key biological parameters, and the structure of graphical model ultimately determines whether such unknown parameters can be unambiguously obtained from experimental observations (i.e., the identifiability problem). Limited by resources or technical capacities, complex biological networks are usually partially observed in experiment, which thus introduces latent variables into the corresponding graphical models. A number of previous studies have tackled the parameter identifiability problem for graphical models such as linear structural equation models (SEMs) with or without latent variables. However, the limited resolution and efficiency of existing approaches necessarily calls for further development of novel structural identifiability analysis algorithms. An efficient structural identifiability analysis algorithm is developed in this study for a broad range of network structures. The proposed method adopts the Wright's path coefficient method to generate identifiability equations in forms of symbolic polynomials, and then converts these symbolic equations to binary matrices (called identifiability matrix). Several matrix operations are introduced for identifiability matrix reduction with system equivalency maintained. Based on the reduced identifiability matrices, the structural identifiability of each parameter is determined. A number of benchmark models are used to verify the validity of the proposed approach. Finally, the network module for influenza A virus replication is employed as a real example to illustrate the application of the proposed approach in practice. The proposed approach can deal with cyclic networks with latent variables. The key advantage is that it intentionally avoids symbolic computation and is thus highly efficient. Also, this method is capable of determining the identifiability of each single parameter and

  15. Integration of transcriptome and whole genomic resequencing data to identify key genes affecting swine fat deposition.

    Directory of Open Access Journals (Sweden)

    Kai Xing

    Full Text Available Fat deposition is highly correlated with the growth, meat quality, reproductive performance and immunity of pigs. Fatty acid synthesis takes place mainly in the adipose tissue of pigs; therefore, in this study, a high-throughput massively parallel sequencing approach was used to generate adipose tissue transcriptomes from two groups of Songliao black pigs that had opposite backfat thickness phenotypes. The total number of paired-end reads produced for each sample was in the range of 39.29-49.36 millions. Approximately 188 genes were differentially expressed in adipose tissue and were enriched for metabolic processes, such as fatty acid biosynthesis, lipid synthesis, metabolism of fatty acids, etinol, caffeine and arachidonic acid and immunity. Additionally, many genetic variations were detected between the two groups through pooled whole-genome resequencing. Integration of transcriptome and whole-genome resequencing data revealed important genomic variations among the differentially expressed genes for fat deposition, for example, the lipogenic genes. Further studies are required to investigate the roles of candidate genes in fat deposition to improve pig breeding programs.

  16. Identifying Key Drivers of the Impact of an HIV Cure Intervention in Sub-Saharan Africa

    DEFF Research Database (Denmark)

    Phillips, Andrew N; Cambiano, Valentina; Revill, Paul

    2016-01-01

    BACKGROUND: It is unknown what properties would be required to make an intervention in low income countries that can eradicate or control human immunodeficiency virus (HIV) without antiretroviral therapy (ART) cost-effective. METHODS: We used a model of HIV and ART to investigate the effect...... of introducing an ART-free viral suppression intervention in 2022 using Zimbabwe as an example country. We assumed that the intervention (cost: $500) would be accessible for 90% of the population, be given to those receiving effective ART, have sufficient efficacy to allow ART interruption in 95%, with a rate...... of viral rebound of 5% per year in the first 3 months, and a 50% decline in rate with each successive year. RESULTS: An ART-free viral suppression intervention with these properties would result in >0.53 million disability-adjusted-life-years averted over 2022-2042, with a reduction in HIV program costs...

  17. Identifying Key Events in AOPs for Embryonic Disruption using Computational Toxicology (European Teratology Society - AOP symp.)

    Science.gov (United States)

    Addressing safety aspects of drugs and environmental chemicals relies extensively on animal testing; however, the quantity of chemicals needing assessment and challenges of species extrapolation require alternative approaches to traditional animal studies. Newer in vitro and in s...

  18. Security as the Key Factor in Contemporary Tourism: Specificities Identified Through the Analysis of Responders’ Attitudes

    OpenAIRE

    Penić, Josipa; Kurečić, Petar

    2017-01-01

    The paper represents a product of mentor- graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. Following the latest threatening events and having in mind those yet to come, we can conclude that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive fa...

  19. Quantification of cytosolic interactions identifies Ede1 oligomers as key organizers of endocytosis.

    Science.gov (United States)

    Boeke, Dominik; Trautmann, Susanne; Meurer, Matthias; Wachsmuth, Malte; Godlee, Camilla; Knop, Michael; Kaksonen, Marko

    2014-11-03

    Clathrin-mediated endocytosis is a highly conserved intracellular trafficking pathway that depends on dynamic protein-protein interactions between up to 60 different proteins. However, little is known about the spatio-temporal regulation of these interactions. Using fluorescence (cross)-correlation spectroscopy in yeast, we tested 41 previously reported interactions in vivo and found 16 to exist in the cytoplasm. These detected cytoplasmic interactions included the self-interaction of Ede1, homolog of mammalian Eps15. Ede1 is the crucial scaffold for the organization of the early stages of endocytosis. We show that oligomerization of Ede1 through its central coiled coil domain is necessary for its localization to the endocytic site and we link the oligomerization of Ede1 to its function in locally concentrating endocytic adaptors and organizing the endocytic machinery. Our study sheds light on the importance of the regulation of protein-protein interactions in the cytoplasm for the assembly of the endocytic machinery in vivo. © 2014 The Authors. Published under the terms of the CC BY 4.0 license.

  20. Key identifiers and spelling conventions in MXit-lingo as found in conversations with Dr Math

    CSIR Research Space (South Africa)

    Butgereit, L

    2012-07-01

    Full Text Available Different human languages look different from other human languages. To use a term from the computer industry, each human language has its own “look and feel”. European English speakers can easily recognise a phrase such as “Comment allez...

  1. Integrative genome analyses identify key somatic driver mutations of small-cell lung cancer

    NARCIS (Netherlands)

    Peifer, Martin; Fernandez-Cuesta, Lynnette; Sos, Martin L.; George, Julie; Seidel, Danila; Kasper, Lawryn H.; Plenker, Dennis; Leenders, Frauke; Sun, Ruping; Zander, Thomas; Menon, Roopika; Koker, Mirjam; Dahmen, Ilona; Mueller, Christian; Di Cerbo, Vincenzo; Schildhaus, Hans-Ulrich; Altmueller, Janine; Baessmann, Ingelore; Becker, Christian; de Wilde, Bram; Vandesompele, Jo; Boehm, Diana; Ansen, Sascha; Gabler, Franziska; Wilkening, Ines; Heynck, Stefanie; Heuckmann, Johannes M.; Lu, Xin; Carter, Scott L.; Cibulskis, Kristian; Banerji, Shantanu; Getz, Gad; Park, Kwon-Sik; Rauh, Daniel; Gruetter, Christian; Fischer, Matthias; Pasqualucci, Laura; Wright, Gavin; Wainer, Zoe; Russell, Prudence; Petersen, Iver; Chen, Yuan; Stoelben, Erich; Ludwig, Corinna; Schnabel, Philipp; Hoffmann, Hans; Muley, Thomas; Brockmann, Michael; Engel-Riedel, Walburga; Muscarella, Lucia A.; Fazio, Vito M.; Groen, Harry; Timens, Wim; Sietsma, Hannie; Thunnissen, Erik; Smit, Egbert; Heideman, Danielle A. M.; Snijders, Peter J. F.; Cappuzzo, Federico; Ligorio, Claudia; Damiani, Stefania; Field, John; Solberg, Steinar; Brustugun, Odd Terje; Lund-Iversen, Marius; Saenger, Joerg; Clement, Joachim H.; Soltermann, Alex; Moch, Holger; Weder, Walter; Solomon, Benjamin; Soria, Jean-Charles; Validire, Pierre; Besse, Benjamin; Brambilla, Elisabeth; Brambilla, Christian; Lantuejoul, Sylvie; Lorimier, Philippe; Schneider, Peter M.; Hallek, Michael; Pao, William; Meyerson, Matthew; Sage, Julien; Shendure, Jay; Schneider, Robert; Buettner, Reinhard; Wolf, Juergen; Nuernberg, Peter; Perner, Sven; Heukamp, Lukas C.; Brindle, Paul K.; Haas, Stefan; Thomas, Roman K.

    2012-01-01

    Small-cell lung cancer (SCLC) is an aggressive lung tumor subtype with poor prognosis(1-3). We sequenced 29 SCLC exomes, 2 genomes and 15 transcriptomes and found an extremely high mutation rate of 7.4 +/- 1 protein-changing mutations per million base pairs. Therefore, we conducted integrated

  2. Genome-wide association study of classical Hodgkin lymphoma identifies key regulators of disease susceptibility

    DEFF Research Database (Denmark)

    Sud, Amit; Thomsen, Hauke; Law, Philip J.

    2017-01-01

    Several susceptibility loci for classical Hodgkin lymphoma have been reported. However, much of the heritable risk is unknown. Here, we perform a meta-analysis of two existing genome-wide association studies, a new genome-wide association study, and replication totalling 5,314 cases and 16,749 co...

  3. Identifying Key Workplace Stressors Affecting Twentieth Air Force: Analyses Conducted from December 2012 Through February 2013

    Science.gov (United States)

    2014-01-01

    24-hour basis include nursing , air traffic control, manufacturing, police service, and fire protection. Many studies have shown that evening, night...of occupational injuries for a variety of jobs, including construction workers, nurses , miners, truck drivers, firefighters, and nuclear power plant...lish a strict schedule of AFS-specific focus group times in advance. We could not reschedule if the times proved inconvenient for participants

  4. Identifying stabilizing key residues in proteins using interresidue interaction energy matrix

    Czech Academy of Sciences Publication Activity Database

    Biedermannová, Lada; Hobza, Pavel; Vondrášek, Jiří

    2008-01-01

    Roč. 72, č. 1 (2008), s. 402-413 ISSN 0887-3585 R&D Projects: GA ČR GA203/05/0009; GA ČR GA203/06/1727; GA ČR(CZ) GD203/05/H001; GA MŠk LC512 Institutional research plan: CEZ:AV0Z40550506 Keywords : protein stabilisation * an-initio calculation * interaction energy Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 3.419, year: 2008

  5. Genome-wide association study of classical Hodgkin lymphoma identifies key regulators of disease susceptibility

    NARCIS (Netherlands)

    Sud, A. (Amit); Thomsen, H. (Hauke); Law, P.J. (Philip J.); A. Försti (Asta); Filho, M.I.D.S. (Miguel Inacio Da Silva); Holroyd, A. (Amy); P. Broderick (Peter); Orlando, G. (Giulia); Lenive, O. (Oleg); Wright, L. (Lauren); R. Cooke (Rosie); D.F. Easton (Douglas); P.D.P. Pharoah (Paul); A.M. Dunning (Alison); J. Peto (Julian); F. Canzian (Federico); Eeles, R. (Rosalind); Z. Kote-Jarai; K.R. Muir (K.); Pashayan, N. (Nora); B.E. Henderson (Brian); C.A. Haiman (Christopher); S. Benlloch (Sara); F.R. Schumacher (Fredrick R); Olama, A.A.A. (Ali Amin Al); S.I. Berndt (Sonja); G. Conti (Giario); F. Wiklund (Fredrik); S.J. Chanock (Stephen); Stevens, V.L. (Victoria L.); C.M. Tangen (Catherine M.); Batra, J. (Jyotsna); Clements, J. (Judith); H. Grönberg (Henrik); Schleutker, J. (Johanna); D. Albanes (Demetrius); Weinstein, S. (Stephanie); K. Wolk (Kerstin); West, C. (Catharine); Mucci, L. (Lorelei); Cancel-Tassin, G. (Géraldine); Koutros, S. (Stella); Sorensen, K.D. (Karina Dalsgaard); L. Maehle; D. Neal (David); S.P.L. Travis (Simon); Hamilton, R.J. (Robert J.); S.A. Ingles (Sue); B.S. Rosenstein (Barry S.); Lu, Y.-J. (Yong-Jie); Giles, G.G. (Graham G.); A. Kibel (Adam); Vega, A. (Ana); M. Kogevinas (Manolis); Penney, K.L. (Kathryn L.); Park, J.Y. (Jong Y.); Stanford, J.L. (Janet L.); C. Cybulski (Cezary); B.G. Nordestgaard (Børge); Brenner, H. (Hermann); Maier, C. (Christiane); Kim, J. (Jeri); E.M. John (Esther); P.J. Teixeira; Neuhausen, S.L. (Susan L.); De Ruyck, K. (Kim); Razack, A. (Azad); Newcomb, L.F. (Lisa F.); Lessel, D. (Davor); Kaneva, R. (Radka); N. Usmani (Nawaid); F. Claessens; Townsend, P.A. (Paul A.); Dominguez, M.G. (Manuela Gago); Roobol, M.J. (Monique J.); F. Menegaux (Florence); P. Hoffmann (Per); M.M. Nöthen (Markus); K.-H. JöCkel (Karl-Heinz); Strandmann, E.P.V. (Elke Pogge Von); Lightfoot, T. (Tracy); Kane, E. (Eleanor); Roman, E. (Eve); Lake, A. (Annette); Montgomery, D. (Dorothy); Jarrett, R.F. (Ruth F.); A.J. Swerdlow (Anthony ); A. Engert (Andreas); N. Orr (Nick); K. Hemminki (Kari); Houlston, R.S. (Richard S.)

    2017-01-01

    textabstractSeveral susceptibility loci for classical Hodgkin lymphoma have been reported. However, much of the heritable risk is unknown. Here, we perform a meta-analysis of two existing genome-wide association studies, a new genome-wide association study, and replication totalling 5,314 cases and

  6. Identifying Key Topics for the Description of Sexual Behavior in the Danish Population: A Qualitative Study

    DEFF Research Database (Denmark)

    Jørgensen, Marianne Johansson

    and often lead to unsafe sex. 3) Low self-esteem increases the risk of ignoring crossing of one’s personal boundaries and thereby resulting in promiscuous sexual behavior. 4) Increased sexual experience was found to be associated with lack of condom use. Surprisingly, the informants did not consider drug...... and used to describe important points of interest regarding sexual behavior in the young population....

  7. Predicting establishment of non-native fishes in Greece: identifying key features

    Directory of Open Access Journals (Sweden)

    Christos Gkenas

    2015-11-01

    Full Text Available Non-native fishes are known to cause economic damage to human society and are considered a major threat to biodiversity loss in freshwater ecosystems. The growing concern about these impacts has driven to an investigation of the biological traits that facilitate the establishment of non-native fish. However, invalid assessment in choosing the appropriate statistical model can lead researchers to ambiguous conclusions. Here, we present a comprehensive comparison of traditional and alternative statistical methods for predicting fish invasions using logistic regression, classification trees, multicorrespondence analysis and random forest analysis to determine characteristics of successful and failed non-native fishes in Hellenic Peninsula through establishment. We defined fifteen categorical predictor variables with biological relevance and measures of human interest. Our study showed that accuracy differed according to the model and the number of factors considered. Among all the models tested, random forest and logistic regression performed best, although all approaches predicted non-native fish establishment with moderate to excellent results. Detailed evaluation among the models corresponded with differences in variables importance, with three biological variables (parental care, distance from nearest native source and maximum size and two variables of human interest (prior invasion success and propagule pressure being important in predicting establishment. The analyzed statistical methods presented have a high predictive power and can be used as a risk assessment tool to prevent future freshwater fish invasions in this region with an imperiled fish fauna.

  8. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  9. Key energy technologies for Europe

    DEFF Research Database (Denmark)

    Jørgensen, B.H.

    2005-01-01

    This report on key energy technologies is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. Senior Scientist BirteHolst Jørgensen, Risø National Laboratory...... contributed by Scientific Officer Edgar Thielmann, DG TREN, Head of Department Hans Larsen, RisøNational Laboratory, Senior Asset Manager Aksel Hauge Pedersen, DONG VE, Consultant Timon Wehnert, IZT-Berlin, and Senior Scientist Martine Uyterlinde, ECN...

  10. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken......“Now I can actually play soccer with the young people without fearing that my colleagues think I am escaping the paper work.” These were the words from a participant in a social pedagogy training course in England a few years ago. This understanding emerged through in-depth discussions...

  11. One Step Quantum Key Distribution Based on EPR Entanglement.

    Science.gov (United States)

    Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao

    2016-06-30

    A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.

  12. Identifying Knowledge and Communication

    Directory of Open Access Journals (Sweden)

    Eduardo Coutinho Lourenço de Lima

    2006-12-01

    Full Text Available In this paper, I discuss how the principle of identifying knowledge which Strawson advances in ‘Singular Terms and Predication’ (1961, and in ‘Identifying Reference and Truth-Values’ (1964 turns out to constrain communication. The principle states that a speaker’s use of a referring expression should invoke identifying knowledge on the part of the hearer, if the hearer is to understand what the speaker is saying, and also that, in so referring, speakers are attentive to hearers’ epistemic states. In contrasting it with Russell’s Principle (Evans 1982, as well as with the principle of identifying descriptions (Donnellan 1970, I try to show that the principle of identifying knowledge, ultimately a condition for understanding, makes sense only in a situation of conversation. This allows me to conclude that the cooperative feature of communication (Grice 1975 and reference (Clark andWilkes-Gibbs 1986 holds also at the understanding level. Finally, I discuss where Strawson’s views seem to be unsatisfactory, and suggest how they might be improved.

  13. Public/private key certification authority and key distribution. Draft

    Energy Technology Data Exchange (ETDEWEB)

    Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

    1995-09-25

    Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

  14. Understanding Mathematics: Some Key Factors

    Science.gov (United States)

    Ali, Asma Amanat; Reid, Norman

    2012-01-01

    Mathematics is well known as a subject area where there can be problems in terms of understanding as well as retaining positive attitudes. In a large study involving 813 school students (ages approximately 10-12) drawn from two different school systems in Pakistan, the effect of limited working memory capacity on performance in mathematics was…

  15. Challenges for strengthening the health workforce in the Lao People's Democratic Republic: perspectives from key stakeholders.

    Science.gov (United States)

    Qian, Yi; Yan, Fei; Wang, Wei; Clancy, Shayna; Akkhavong, Kongsap; Vonglokham, Manithong; Outhensackda, Somphou; Østbye, Truls

    2016-11-29

    The Lao People's Democratic Republic is facing a critical shortage and maldistribution of health workers. Strengthening of the health workforce has been adopted as one of the five priorities of the National Health Sector Strategy (2013-2025). This study aims to identify, explore, and better understand the key challenges for strengthening the Laotian health workforce. This study applied exploratory and descriptive qualitative methods and adapted a working life-span framework. Twenty-three key stakeholders with particular insights into the current situation of the health workforce were purposively recruited for in-depth interviews. Important policy documents were also collected from key informants during the interviews. Thematic analysis was employed for the textual data using MAXQDA 10. The overarching problem is that there is a perceived severe shortage of skilled health workers (doctors, nurses, and midwives) and lab technicians, especially in primary health facilities and rural areas. Key informants also identified five problems: insufficient production of health workers both in quantity and quality, a limited national budget to recruit enough health staff and provide sufficient and equitable salaries and incentives, limited management capacity, poor recruitment for work in rural areas, and lack of well-designed continuing education programs for professional development. These problems are interrelated, both in how the issues arise and in the effect they have on one another. To improve the distribution of health workers in rural areas, strategies for increasing production and strengthening retention should be well integrated for better effectiveness. It is also essential to take the Laotian-specific context into consideration during intervention development and implementation. Furthermore, the government should acknowledge the inadequate health management capacity and invest to improve human resource management capacity at all levels. Finally, assessment of

  16. Three key affordances for serendipity

    DEFF Research Database (Denmark)

    Björneborn, Lennart

    2017-01-01

    Purpose Serendipity is an interesting phenomenon to study in information science as it plays a fundamental – but perhaps underestimated – role in how we discover, explore, and learn in all fields of life. The purpose of this paper is to operationalize the concept of serendipity by providing termi...... terminological “building blocks” for understanding connections between environmental and personal factors in serendipitous encounters. Understanding these connections is essential when designing affordances in physical and digital environments that can facilitate serendipity. Design....../methodology/approach In this paper, serendipity is defined as what happens when we, in unplanned ways, encounter resources (information, things, people, etc.) that we find interesting. In the outlined framework, serendipity is understood as an affordance, i.e., a usage potential when environmental and personal factors correspond...... the three key affordances and three key personal serendipity factors: curiosity, mobility, and sensitivity. Ten sub-affordances for serendipity and ten coupled personal sub-factors are also briefly outlined. Related research is compared with and mapped into the framework aiming at a theoretical validation...

  17. Key energy technologies for Europe

    International Nuclear Information System (INIS)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO 2 capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  18. Secure Key Management in the Cloud

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus

    2013-01-01

    information such as cryptographic keys. Applications like this include many cases where secure multiparty computation is outsourced to the cloud, and in particular a number of online auctions and benchmark computations with confidential inputs. We consider fully autonomous servers that switch between online......We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive...... and offline periods without communicating with anyone from outside the cloud, and semi-autonomous servers that need a limited kind of assistance from outside the cloud when doing the transition. We study the levels of security one can – and cannot – obtain in this model, propose light-weight protocols...

  19. Security of practical quantum key distribution systems

    Energy Technology Data Exchange (ETDEWEB)

    Jain, Nitin

    2015-02-24

    This thesis deals with practical security aspects of quantum key distribution (QKD) systems. At the heart of the theoretical model of any QKD system lies a quantum-mechanical security proof that guarantees perfect secrecy of messages - based on certain assumptions. However, in practice, deviations between the theoretical model and the physical implementation could be exploited by an attacker to break the security of the system. These deviations may arise from technical limitations and operational imperfections in the physical implementation and/or unrealistic assumptions and insufficient constraints in the theoretical model. In this thesis, we experimentally investigate in depth several such deviations. We demonstrate the resultant vulnerabilities via proof-of-principle attacks on a commercial QKD system from ID Quantique. We also propose countermeasures against the investigated loopholes to secure both existing and future QKD implementations.

  20. Identifying and Managing Risk.

    Science.gov (United States)

    Abraham, Janice M.

    1999-01-01

    The role of the college or university chief financial officer in institutional risk management is (1) to identify risk (physical, casualty, fiscal, business, reputational, workplace safety, legal liability, employment practices, general liability), (2) to develop a campus plan to reduce and control risk, (3) to transfer risk, and (4) to track and…

  1. Key barriers to gout care: a systematic review and thematic synthesis of qualitative studies.

    Science.gov (United States)

    Rai, Sharan K; Choi, Hyon K; Choi, Sally H J; Townsend, Anne F; Shojania, Kam; De Vera, Mary A

    2018-04-17

    Gout care remains highly suboptimal, contributing to an increased global disease burden. To understand barriers to gout care, our aim was to provide a systematic review and thematic synthesis of qualitative studies worldwide reporting provider and patient perspectives and experiences with management. We conducted a mapped search of MEDLINE, EMBASE, Cumulative Index to Nursing and Allied Health Literature, and Social Sciences Citation Index databases and selected qualitative studies of provider and patient perspectives on gout management. We used thematic synthesis to combine the included studies and identify key themes across studies. We included 20 studies that reported the experiences and perspectives of 480 gout patients and 120 providers spanning five different countries across three continents. We identified three predominant provider themes: knowledge gaps and management approaches; perceptions and beliefs about gout patients; and system barriers to optimal gout care (e.g. time constraints and a lack of incentives). We also identified four predominant themes among gout patients: limited gout knowledge; interactions with health-care providers; attitudes towards and experiences with taking medication; and practical barriers to long-term medication use. Our systematic review of worldwide literature consistently identified gaps in gout knowledge among providers, which is likely to contribute to patients' lack of appropriate education about the fundamental causes of and essential treatment approaches for gout. Furthermore, system barriers among providers and day-to-day challenges of taking long-term medications among patients are considerable. These factors provide key targets to improve the widespread suboptimal gout care.

  2. Partnerships – Limited partnerships and limited liability limited partnerships

    OpenAIRE

    Henning, Johan J.

    2000-01-01

    Consideration of the Limited Liability Partnership Act 2000 which introduced a new corporate entity, carrying the designations “partnership” and “limited” which allow members to limit their liability whilst organising themselves internally as a partnership. Article by Professor Johan Henning (Director of the Centre for Corporate Law and Practice, IALS and Dean of the Faculty of Law, University of the Free State, South Africa). Published in Amicus Curiae - Journal of the Institute of Advanced ...

  3. (Limiting the greenhouse effect)

    Energy Technology Data Exchange (ETDEWEB)

    Rayner, S.

    1991-01-07

    Traveler attended the Dahlem Research Conference organized by the Freien Universitat, Berlin. The subject of the conference was Limiting the Greenhouse Effect: Options for Controlling Atmospheric CO{sub 2} Accumulation. Like all Dahlem workshops, this was a meeting of scientific experts, although the disciplines represented were broader than usual, ranging across anthropology, economics, international relations, forestry, engineering, and atmospheric chemistry. Participation by scientists from developing countries was limited. The conference was divided into four multidisciplinary working groups. Traveler acted as moderator for Group 3 which examined the question What knowledge is required to tackle the principal social and institutional barriers to reducing CO{sub 2} emissions'' The working rapporteur was Jesse Ausubel of Rockefeller University. Other working groups examined the economic costs, benefits, and technical feasibility of options to reduce emissions per unit of energy service; the options for reducing energy use per unit of GNP; and the significant of linkage between strategies to reduce CO{sub 2} emissions and other goals. Draft reports of the working groups are appended. Overall, the conference identified a number of important research needs in all four areas. It may prove particularly important in bringing the social and institutional research needs relevant to climate change closer to the forefront of the scientific and policy communities than hitherto.

  4. Setting Organizational Key Performance Indicators in the Precision Machine Industry

    Directory of Open Access Journals (Sweden)

    Mei-Hsiu Hong

    2015-11-01

    Full Text Available The aim of this research is to define (or set organizational key performance indicators (KPIs in the precision machine industry using the concept of core competence and the supply chain operations reference (SCOR model. The research is conducted in three steps. In the first step, a benchmarking study is conducted to collect major items of core competence and to group them into main categories in order to form a foundation for the research. In the second step, a case company questionnaire and interviews are conducted to identify the key factors of core competence in the precision machine industry. The analysis is conducted based on four dimensions and hence several analysis rounds are completed. Questionnaire data is analyzed with grey relational analysis (GRA and resulted in 5–6 key factors in each dimension or sub-dimension. Based on the conducted interviews, 13 of these identified key factors are separated into one organization objective, five key factors of core competence and seven key factors of core ability. In the final step, organizational KPIs are defined (or set for the five identified key factors of core competence. The most competitive core abilities for each of the five key factors are established. After that, organizational KPIs are set based on the core abilities within 3 main categories of KPIs (departmental, office grade and hierarchal for each key factor. The developed KPI system based on organizational objectives, core competences, and core abilities allow enterprises to handle dynamic market demand and business environments, as well as changes in overall corporate objectives.

  5. Key to Language Learning Success

    Directory of Open Access Journals (Sweden)

    Oktavian Mantiri

    2015-01-01

    Full Text Available This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these roles and nurture the best possible ways where language teaching and learning will thrive. This paper also suggested that both stake-holders should be open to holistic approach of language learning and that other factors such as the environment could play an important part in language teaching and learning success.

  6. Cogeneration: Key feasibility analysis parameters

    International Nuclear Information System (INIS)

    Coslovi, S.; Zulian, A.

    1992-01-01

    This paper first reviews the essential requirements, in terms of scope, objectives and methods, of technical/economic feasibility analyses applied to cogeneration systems proposed for industrial plants in Italy. Attention is given to the influence on overall feasibility of the following factors: electric power and fuel costs, equipment coefficients of performance, operating schedules, maintenance costs, Italian Government taxes and financial and legal incentives. Through an examination of several feasibility studies that were done on cogeneration proposals relative to different industrial sectors, a sensitivity analysis is performed on the effects of varying the weights of different cost benefit analysis parameters. With the use of statistical analyses, standard deviations are then determined for key analysis parameters, and guidelines are suggested for analysis simplifications

  7. Key determinants of managing the marketing asset of global companies

    OpenAIRE

    Tatyana Tsygankova; Roman Ponomarenko

    2016-01-01

    As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development). The article identified the optimal set of key elements of the system of marketing assets, which are th...

  8. Scalable Multi-group Key Management for Advanced Metering Infrastructure

    OpenAIRE

    Benmalek , Mourad; Challal , Yacine; Bouabdallah , Abdelmadjid

    2015-01-01

    International audience; Advanced Metering Infrastructure (AMI) is composed of systems and networks to incorporate changes for modernizing the electricity grid, reduce peak loads, and meet energy efficiency targets. AMI is a privileged target for security attacks with potentially great damage against infrastructures and privacy. For this reason, Key Management has been identified as one of the most challenging topics in AMI development. In this paper, we propose a new Scalable multi-group key ...

  9. Key energy technologies for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO{sub 2} capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  10. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huang Jen-Yan

    2011-01-01

    Full Text Available Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station, cluster heads, and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes, security breaches, key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks: guessing attacks, replay attacks, man-in-the-middle attacks, node capture attacks, and denial-of-service attacks.

  11. Conceptualizing childhood health problems using survey data: a comparison of key indicators

    Directory of Open Access Journals (Sweden)

    Miller Anton R

    2007-12-01

    Full Text Available Abstract Background Many definitions are being used to conceptualize child health problems. With survey data, commonly used indicators for identifying children with health problems have included chronic condition checklists, measures of activity limitations, elevated service use, and health utility thresholds. This study compares these different indicators in terms of the prevalence rates elicited, and in terms of how the subgroups identified differ. Methods Secondary data analyses used data from the National Longitudinal Survey of Children and Youth, which surveyed a nationally representative sample of Canadian children (n = 13,790. Descriptive analyses compared healthy children to those with health problems, as classified by any of the key indicators. Additional analyses examined differences between subgroups of children captured by a single indicator and those described as having health problems by multiple indicators. Results This study demonstrates that children captured by any of the indicators had poorer health than healthy children, despite the fact that over half the sample (52.2% was characterized as having a health problem by at least one indicator. Rates of child ill health differed by indicator; 5.6% had an activity limitation, 9.2% exhibited a severe health difficulty, 31.7% reported a chronic condition, and 36.6% had elevated service use. Further, the four key indicators captured different types of children. Indicator groupings differed on child and socio-demographic factors. Compared to children identified by more than one indicator, those identified only by the severe health difficulty indicator displayed more cognitive problems (p Conclusion We provide information useful to researchers when selecting indicators from survey data to identify children with health problems. Researchers and policy makers need to be aware of the impact of such definitions on prevalence rates as well as on the composition of children classified as

  12. Soil fauna: key to new carbon models

    Science.gov (United States)

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; De Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; José Jiménez, Juan

    2016-11-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined mostly in terms of plant residue quality and input and microbial decomposition, overlooking the significant regulation provided by soil fauna. The fauna controls almost any aspect of organic matter turnover, foremost by regulating the activity and functional composition of soil microorganisms and their physical-chemical connectivity with soil organic matter. We demonstrate a very strong impact of soil animals on carbon turnover, increasing or decreasing it by several dozen percent, sometimes even turning C sinks into C sources or vice versa. This is demonstrated not only for earthworms and other larger invertebrates but also for smaller fauna such as Collembola. We suggest that inclusion of soil animal activities (plant residue consumption and bioturbation altering the formation, depth, hydraulic properties and physical heterogeneity of soils) can fundamentally affect the predictive outcome of SOM models. Understanding direct and indirect impacts of soil fauna on nutrient availability, carbon sequestration, greenhouse gas emissions and plant growth is key to the understanding of SOM dynamics in the context of global carbon cycling models. We argue that explicit consideration of soil fauna is essential to make realistic modelling predictions on SOM dynamics and to detect expected non-linear responses of SOM dynamics to global change. We present a decision framework, to be further developed through the activities of KEYSOM, a European COST Action, for when mechanistic SOM models

  13. Internally readable identifying tag

    International Nuclear Information System (INIS)

    Jefferts, K.B.; Jefferts, E.R.

    1980-01-01

    A method of identifying non-metallic objects by means of X-ray equipment is described in detail. A small metal pin with a number of grooves cut in a pre-determined equi-spaced pattern is implanted into the non-metallic object and by decoding the groove patterns using X-ray equipment, the object is uniquely identified. A specific example of such an application is in studying the migratory habits of fish. The pin inserted into the snout of the fish is 0.010 inch in diameter, 0.040 inch in length with 8 possible positions for grooves if spaced 0.005 inch apart. With 6 of the groove positions available for data, the capacity is 2 6 or 64 combinations; clearly longer pins would increase the data capacity. This method of identification is a major advance over previous techniques which necessitated destruction of the fish in order to recover the identification tag. (UK)

  14. Identifying Breast Cancer Oncogenes

    Science.gov (United States)

    2010-10-01

    tyrosine kinases with an SH3, SH2 and catalytic domain, it lacks a native myristylation signal shared by most members of this class [14], [38]. The...therapeutics and consequently, improve clinical outcomes. We aim to identify novel drivers of breast oncogenesis. We hypothesize that a kinase gain-of...human mammary epithelial cells. A pBabe-Puro-Myr-Flag kinase open reading frame (ORF) library was screened in immortalized human mammary epithelial

  15. Rock disposal problems identified

    Energy Technology Data Exchange (ETDEWEB)

    Knox, R

    1978-06-01

    Mathematical models are the only way of examining the return of radioactivity from nuclear waste to the environment over long periods of time. Work in Britain has helped identify areas where more basic data is required, but initial results look very promising for final disposal of high level waste in hard rock repositories. A report by the National Radiological Protection Board of a recent study, is examined.

  16. Careful assessment key in managing prostatitis.

    Science.gov (United States)

    Gujadhur, Rahul; Aning, Jonathan

    2015-04-01

    Prostatitis is a common condition estimated to affect up to 30% of men in their lifetime, it is most prevalent in men aged between 35 and 50. Prostatitis is subclassified into: acute bacterial prostatitis, chronic bacterial prostatitis, chronic pelvic pain and asymptomatic inflammatory prostatitis. Acute bacterial prostatitis presents with acute onset pelvic pain which may or may not be related to voiding, lower urinary tract symptoms, sometimes haematuria or haematospermia and systemic symptoms such as fever and rigors. A documented history of recurrent urinary tract infections is the key feature of chronic bacterial prostatitis. Duration of symptoms > 3 months defines chronicity. The key symptom of chronic pelvic pain syndrome is pain. Patients may describe pain during or after ejaculation as their predominant symptom. Clinical assessment includes a thorough history and examination. A digital rectal examination should be performed after a midstream urine (MSU) sample has been collected for urine dipstick, microscopy and culture. The prostate should be checked for nodules. In acute bacterial prostatitis the MSU is the only laboratory investigation required. Chronic pelvic pain syndrome may be multifactorial and part of a more generalised pain disorder. Pelvic floor muscle abnormalities, altered neuroendocrine pathways, chemically induced inflammation, bacterial infection, autoimmune processes, dysfunctional voiding as well intraprostatic ductal reflux mechanisms have all been identified in men with chronic pelvic pain syndrome.

  17. KEY FACTORS IN MARKETING FOCUSED SERVICES BUSINESSES

    Directory of Open Access Journals (Sweden)

    Doris Yohanna Martínez Castrillón

    2016-07-01

    Full Text Available This article aims to identify the key success factors in the marketing area and describe them as managerial allies for companies that wish to position themselves in the market under a good sustainable performance , for it has been consulted theoretical references of Marketing as a management partner with collection and integration of data. Methodologically, it is located within the type of descriptive research field, with a design of transactional non-experimental, with an intentional non-probabilistic stratified sample of four reporting units. The findings established fifteen (15 points of influence called "key success factors (FCE in the area of marketing, and managerial allies of service companies in the security, surveillance and protection sector in industrial, commercial and residential sectors. Finally, it is intended that the actions of marketing service companies should focus to the welfare of both the organization, such as users, both in the environment, and economic, social and technological, characterized by ethics, sustainable development and transparency to respond appropriately.

  18. Key Questions in Marine Megafauna Movement Ecology.

    Science.gov (United States)

    Hays, Graeme C; Ferreira, Luciana C; Sequeira, Ana M M; Meekan, Mark G; Duarte, Carlos M; Bailey, Helen; Bailleul, Fred; Bowen, W Don; Caley, M Julian; Costa, Daniel P; Eguíluz, Victor M; Fossette, Sabrina; Friedlaender, Ari S; Gales, Nick; Gleiss, Adrian C; Gunn, John; Harcourt, Rob; Hazen, Elliott L; Heithaus, Michael R; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L; Lowe, Christopher G; Madsen, Peter T; Marsh, Helene; Phillips, Richard A; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A; Simpfendorfer, Colin A; Sims, David W; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N; Wikelski, Martin; Womble, Jamie N; Thums, Michele

    2016-06-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Key indicators for organizational performance measurement

    Directory of Open Access Journals (Sweden)

    Firoozeh Haddadi

    2014-09-01

    Full Text Available Each organization for assessing the amount of utility and desirability of their activities, especially in complex and dynamic environments, requires determining and ranking the vital performance indicators. Indicators provide essential links among strategy, execution and ultimate value creation. The aim of this paper is to develop a framework, which identifies and prioritizes Key Performance Indicators (KPIs that a company should focus on them to define and measure progress towards organizational objectives. For this purpose, an applied research was conducted in 2013 in an Iranian telecommunication company. We first determined the objectives of the company with respect to four perspectives of BSC (Balanced Scorecard framework. Next, performance indicators were listed and paired wise comparisons were accomplished by company's high-ranked employees through standard Analytic Hierarchy Process (AHP questionnaires. This helped us establish the weight of each indicator and to rank them, accordingly.

  20. HOME Income Limits

    Data.gov (United States)

    Department of Housing and Urban Development — HOME Income Limits are calculated using the same methodology that HUD uses for calculating the income limits for the Section 8 program. These limits are based on HUD...

  1. Key features of wave energy.

    Science.gov (United States)

    Rainey, R C T

    2012-01-28

    For a weak point source or dipole, or a small body operating as either, we show that the power from a wave energy converter (WEC) is the product of the particle velocity in the waves, and the wave force (suitably defined). There is a thus a strong analogy with a wind or tidal turbine, where the power is the product of the fluid velocity through the turbine, and the force on it. As a first approximation, the cost of a structure is controlled by the force it has to carry, which governs its strength, and the distance it has to be carried, which governs its size. Thus, WECs are at a disadvantage compared with wind and tidal turbines because the fluid velocities are lower, and hence the forces are higher. On the other hand, the distances involved are lower. As with turbines, the implication is also that a WEC must make the most of its force-carrying ability-ideally, to carry its maximum force all the time, the '100% sweating WEC'. It must be able to limit the wave force on it in larger waves, ultimately becoming near-transparent to them in the survival condition-just like a turbine in extreme conditions, which can stop and feather its blades. A turbine of any force rating can achieve its maximum force in low wind speeds, if its diameter is sufficiently large. This is not possible with a simple monopole or dipole WEC, however, because of the 'nλ/2π' capture width limits. To achieve reasonable 'sweating' in typical wave climates, the force is limited to about 1 MN for a monopole device, or 2 MN for a dipole. The conclusion is that the future of wave energy is in devices that are not simple monopoles or dipoles, but multi-body devices or other shapes equivalent to arrays.

  2. Managing clinical education through understanding key principles.

    Science.gov (United States)

    Cunningham, Joanne; Wright, Caroline; Baird, Marilyn

    2015-01-01

    Traditionally, a practicum facilitated the integration of on-campus learning and practical workplace training. Over the past 3 decades, an educative practicum has evolved that promotes clinical reasoning, including analytical and evaluative abilities, through reflective practice. Anecdotal evidence indicates that the delivery of clinical education within medical radiation science entry-level programs continues to vacillate between traditional practicums and the new reflective practicums. To review the literature about clinical education within the medical radiation sciences and identify key principles for practitioners seeking to reflect upon and improve their approach to teaching and supporting students in the clinical environment. A search of 3 major journal databases, Internet searches, and hand searches of reference lists were conducted to identify literature about clinical education in the medical radiation sciences from January 1, 2000, to December 31, 2012. Twenty-two studies were included in this review. The 5 key elements associated with clinical education include the clinical support model and quality, overcoming the theory-practice gap, learning outcomes and reliable and valid assessment, preparing and supporting students, and accommodating differing teaching and learning needs. Many factors influence the quality of clinical education, including the culture of the clinical environment and clinical leadership roles. Several approaches can help students bridge the theory-practice gap, including simulators, role-playing activities, and reflective journals. In addition, clinical educators should use assessment strategies that objectively measure student progress, and they should be positive role models for their students. The successful clinical education of students in the medical radiation sciences depends upon the systems, structures, and people in the clinical environment. Clinical education is accomplished through the collaborative efforts of the

  3. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  4. VICKEY: Mining Conditional Keys on Knowledge Bases

    DEFF Research Database (Denmark)

    Symeonidou, Danai; Prado, Luis Antonio Galarraga Del; Pernelle, Nathalie

    2017-01-01

    A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs...

  5. Identifying ELIXIR Core Data Resources.

    Science.gov (United States)

    Durinx, Christine; McEntyre, Jo; Appel, Ron; Apweiler, Rolf; Barlow, Mary; Blomberg, Niklas; Cook, Chuck; Gasteiger, Elisabeth; Kim, Jee-Hyub; Lopez, Rodrigo; Redaschi, Nicole; Stockinger, Heinz; Teixeira, Daniel; Valencia, Alfonso

    2016-01-01

    The core mission of ELIXIR is to build a stable and sustainable infrastructure for biological information across Europe. At the heart of this are the data resources, tools and services that ELIXIR offers to the life-sciences community, providing stable and sustainable access to biological data. ELIXIR aims to ensure that these resources are available long-term and that the life-cycles of these resources are managed such that they support the scientific needs of the life-sciences, including biological research. ELIXIR Core Data Resources are defined as a set of European data resources that are of fundamental importance to the wider life-science community and the long-term preservation of biological data. They are complete collections of generic value to life-science, are considered an authority in their field with respect to one or more characteristics, and show high levels of scientific quality and service. Thus, ELIXIR Core Data Resources are of wide applicability and usage. This paper describes the structures, governance and processes that support the identification and evaluation of ELIXIR Core Data Resources. It identifies key indicators which reflect the essence of the definition of an ELIXIR Core Data Resource and support the promotion of excellence in resource development and operation. It describes the specific indicators in more detail and explains their application within ELIXIR's sustainability strategy and science policy actions, and in capacity building, life-cycle management and technical actions. The identification process is currently being implemented and tested for the first time. The findings and outcome will be evaluated by the ELIXIR Scientific Advisory Board in March 2017. Establishing the portfolio of ELIXIR Core Data Resources and ELIXIR Services is a key priority for ELIXIR and publicly marks the transition towards a cohesive infrastructure.

  6. Development of key performance indicators for prehospital emergency care.

    Science.gov (United States)

    Murphy, Adrian; Wakai, Abel; Walsh, Cathal; Cummins, Fergal; O'Sullivan, Ronan

    2016-04-01

    Key performance indicators (KPIs) are used to monitor and evaluate critical areas of clinical and support functions that influence patient outcome. Traditional prehospital emergency care performance monitoring has focused solely on response time metrics. The landscape of emergency care delivery in Ireland is in the process of significant national reconfiguration. The development of KPIs is therefore considered one of the key priorities in prehospital research. The aim of this study was to develop a suite of KPIs for prehospital emergency care in Ireland. A systematic literature review of prehospital care performance measurement was undertaken followed by a three-round Delphi consensus process facilitated by a broad-based multidisciplinary group of panellists. The consensus process was conducted between June 2012 and October 2013. Each candidate indicator on the Delphi survey questionnaire was rated using a 5-point Likert-type rating scale. Agreement was defined as at least 70% of responders rating an indicator as 'agree' or 'strongly agree' on the rating scale. Data were analysed using descriptive statistics. Sensitivity of the ratings was examined for robustness by bootstrapping the original sample. Of the 78 citations identified by the systematic review, 5 relevant publications were used to select candidate indicators for the Delphi round 1 questionnaire. Response rates in Delphi rounds 1 and 2 were 89% and 83%, respectively. Following the consensus development conference, 101 KPIs reached consensus. Based on the Donabedian framework for quality-of-care indicators, 7 of the KPIs which reached agreement were structure KPIs, 74 were process KPIs and 20 were outcome KPIs. The highest ranked indicator was a process KPI ('Direct transport of ST-elevation myocardial infarction patients to a primary percutaneous intervention (PCI)-capable facility for ECG to PCI time performance measurement using scientifically valid and reliable KPIs. Employing a Delphi panel of key

  7. Identifying PHM market and network opportunities.

    Science.gov (United States)

    Grube, Mark E; Krishnaswamy, Anand; Poziemski, John; York, Robert W

    2015-11-01

    Two key processes for healthcare organizations seeking to assume a financially sustainable role in population health management (PHM), after laying the groundwork for the effort, are to identify potential PHM market opportunities and determine the scope of the PHM network. Key variables organizations should consider with respect to market opportunities include the patient population, the overall insurance/employer market, and available types of insurance products. Regarding the network's scope, organizations should consider both traditional strategic criteria for a viable network and at least five additional criteria: network essentiality and PHM care continuum, network adequacy, service distribution right-sizing, network growth strategy, and organizational agility.

  8. The Introduction of Key Skills in Schools: Core or Casualty?

    Science.gov (United States)

    Glover, Derek; Gleeson, Denis; Johnson, Mike; Spencer, Pat; Watson, Ray

    2000-01-01

    Study of the introduction of generic Key Skills in two local education authorities in Britain found limited implementation. Results suggested the need for strategic district- and school-level management, clear aims and objectives, ownership by school staff, and cross-curricular application. (SK)

  9. Resilience Analysis of Key Update Strategies for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Severe resource limitations in certain types of networks lead to various open issues in security. Since such networks usually operate in unattended or hostile environments, revoking the cryptographic keys and establishing (also distributing) new keys – which we refer to as key update – is a criti...

  10. Identifying phenomenal consciousness.

    Science.gov (United States)

    Schier, Elizabeth

    2009-03-01

    This paper examines the possibility of finding evidence that phenomenal consciousness is independent of access. The suggestion reviewed is that we should look for isomorphisms between phenomenal and neural activation spaces. It is argued that the fact that phenomenal spaces are mapped via verbal report is no problem for this methodology. The fact that activation and phenomenal space are mapped via different means does not mean that they cannot be identified. The paper finishes by examining how data addressing this theoretical question could be obtained.

  11. Quantum key distribution and cryptography

    International Nuclear Information System (INIS)

    Alleaume, R.

    2005-01-01

    Full text: Originally proposed by classical cryptographers, the ideas behind Quantum Key Distribution (QKD) have attracted considerable interest among the quantum optics community, which has significantly helped bring these ideas to reality. Experimental realizations have quickly evolved from early lab demonstrations to QKD systems that are now deployed in real conditions and targeting commercial applications. Although QKD can be theoretically proven to rely on 'unconditional security proofs' and should thus be able to provide security levels unachievable through computationally-based cryptographic techniques, the debate on the cryptographic applications of QKD remains somehow controversial. It seems that a consensus on that matter cannot be reached without a careful analysis of assumptions and definitions related to security models used in classical or in quantum cryptography. In this talk, we will try to present a comprehensive synthesis on this topic. We have initiated this work as a contribution to the European IP SECOQC project, confronting views and knowledge among experimental and theoretical quantum physicists, as well as classical cryptographers. (author)

  12. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  13. Fundamental limits of measurement in telecommunications: Experimental and modeling studies in a test optical network on proposal for the reform of telecommunication quantitations

    International Nuclear Information System (INIS)

    Egan, James; McMillan, Normal; Denieffe, David

    2011-01-01

    Proposals for a review of the limits of measurement for telecommunications are made. The measures are based on adapting work from the area of chemical metrology for the field of telecommunications. Currie has introduced recommendations for defining the limits of measurement in chemical metrology and has identified three key fundamental limits of measurement. These are the critical level, the detection limit and the determination limit. Measurements on an optical system are used to illustrate the utility of these measures and discussion is given into the advantages of using these fundamental quantitations over existing methods.

  14. Fundamental limits of measurement in telecommunications: Experimental and modeling studies in a test optical network on proposal for the reform of telecommunication quantitations

    Energy Technology Data Exchange (ETDEWEB)

    Egan, James; McMillan, Normal; Denieffe, David, E-mail: eganj@itcarlow.ie [IT Carlow (Ireland)

    2011-08-17

    Proposals for a review of the limits of measurement for telecommunications are made. The measures are based on adapting work from the area of chemical metrology for the field of telecommunications. Currie has introduced recommendations for defining the limits of measurement in chemical metrology and has identified three key fundamental limits of measurement. These are the critical level, the detection limit and the determination limit. Measurements on an optical system are used to illustrate the utility of these measures and discussion is given into the advantages of using these fundamental quantitations over existing methods.

  15. Measurement errors in voice-key naming latency for Hiragana.

    Science.gov (United States)

    Yamada, Jun; Tamaoka, Katsuo

    2003-12-01

    This study makes explicit the limitations and possibilities of voice-key naming latency research on single hiragana symbols (a Japanese syllabic script) by examining three sets of voice-key naming data against Sakuma, Fushimi, and Tatsumi's 1997 speech-analyzer voice-waveform data. Analysis showed that voice-key measurement errors can be substantial in standard procedures as they may conceal the true effects of significant variables involved in hiragana-naming behavior. While one can avoid voice-key measurement errors to some extent by applying Sakuma, et al.'s deltas and by excluding initial phonemes which induce measurement errors, such errors may be ignored when test items are words and other higher-level linguistic materials.

  16. Limits on fundamental limits to computation.

    Science.gov (United States)

    Markov, Igor L

    2014-08-14

    An indispensable part of our personal and working lives, computing has also become essential to industries and governments. Steady improvements in computer hardware have been supported by periodic doubling of transistor densities in integrated circuits over the past fifty years. Such Moore scaling now requires ever-increasing efforts, stimulating research in alternative hardware and stirring controversy. To help evaluate emerging technologies and increase our understanding of integrated-circuit scaling, here I review fundamental limits to computation in the areas of manufacturing, energy, physical space, design and verification effort, and algorithms. To outline what is achievable in principle and in practice, I recapitulate how some limits were circumvented, and compare loose and tight limits. Engineering difficulties encountered by emerging technologies may indicate yet unknown limits.

  17. KEY TOPICS IN SPORTS MEDICINE

    Directory of Open Access Journals (Sweden)

    Amir Ali Narvani

    2006-12-01

    Full Text Available Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1 Sports injuries, rehabilitation and injury prevention, 2 Exercise physiology, fitness testing and training, 3 Drugs in sport, 4 Exercise and health promotion, 5 Sport and exercise for special and clinical populations, 6 The psychology of performance and injury. PURPOSE The Key Topics format provides extensive, concise information in an accessible, easy-to-follow manner. AUDIENCE The book is targeted the students and specialists in sports medicine and rehabilitation, athletic training, physiotherapy and orthopaedic surgery. The editors are authorities in their respective fields and this handbook depends on their extensive experience and knowledge accumulated over the years. FEATURES The book contains the information for clinical guidance, rapid access to concise details and facts. It is composed of 99 topics which present the information in an order that is considered logical and progressive as in most texts. Chapter headings are: 1. Functional Anatomy, 2. Training Principles / Development of Strength and Power, 3. Biomechanical Principles, 4. Biomechanical Analysis, 5. Physiology of Training, 6. Monitoring of Training Progress, 7. Nutrition, 8. Hot and Cold Climates, 9. Altitude, 10. Sport and Travelling, 11. Principles of Sport Injury Diagnosis, 12. Principles of Sport and Soft Tissue Management, 13. Principles of Physical Therapy and Rehabilitation, 14. Principles of Sport Injury Prevention, 15. Sports Psychology, 16. Team Sports, 17. Psychological Aspects of Injury in Sport, 18. Injury Repair Process, 19. Basic Biomechanics of Tissue Injury, 20. Plain Film Radiography in Sport, 21. Nuclear Medicine, 22. Diagnostic Ultrasound, 23. MRI Scan, 24. Other Imaging, 5. Head Injury, 26. Eye

  18. Key issues in transplant tourism.

    Science.gov (United States)

    Akoh, Jacob A

    2012-02-24

    Access to organ transplantation depends on national circumstances, and is partly determined by the cost of health care, availability of transplant services, the level of technical capacity and the availability of organs. Commercial transplantation is estimated to account for 5%-10% (3500-7000) of kidney transplants performed annually throughout the world. This review is to determine the state and outcome of renal transplantation associated with transplant tourism (TT) and the key challenges with such transplantation. The stakeholders of commercial transplantation include: patients on the waiting lists in developed countries or not on any list in developing countries; dialysis funding bodies; middlemen, hosting transplant centres; organ-exporting countries; and organ vendors. TT and commercial kidney transplants are associated with a high incidence of surgical complications, acute rejection and invasive infection which cause major morbidity and mortality. There are ethical and medical concerns regarding the management of recipients of organs from vendors. The growing demand for transplantation, the perceived failure of altruistic donation in providing enough organs has led to calls for a legalised market in organ procurement or regulated trial in incentives for donation. Developing transplant services worldwide has many benefits - improving results of transplantation as they would be performed legally, increasing the donor pool and making TT unnecessary. Meanwhile there is a need to re-examine intrinsic attitudes to TT bearing in mind the cultural and economic realities of globalisation. Perhaps the World Health Organization in conjunction with The Transplantation Society would set up a working party of stakeholders to study this matter in greater detail and make recommendations.

  19. Small private key MQPKS on an embedded microprocessor.

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  20. Small Private Key MQPKS on an Embedded Microprocessor

    Directory of Open Access Journals (Sweden)

    Hwajeong Seo

    2014-03-01

    Full Text Available Multivariate quadratic (MQ cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011, a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  1. Small Private Key PKS on an Embedded Microprocessor

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  2. List identifies threatened ecosystems

    Science.gov (United States)

    Showstack, Randy

    2012-09-01

    The International Union for Conservation of Nature (IUCN) announced on 9 September that it will develop a new Red List of Ecosystems that will identify which ecosystems are vulnerable or endangered. The list, which is modeled on the group's Red List of Threatened Species™, could help to guide conservation activities and influence policy processes such as the Convention on Biological Diversity, according to the group. “We will assess the status of marine, terrestrial, freshwater, and subterranean ecosystems at local, regional, and global levels,” stated Jon Paul Rodriguez, leader of IUCN's Ecosystems Red List Thematic Group. “The assessment can then form the basis for concerted implementation action so that we can manage them sustainably if their risk of collapse is low or restore them if they are threatened and then monitor their recovery.”

  3. Global Microbial Identifier

    DEFF Research Database (Denmark)

    Wielinga, Peter; Hendriksen, Rene S.; Aarestrup, Frank Møller

    2017-01-01

    ) will likely also enable a much better understanding of the pathogenesis of the infection and the molecular basis of the host response to infection. But the full potential of these advances will only transpire if the data in this area become transferable and thereby comparable, preferably in open-source...... of microorganisms, for the identification of relevant genes and for the comparison of genomes to detect outbreaks and emerging pathogens. To harness the full potential of WGS, a shared global database of genomes linked to relevant metadata and the necessary software tools needs to be generated, hence the global...... microbial identifier (GMI) initiative. This tool will ideally be used in amongst others in the diagnosis of infectious diseases in humans and animals, in the identification of microorganisms in food and environment, and to track and trace microbial agents in all arenas globally. This will require...

  4. EZID: Long term identifiers made easy (Invited)

    Science.gov (United States)

    Starr, J.

    2013-12-01

    Scholarly research is producing ever increasing amounts of digital research data, and this data should be managed throughout the research life cycle both as part of good scientific practice, but also to comply with funder mandates, such as the 2013 OSTP Public Access Memo (http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp_public_access_memo_2013.pdf). By assigning unique and persistent identifiers to data objects, data managers can gain control and flexibility over what can be a daunting task. This is due to the fact that the objects can be moved to new locations without disruption to links, as long as the identifier target is maintained. EZID is a tool that makes assigning and maintaining unique, persistent identifiers easy. It was designed and built by California Digital Library (CDL) and has both a user interface and a RESTful API. EZID currently offers services for two globally unique, persistent identifier schemes: Digital Object Identifiers (DOIs) and Archival Resource Keys (ARKs). DOIs are identifiers originating from the publishing world and are in widespread use for journal articles. CDL is able to offer DOIs because of being a founding member of DataCite (http://www.datacite.org/), an international consortium established to provide easier access to scientific research data on the Internet. ARKs are identifiers originating from the library, archive and museum community. Like DOIs, they become persistent when the objects and identifier forwarding information is maintained. DOIs and ARKs have a key role in data management and, therefore, in data management plans. DOIs are the recommended identifier for use in data citation, and ARKs provide the maximum flexibility needed for data documentation and management throughout the early phases of a project. The two identifier schemes are able to be used together, and EZID is made to work with both. EZID clients, coming from education, research, government, and the private sector, are utilizing the

  5. Key acceptability attributes of orodispersible films.

    Science.gov (United States)

    Scarpa, Mariagiovanna; Paudel, Amrit; Kloprogge, Frank; Hsiao, Wen Kai; Bresciani, Massimo; Gaisford, Simon; Orlu, Mine

    2018-04-01

    The features rendering orodispersible films (ODFs) patient-centric formulations are widely discussed in the scientific literature. However there is a lack of research studies exploring ODF characteristics with a potential impact on end-user acceptability. The aim of this study was to identify the key ODF characteristics affecting end-user acceptability by developing in vitro test methods for the prediction of ODFs acceptability and correlate these formulation characteristics with the data obtained from a human panel study. Four drug-free single-polymer films were prepared by solvent casting. Solutions of poly(vinyl) alcohol (PVOH) 39 KDa (P1), PVOH 197 KDa (P2), carboxymethylcellulose (CMC) 395 KDa (C1), and CMC 725 KDa (C2) were prepared. Texture analysis and Dynamic Mechanical Analysis (DMA) were used to assess film tack. Petri dish and drop methods were used to assess disintegration time. A human panel of 24 healthy young adults was employed to identify end-user acceptability criteria of the four study film samples. Texture analysis data of ODF tack were not found to be in agreement with the in vivo perceived stickiness in the mouth. However, measurement of the area under the adhesive force curve obtained by DMA correlated with in vivo perceived stickiness data for all samples. The disintegration times obtained by drop method were more comparable to human panel data than the petri dish method. Hence DMA and drop methods proved to be promising methodologies for the prediction of the end-user acceptability. The type and molecular weight of the film-forming polymer had a strong influence on stickiness perception, whereas only polymeric molecular weight influenced perceived disintegration time. The human panel study showed that Participant Reported Outcomes (PROs) for the perceived stickiness in the mouth and disintegration time of test films received significantly different scores between samples, and thus were identified as the key attributes with the

  6. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  7. Strategies to design clinical studies to identify predictive biomarkers in cancer research.

    Science.gov (United States)

    Perez-Gracia, Jose Luis; Sanmamed, Miguel F; Bosch, Ana; Patiño-Garcia, Ana; Schalper, Kurt A; Segura, Victor; Bellmunt, Joaquim; Tabernero, Josep; Sweeney, Christopher J; Choueiri, Toni K; Martín, Miguel; Fusco, Juan Pablo; Rodriguez-Ruiz, Maria Esperanza; Calvo, Alfonso; Prior, Celia; Paz-Ares, Luis; Pio, Ruben; Gonzalez-Billalabeitia, Enrique; Gonzalez Hernandez, Alvaro; Páez, David; Piulats, Jose María; Gurpide, Alfonso; Andueza, Mapi; de Velasco, Guillermo; Pazo, Roberto; Grande, Enrique; Nicolas, Pilar; Abad-Santos, Francisco; Garcia-Donas, Jesus; Castellano, Daniel; Pajares, María J; Suarez, Cristina; Colomer, Ramon; Montuenga, Luis M; Melero, Ignacio

    2017-02-01

    The discovery of reliable biomarkers to predict efficacy and toxicity of anticancer drugs remains one of the key challenges in cancer research. Despite its relevance, no efficient study designs to identify promising candidate biomarkers have been established. This has led to the proliferation of a myriad of exploratory studies using dissimilar strategies, most of which fail to identify any promising targets and are seldom validated. The lack of a proper methodology also determines that many anti-cancer drugs are developed below their potential, due to failure to identify predictive biomarkers. While some drugs will be systematically administered to many patients who will not benefit from them, leading to unnecessary toxicities and costs, others will never reach registration due to our inability to identify the specific patient population in which they are active. Despite these drawbacks, a limited number of outstanding predictive biomarkers have been successfully identified and validated, and have changed the standard practice of oncology. In this manuscript, a multidisciplinary panel reviews how those key biomarkers were identified and, based on those experiences, proposes a methodological framework-the DESIGN guidelines-to standardize the clinical design of biomarker identification studies and to develop future research in this pivotal field. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  8. Radiograph identifying means

    International Nuclear Information System (INIS)

    Sheldon, A.D.

    1983-01-01

    A flexible character-indentable plastics embossing tape is backed by and bonded to a lead strip, not more than 0.025 inches thick, to form a tape suitable for identifying radiographs. The lead strip is itself backed by a relatively thin and flimsy plastics or fabric strip which, when removed, allows the lead plastic tape to be pressure-bonded to the surface to be radiographed. A conventional tape-embossing gun is used to indent the desired characters in succession into the lead-backed tape, without necessarily severing the lead; and then the backing strip is peeled away to expose the layer of adhesive which pressure-bonds the indented tape to the object to be radiographed. X-rays incident on the embossed tape will cause the raised characters to show up dark on the subsequently-developed film, whilst the raised side areas will show up white. Each character will thus stand out on the developed film. (author)

  9. Nutrition and healthy ageing: the key ingredients.

    Science.gov (United States)

    Kiefte-de Jong, Jessica C; Mathers, John C; Franco, Oscar H

    2014-05-01

    Healthy longevity is a tangible possibility for many individuals and populations, with nutritional and other lifestyle factors playing a key role in modulating the likelihood of healthy ageing. Nevertheless, studies of effects of nutrients or single foods on ageing often show inconsistent results and ignore the overall framework of dietary habits. Therefore, the use of dietary patterns (e.g. a Mediterranean dietary pattern) and the specific dietary recommendations (e.g. dietary approaches to stop hypertension, Polymeal and the American Healthy Eating Index) are becoming more widespread in promoting lifelong health. A posteriori defined dietary patterns are described frequently in relation to age-related diseases but their generalisability is often a challenge since these are developed specifically for the population under study. Conversely, the dietary guidelines are often developed based on prevention of disease or nutrient deficiency, but often less attention is paid to how well these dietary guidelines promote health outcomes. In the present paper, we provide an overview of the state of the art of dietary patterns and dietary recommendations in relation to life expectancy and the risk of age-related disorders (with emphasis on cardiometabolic diseases and cognitive outcomes). According to both a posteriori and a priori dietary patterns, some key 'ingredients' can be identified that are associated consistently with longevity and better cardiometabolic and cognitive health. These include high intake of fruit, vegetables, fish, (whole) grains and legumes/pulses and potatoes, whereas dietary patterns rich in red meat and sugar-rich foods have been associated with an increased risk of mortality and cardiometabolic outcomes.

  10. Lifelong Learning Key Competence Levels of Graduate Students

    Science.gov (United States)

    Adabas, Abdurrahman; Kaygin, Hüseyin

    2016-01-01

    The European Union defines lifelong learning as all activities aimed at improving an individual's knowledge, skills and competences individually, socially or vocationally throughout his/her life. In 2007, eight key competences necessary for lifelong learning were identified by the European Union Education and Culture Commission. These competences…

  11. Field Keys to Common Hawaiian Marine Animals and Plants.

    Science.gov (United States)

    Hawaii State Dept. of Education, Honolulu. Office of Instructional Services.

    Presented are keys for identifying common Hawaiian marine algae, beach plants, reef corals, sea urchins, tidepool fishes, and sea cucumbers. Nearly all species considered can be distinguished by characteristics visible to the naked eye. Line drawings illustrate most plants and animals included, and a list of suggested readings follows each…

  12. Identification of Key Indicators for Sustainable Construction Materials

    Directory of Open Access Journals (Sweden)

    Humphrey Danso

    2018-01-01

    Full Text Available Studies on sustainable construction materials are on the rise with their environmental, social, and economic benefits. This study identifies the key indicators for measuring sustainable construction materials. The design used for the study was that of a survey which relied on a questionnaire with five-point Likert scale to generate data for the analysis. For this purpose, 25 indicators from the three dimensions (environmental, social, and economic identified from the literature were presented to the respondents in a structured questionnaire, and responses were collected and analysed using SPSS. The study identified three key environmental indicators for measuring sustainable construction materials, and these indicators are human toxicity, climate change, and solid waste. Furthermore, adaptability, thermal comfort, local resources, and housing for all were identified as the four key social indicators for sustainable construction materials. In addition, maintenance cost, operational cost, initial cost, long-term savings, and life span were found to be the five key economic indicators for measuring sustainable construction materials. The study therefore suggests that these twelve indicators should be considered in future studies that seek to measure sustainable construction materials.

  13. The Key Pieces of the Career Survival and Success Puzzle.

    Science.gov (United States)

    Simonetti, Jack L.

    1999-01-01

    Analysis of career-success factors identified by 5,000 managers yielded 10 key pieces: excellent performance record, communication skills, interpersonal skills, personality, skill currency, significant work experiences, power, ability to withstand pressure, ability to make difficult decisions, and having a mentor. (SK)

  14. Key enabling technologies (Kets) observatory. Second report December 2015

    OpenAIRE

    Velde, Els van de; Pieterjan, Debergh; Wydra, Sven; Som, Oliver; Heide, Marcel de

    2015-01-01

    Key Enabling Technologies (KETs) provide the basis for innovation in a wide range of products and processes across all industrial sectors (emerging and traditional) and are essential to solve Europe’s major societal challenges. Six KETs have been identified as important for Europe’s future competitiveness: Advanced Manufacturing Technology, Advanced Materials, Nanotechnology, Micro- and Nanoelectronics, Industrial Biotechnology, and Photonics.

  15. Positioning and deciding : key factors for talent development in soccer

    NARCIS (Netherlands)

    Kannekens, R.; Elferink-Gemser, M. T.; Visscher, C.

    2011-01-01

    Talent identification and development implicate recognizing youth players who will be successful in the future and guiding them to the top. A major determinant of this success is tactical skills. To identify possible key factors that help in predicting success over time, this study assesses the

  16. Key Elements of a Successful Drive toward Marketing Strategy Making

    Science.gov (United States)

    Cann, Cynthia W.; George, Marie A.

    2003-01-01

    A conceptual model is presented that depicts the relationship between an internal marketing function and an organization's readiness to learn. Learning and marketing orientations are identified as components to marketing strategy making. Key organizational functions, including communication and decision-making, are utilized in a framework for…

  17. Quantum key distribution network for multiple applications

    Science.gov (United States)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  18. Electronic Nicotine Delivery Systems Key Facts Infographic

    Data.gov (United States)

    U.S. Department of Health & Human Services — Explore the Electronic Nicotine Delivery Systems Key Facts Infographic which outlines key facts related to electronic nicotine delivery systems (ENDS), including...

  19. Key Nuclear Verification Priorities: Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  20. Key Nuclear Verification Priorities - Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  1. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  2. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  3. An approach to identify issues affecting ERP implementation in Indian SMEs

    Directory of Open Access Journals (Sweden)

    Rana Basu

    2012-06-01

    Full Text Available Purpose: The purpose of this paper is to present the findings of a study which is based on the results of a comprehensive compilation of literature and subsequent analysis of ERP implementation success issues in context to Indian Small and Medium scale Enterprises (SME’s. This paper attempts to explore the existing literature and highlight those issues on ERP implementation and further to this the researchers applied TOPSIS (Technique for order preference by similarity to ideal solution method to prioritize issues affecting successful implementation of ERP. Design/methodology/approach: Based on the literature review certain issues leading to successful ERP implementation have been identified and to identify key issues Pareto Analysis (80-20 Rule have been applied. Further to extraction of key issues a survey based on TOPSIS was carried out in Indian small and medium scale enterprises. Findings: Based on review of literature 25 issues have been identified and further Pareto analysis has been done to extract key issues which is further prioritized by applying Topsis method. Research limitations/implications: Beside those identified issues there may be other issues that need to be explored. There is scope to enhance this study by taking into consideration different type of industries and by extending number of respondents. Practical implications: By identifying key issues for SMEs, managers can better prioritize issues to make implementation process smooth without disruption. ERP vendors can take inputs from this study to change their implementation approach while targeting small scale enterprises. Originality/value: There is no published literature available which followed a similar approach in identification of the critical issues affecting ERP in small and mid-sized companies in India or in any developing economy.

  4. Simple security proof of quantum key distribution based on complementarity

    International Nuclear Information System (INIS)

    Koashi, M

    2009-01-01

    We present an approach to the unconditional security of quantum key distribution protocols based on a complementarity argument. The approach is applicable to, but not limited to, every case that has been treated via the argument by Shor and Preskill based on entanglement distillation, with a benefit of decoupling of the error correction from the privacy amplification. It can also treat cases with uncharacterized apparatuses. We derive a secure key rate for the Bennett-Brassard-1984 protocol with an arbitrary source characterized only by a single parameter representing the basis dependence.

  5. A key design to prolong lifetime of wireless sensor network

    International Nuclear Information System (INIS)

    Qiu, Bo; Chen, XiQiu; Wu, Qi

    2016-01-01

    In order to solve the contradiction between the connectivity of the wireless sensor network and the key storage consumption, under the premise of reducing network storage consumption, the key pre-distribution management scheme with higher connectivity rate is proposed using the hexagonal network deployment information, which adopts the idea of the matrix space for the square deployment information strategy to reduce the burden of the network storage. Ability against the capture attack is improved obviously. The results show that contradiction between the network connectivity rate and the energy consumption has a better solution, and the proposed algorithm is suitable for the wireless sensor networks of energy limited.

  6. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  7. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  8. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  9. Pushing the limits of NAA. Accuracy, uncertainty and detection limits

    International Nuclear Information System (INIS)

    Greenberg, R.R.

    2008-01-01

    This paper describes some highlights from the author's efforts to improve neutron activation analysis (NAA) detection limits through development and optimization of radiochemical separations, as well as to improve the overall accuracy of NAA measurements by identifying, quantifying and reducing measurement biases and uncertainties. Efforts to demonstrate the metrological basis of NAA, and to establish it as a 'Primary Method of Measurement' will be discussed. (author)

  10. Preliminary disposal limits, plume interaction factors, and final disposal limits

    Energy Technology Data Exchange (ETDEWEB)

    Flach, G. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2018-01-11

    In the 2008 E-Area Performance Assessment (PA), each final disposal limit was constructed as the product of a preliminary disposal limit and a plume interaction factor. The following mathematical development demonstrates that performance objectives are generally expected to be satisfied with high confidence under practical PA scenarios using this method. However, radionuclides that experience significant decay between a disposal unit and the 100-meter boundary, such as H-3 and Sr-90, can challenge performance objectives, depending on the disposed-of waste composition, facility geometry, and the significance of the plume interaction factor. Pros and cons of analyzing single disposal units or multiple disposal units as a group in the preliminary disposal limits analysis are also identified.

  11. Robust test limits

    NARCIS (Netherlands)

    Albers, Willem/Wim; Kallenberg, W.C.M.; Otten, G.D.

    1997-01-01

    Because of inaccuracies of the measurement process inspection of manufactured parts requires test limits which are more strict than the given specification limits. Test limits derived under the assumption of normality for product characteristics turn out to violate the prescribed bound on the

  12. Climate hotspots: key vulnerable regions, climate change and limits to warming

    NARCIS (Netherlands)

    Hare, W.; Cramer, W.; Schaeffer, M.; Battaglini, A.; Jaeger, C.

    2011-01-01

    Defining and operationalizing Article 2 of the UNFCCC remains a challenge. The question of what is dangerous climate change is not a purely scientific one, as danger necessarily has a subjective dimension and its definition requires judgment and precaution. The papers in this special issue of

  13. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-01-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public

  14. VICKEY: Mining Conditional Keys on Knowledge Bases

    OpenAIRE

    Symeonidou , Danai; Galárraga , Luis; Pernelle , Nathalie; Saïs , Fatiha; Suchanek , Fabian

    2017-01-01

    International audience; A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs of millions of facts. We also show that the conditional keys we mine can improve the quality of entity linking by up to 47 percentage points.

  15. LANSCE beam current limiter

    International Nuclear Information System (INIS)

    Gallegos, F.R.

    1996-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. Active instrumentation, such as the Beam Current Limiter, is a component of the RSS. The current limiter is designed to limit the average current in a beam line below a specific level, thus minimizing the maximum current available for a beam spill accident. The beam current limiter is a self-contained, electrically isolated toroidal beam transformer which continuously monitors beam current. It is designed as fail-safe instrumentation. The design philosophy, hardware design, operation, and limitations of the device are described

  16. Key Performance Indicators Disclosures Through Internet: towards an integrated scoreboard

    Directory of Open Access Journals (Sweden)

    Ilídio Tomás Lopes

    2014-10-01

    Full Text Available Purpose – Information disclosure is driven by multiple determinants, most of them supported by traditional theories, such as agency theory, contingency theory, and legitemacy theory. This research aims to identify a set of Key Performance Indicators (KPI, disclosed to stakeholders through Internet. It also aims to apply for an integrated performance scorebord, acting it as a dynamic comparative tool, in particular for listed companies which market value is driven by investors expectations and needs.Design/methodology/approach – Based on 47 listed companies from the Portuguese Stock Index regulated market, and through an interpretive content analysis, research was driven towards the identification of KPI that were explicitly reported to stakeholders through structured or unstructured frameworks. This qualitative approach supports the evidences about performance indicators reported by listed companies to stakeholders, in particular to potential stockholders.Findings – Companies disclose a wide variety of key performance indicators, however in most cases included in their periodical management reports. Only a low number of companies disclose those indicators through a visible form in their web sites. Furthermore, KPI disclosed have a generic nature and are usually complemented by theoretical explanations about their evolution and trends. The diversity of indicators disclosed does not permit a comparision between companies and activity sectors. Key performence indicators are still disclosed on a voluntarily basis, remaining, in this scope, multiple agency conflicts and other issues around agency costs. Altough the intensity and categorization in the information disclosure, a standard framework is required in orther to ensure a dynamic comparision between companies or sectors.   Research limitations – The scope of this research is the Portuguese regulated market. Further research can introduce in the sample companies listed in other

  17. Key Biodiversity Areas in the Philippines: Priorities for Conservation

    Directory of Open Access Journals (Sweden)

    R.G.R. Ambal

    2012-08-01

    Full Text Available A process for identifying Key Biodiversity Areas (KBAs for the Philippines was undertaken in two phases. The 128 terrestrial and freshwater KBAs were identified in 2006 and the 123 marine KBAs were identified in 2009. A total of 228 KBAs resulted from the integration of the terrestrial, freshwater and marine KBAs. These KBAs represent the known habitat of 855 globally important species of plants, corals, molluscs, elasmobranchs, fishes, amphibians, reptiles, birds and mammals in the country. Inclusion of these KBAs in the country’s protected area system will be a significant step towards ensuring the conservation of the full scope of the country’s natural heritage.

  18. Derived limits for surface contamination

    CERN Document Server

    Wrixon, A D; Linsley, G S; White, D F

    1979-01-01

    Derived limits (DLs) for surface contamination were first established for use in the nuclear energy industry where a wide variety of radionuclides is encountered. They were later used in factories, hospitals, and universities, where the radionuclides used are normally fewer in number, either known or readily identifiable, and often of low toxicity. In these situations the current limits are frequently over-restrictive. This report describes a reassessment of the values in the light of more recent information on the possible pathways of exposure and the dose equivalent limits given in ICRP Publication 26. The reassessment is prompted also by the introduction of SI units. The results of the reassessment are used to produce a classification of DLs for all radionuclides for active and inactive area surfaces and for skin.

  19. Reverse Logistics: RFID the key to optimality

    Directory of Open Access Journals (Sweden)

    Rezwan Asif

    2011-07-01

    Full Text Available Purpose: The purpose of this paper is to find ways to reduce uncertainties in Reverse logistic supply chain (RLSC through the use of Radio-frequency identification (RFID technology.Design/methodology/approach: This paper reviews literature and builds model to relate RFID with uncertainties in order to optimize Reverse Logistics. Findings: RFID is really efficient to determine and detect quantity, variety and cycle times of returns; however it's not as convenient to determine quality of the returns. The collected information from RFID can be used to standardize the RLSC.Research limitations: Though it’s several and unique advantages some limitations of RFID have been identified in quality and processing sequence, collecting points and different standards, and in global usage.Originality/value: Previous studies in the area of Reverse Logistics and RFID don’t cover all impacts of this technology on RLSC. This review paper has investigated these impacts and offers a model for optimizing the Reverse Logistics Supply Chain.

  20. Characterization of available light for seagrass and patch reef productivity in Sugarloaf Key, Lower Florida Keys

    Science.gov (United States)

    Toro-Farmer, Gerardo; Muller-Karger, Frank E.; Vega-Rodriguez, Maria; Melo, Nelson; Yates, Kimberly K.; Johns, Elizabeth; Cerdeira-Estrada, Sergio; Herwitz, Stan R.

    2016-01-01

    Light availability is an important factor driving primary productivity in benthic ecosystems, but in situ and remote sensing measurements of light quality are limited for coral reefs and seagrass beds. We evaluated the productivity responses of a patch reef and a seagrass site in the Lower Florida Keys to ambient light availability and spectral quality. In situ optical properties were characterized utilizing moored and water column bio-optical and hydrographic measurements. Net ecosystem productivity (NEP) was also estimated for these study sites using benthic productivity chambers. Our results show higher spectral light attenuation and absorption, and lower irradiance during low tide in the patch reef, tracking the influx of materials from shallower coastal areas. In contrast, the intrusion of clearer surface Atlantic Ocean water caused lower values of spectral attenuation and absorption, and higher irradiance in the patch reef during high tide. Storms during the studied period, with winds >10 m·s−1, caused higher spectral attenuation values. A spatial gradient of NEP was observed, from high productivity in the shallow seagrass area, to lower productivity in deeper patch reefs. The highest daytime NEP was observed in the seagrass, with values of almost 0.4 g·O2·m−2·h−1. Productivity at the patch reef area was lower in May than during October 2012 (mean = 0.137 and 0.177 g·O2·m−2·h−1, respectively). Higher photosynthetic active radiation (PAR) levels measured above water and lower light attenuation in the red region of the visible spectrum (~666 to ~699 nm) had a positive correlation with NEP. Our results indicate that changes in light availability and quality by suspended or resuspended particles limit benthic productivity in the Florida Keys.

  1. Characterization of Available Light for Seagrass and Patch Reef Productivity in Sugarloaf Key, Lower Florida Keys

    Directory of Open Access Journals (Sweden)

    Gerardo Toro-Farmer

    2016-01-01

    Full Text Available Light availability is an important factor driving primary productivity in benthic ecosystems, but in situ and remote sensing measurements of light quality are limited for coral reefs and seagrass beds. We evaluated the productivity responses of a patch reef and a seagrass site in the Lower Florida Keys to ambient light availability and spectral quality. In situ optical properties were characterized utilizing moored and water column bio-optical and hydrographic measurements. Net ecosystem productivity (NEP was also estimated for these study sites using benthic productivity chambers. Our results show higher spectral light attenuation and absorption, and lower irradiance during low tide in the patch reef, tracking the influx of materials from shallower coastal areas. In contrast, the intrusion of clearer surface Atlantic Ocean water caused lower values of spectral attenuation and absorption, and higher irradiance in the patch reef during high tide. Storms during the studied period, with winds >10 m·s−1, caused higher spectral attenuation values. A spatial gradient of NEP was observed, from high productivity in the shallow seagrass area, to lower productivity in deeper patch reefs. The highest daytime NEP was observed in the seagrass, with values of almost 0.4 g·O2·m−2·h−1. Productivity at the patch reef area was lower in May than during October 2012 (mean = 0.137 and 0.177 g·O2·m−2·h−1, respectively. Higher photosynthetic active radiation (PAR levels measured above water and lower light attenuation in the red region of the visible spectrum (~666 to ~699 nm had a positive correlation with NEP. Our results indicate that changes in light availability and quality by suspended or resuspended particles limit benthic productivity in the Florida Keys.

  2. Key personality traits of sales managers.

    Science.gov (United States)

    Lounsbury, John W; Foster, Nancy A; Levy, Jacob J; Gibson, Lucy W

    2014-01-01

    Sales managers are crucial for producing positive sales outcomes for companies. However, there has been a relative dearth of scholarly investigations into the personal attributes of sales managers. Such information could prove important in the recruitment, selection, training needs identification, career planning, counseling, and development of sales managers. Drawing on Holland's vocational theory, we sought to identify key personality traits that distinguish sales managers from other occupations and are related to their career satisfaction. The main sample was comprised of a total of 978 sales managers employed in a large number of companies across the United States (along with a comparison sample drawn from 79,512 individuals from other professional occupations). Participants completed an online version of Resource Associates' Personal Style Inventory as well a measure of career satisfaction. Our sample of 978 sales managers had higher levels of Assertiveness, Customer Service Orientation, Extraversion, Image Management, Optimism, and Visionary Style; and lower levels of Conscientiousness, Agreeableness, Intrinsic Motivation, Openness, and Tough-Mindedness than a sample of 79,512 individuals in a variety of other occupations. Nine of these traits were significantly correlated with sales managers' career satisfaction. Based on the results, a psychological profile of sales managers was presented as were implications for their recruitment, selection, training, development, and mentoring.

  3. KEY PERFORMING FACTORS OF LEADING ROMANIAN COMPANIES

    Directory of Open Access Journals (Sweden)

    BURJA CAMELIA

    2014-08-01

    Full Text Available The analysis of financial economic ratios provides managers and external partners feedback on the results obtained from operational activities and the associated performance and risks. This paper studies the functional dependence of the companies’ success (on performance over internal financial management elements. The research was carried out for the most traded non-financial securities Bucharest listed companies and covers the period 2011- 2013. To carry out its purpose it analyzed the interdependence between the key financial ratios, studying the impact of liquidity ratios, solvency and efficiency on profitability. The study provides empirical evidences to identify factors that have ensured the performance of companies and their ranking in the segment of the most traded companies in Romania. Results suggest the view that the source of company success on the capital market lies in the positive signals sent to investors regarding profitability and the low risk of solvency. This study gives additional information for managerial decision-making in order to create more value and a better positioning of the companies in the market

  4. Identifying predictors, moderators, and mediators of antidepressant response in major depressive disorder: neuroimaging approaches.

    Science.gov (United States)

    Phillips, Mary L; Chase, Henry W; Sheline, Yvette I; Etkin, Amit; Almeida, Jorge R C; Deckersbach, Thilo; Trivedi, Madhukar H

    2015-02-01

    Despite significant advances in neuroscience and treatment development, no widely accepted biomarkers are available to inform diagnostics or identify preferred treatments for individuals with major depressive disorder. In this critical review, the authors examine the extent to which multimodal neuroimaging techniques can identify biomarkers reflecting key pathophysiologic processes in depression and whether such biomarkers may act as predictors, moderators, and mediators of treatment response that might facilitate development of personalized treatments based on a better understanding of these processes. The authors first highlight the most consistent findings from neuroimaging studies using different techniques in depression, including structural and functional abnormalities in two parallel neural circuits: serotonergically modulated implicit emotion regulation circuitry, centered on the amygdala and different regions in the medial prefrontal cortex; and dopaminergically modulated reward neural circuitry, centered on the ventral striatum and medial prefrontal cortex. They then describe key findings from the relatively small number of studies indicating that specific measures of regional function and, to a lesser extent, structure in these neural circuits predict treatment response in depression. Limitations of existing studies include small sample sizes, use of only one neuroimaging modality, and a focus on identifying predictors rather than moderators and mediators of differential treatment response. By addressing these limitations and, most importantly, capitalizing on the benefits of multimodal neuroimaging, future studies can yield moderators and mediators of treatment response in depression to facilitate significant improvements in shorter- and longer-term clinical and functional outcomes.

  5. Identifying Predictors, Moderators, and Mediators of Antidepressant Response in Major Depressive Disorder: Neuroimaging Approaches

    Science.gov (United States)

    Phillips, Mary L.; Chase, Henry W.; Sheline, Yvette I.; Etkin, Amit; Almeida, Jorge R.C.; Deckersbach, Thilo; Trivedi, Madhukar H.

    2015-01-01

    Objective Despite significant advances in neuroscience and treatment development, no widely accepted biomarkers are available to inform diagnostics or identify preferred treatments for individuals with major depressive disorder. Method In this critical review, the authors examine the extent to which multimodal neuroimaging techniques can identify biomarkers reflecting key pathophysiologic processes in depression and whether such biomarkers may act as predictors, moderators, and mediators of treatment response that might facilitate development of personalized treatments based on a better understanding of these processes. Results The authors first highlight the most consistent findings from neuroimaging studies using different techniques in depression, including structural and functional abnormalities in two parallel neural circuits: serotonergically modulated implicit emotion regulation circuitry, centered on the amygdala and different regions in the medial prefrontal cortex; and dopaminergically modulated reward neural circuitry, centered on the ventral striatum and medial prefrontal cortex. They then describe key findings from the relatively small number of studies indicating that specific measures of regional function and, to a lesser extent, structure in these neural circuits predict treatment response in depression. Conclusions Limitations of existing studies include small sample sizes, use of only one neuroimaging modality, and a focus on identifying predictors rather than moderators and mediators of differential treatment response. By addressing these limitations and, most importantly, capitalizing on the benefits of multimodal neuroimaging, future studies can yield moderators and mediators of treatment response in depression to facilitate significant improvements in shorter- and longer-term clinical and functional outcomes. PMID:25640931

  6. 7 CFR 1400.204 - Limited partnerships, limited liability partnerships, limited liability companies, corporations...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Limited partnerships, limited liability partnerships..., limited liability partnerships, limited liability companies, corporations, and other similar legal entities. (a) A limited partnership, limited liability partnership, limited liability company, corporation...

  7. Quantum key distribution over multicore fiber based on silicon photonics

    DEFF Research Database (Denmark)

    Ding, Yunhong; Bacco, Davide; Dalgaard, Kjeld

    on quantum physics. In order to exchange secure information between users, quantum key distribution (QKD), a branch of Quantum Communications (QCs), provides good prospects for ultimate security based on the laws of quantum mechanics [2–7]. Most of QKD systems are implemented in a point-to-point link using...... generations, to HD-entanglement distribution. Furthermore, MCFs are expected as a good candidate for overcoming the capacity limit of a current optical communication system, as example the record capacity of 661 Tbits/s was obtained last year with a 30-cores fiber [8]. Proof of concept experiment has already...... requirements in terms of key generation are needed. A solution may be represented by new technologies applied to quantum world. In particular multicore fiber (MCF) open a new scenario for quantum communications, from high-dimensional (HD) spatial entanglement generation, to HD QKD and multi-user key...

  8. GENERALIZED MATRIXES OF GALOIS PROTOCOLS EXCHANGE ENCRYPTION KEYS

    Directory of Open Access Journals (Sweden)

    Anatoly Beletsky

    2016-03-01

    Full Text Available The methods of construction of matrix formation the secret protocols legalized subscribers of public communications networks encryption keys. Based key exchange protocols laid asymmetric cryptography algorithms. The solution involves the calculation of one-way functions and is based on the use of generalized Galois arrays of isomorphism relationship with forming elements, and depending on the selected irreducible polynomial generating matrix. A simple method for constructing generalized Galois matrix by the method of filling the diagonal. In order to eliminate the isomorphism of Galois arrays and their constituent elements, limiting the possibility of building one-way functions, Galois matrix subjected to similarity transformation carried out by means of permutation matrices. The variant of the organization of the algebraic attacks on encryption keys sharing protocols and discusses options for easing the consequences of an attack.

  9. Continuous Variable Quantum Key Distribution Using Polarized Coherent States

    Science.gov (United States)

    Vidiella-Barranco, A.; Borelli, L. F. M.

    We discuss a continuous variables method of quantum key distribution employing strongly polarized coherent states of light. The key encoding is performed using the variables known as Stokes parameters, rather than the field quadratures. Their quantum counterpart, the Stokes operators Ŝi (i=1,2,3), constitute a set of non-commuting operators, being the precision of simultaneous measurements of a pair of them limited by an uncertainty-like relation. Alice transmits a conveniently modulated two-mode coherent state, and Bob randomly measures one of the Stokes parameters of the incoming beam. After performing reconciliation and privacy amplification procedures, it is possible to distill a secret common key. We also consider a non-ideal situation, in which coherent states with thermal noise, instead of pure coherent states, are used for encoding.

  10. Key management issue in SCADA networks: A review

    Directory of Open Access Journals (Sweden)

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  11. Using instructional logs to identify quality in educational settings.

    Science.gov (United States)

    Rowan, Brian; Jacob, Robin; Correnti, Richard

    2009-01-01

    When attempting to identify educational settings that are most effective in improving student achievement, classroom process (that is, the way in which a teacher interacts with his or her students) is a key feature of interest. Unfortunately, high-quality assessment of the student-teacher interaction occurs all too infrequently, despite the critical role that understanding and measuring such processes can play in school improvement. This article discusses the strengths and weaknesses of two common approaches to studying these processes-direct classroom observation and annual surveys of teachers-and then describes the ways in which instructional logs can be used to overcome some of the limitations of these two approaches when gathering data on curriculum content and coverage. Classroom observations are expensive, require extensive training of raters to ensure consistency in the observations, and because of their expense generally cannot be conducted frequently enough to enable the researcher to generalize observational findings to the entire school year or illuminate the patterns of instructional change that occur across the school year. Annual surveys are less expensive but often suffer from self-report bias and the bias that occurs when teachers are asked to retrospectively report on their activities over the course of a single year. Instructional logs offer a valid, reliable, and relatively cost-effective alternative for collecting detailed information about classroom practice and can overcome some of the limitations of both observations and annual surveys.

  12. Defining the anesthesia gap for reproductive health procedures in resource-limited settings.

    Science.gov (United States)

    Anderson, R Eleanor; Ahn, Roy; Nelson, Brett D; Chavez, Jean; de Redon, Emily; Burke, Thomas

    2014-12-01

    In resource-limited settings, severe shortages of anesthetists and anesthesiologists lead to surgical delays that increase maternal and neonatal mortality and morbidity. To more clearly understand the individual components of the anesthesia gap pertaining to reproductive health surgeries and procedures in resource-limited settings. Medline, the Cochrane Library, CINAHL, Embase, and POPLINE were systematically searched for reports published before December 31, 2013. Search terms were related to obstetric surgery, resource-limited settings, and anesthesia. Studies that addressed the use of anesthesia in reproductive procedures in resource-limited settings were included. Reviewers independently evaluated the full text of identified studies, extracted information related to study objectives and conclusions, and identified the anesthesia gap. Overall, 14 publications met the inclusion criteria. A significant lack of infrastructure, equipment and supplies, and trained personnel were identified as key factors responsible for a lack of anesthesia services. A shortage of trained anesthesia providers, equipment, supplies, medications, and infrastructure, along with limitations in transportation in resource-limited settings have produced a wide gap between available anesthesia services and the demand for them for reproductive health surgeries and procedures. Safe, affordable, and scalable solutions to address the anesthesia gap are urgently needed. Copyright © 2014 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  13. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    Science.gov (United States)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2016-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  14. E-Commerce Performance. Shopping Cart Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Mihaela I. MUNTEAN

    2016-01-01

    Full Text Available In an e-commerce performance framework is important to identify the key performance indicators that measure success and together provide the greatest context into the business perfor-mance. Shopping carts are an essential part of ecommerce, a minimal set of key performance indicators being the subject of our debate. The theoretical approach is sustained by a case study, an e-shop implemented using PHP and MySQL, for simulating main business processes within the considered performance framework. Our approach opens a perspective for future research using additional indicators in order to properly evaluate the global performance of any e-shop.

  15. Mapping key antecedents of employee-driven innovations

    DEFF Research Database (Denmark)

    Smith, Pernille; Ulhøi, John Parm; Kesting, Peter

    2012-01-01

    Research on employee-driven innovation (EDI) is still in its infancy, and as yet there is no independent body of literature on the topic. The aim of this paper is to review existing insights into the key antecedents of EDI in other research contexts. In particular, we focus on: leader support......, autonomy, collaboration, and organisational norms of exploration. The main contribution of this paper is to discuss how these key antecedents apply to the specific case of EDI and to identify an agenda for new research....

  16. Limiting Factors for External Reactor Vessel Cooling

    International Nuclear Information System (INIS)

    Cheung, F.B.

    2005-01-01

    The method of external reactor vessel cooling (ERVC) that involves flooding of the reactor cavity during a severe accident has been considered a viable means for in-vessel retention (IVR). For high-power reactors, however, there are some limiting factors that might adversely affect the feasibility of using ERVC as a means for IVR. In this paper, the key limiting factors for ERVC have been identified and critically discussed. These factors include the choking limit for steam venting (CLSV) through the bottleneck of the vessel/insulation structure, the critical heat flux (CHF) for downward-facing boiling on the vessel outer surface, and the two-phase flow instabilities in the natural circulation loop within the flooded cavity. To enhance ERVC, it is necessary to eliminate or relax these limiting factors. Accordingly, methods to enhance ERVC and thus improve margins for IVR have been proposed and demonstrated, using the APR1400 as an example. The strategy is based on using two distinctly different methods to enhance ERVC. One involves the use of an enhanced vessel/insulation design to facilitate steam venting through the bottleneck of the annular channel. The other involves the use of an appropriate vessel coating to promote downward-facing boiling. It is found that the use of an enhanced vessel/insulation design with bottleneck enlargement could greatly facilitate the process of steam venting through the bottleneck region as well as streamline the resulting two-phase motions in the annular channel. By selecting a suitable enhanced vessel/insulation design, not only the CLSV but also the CHF limits could be significantly increased. In addition, the problem associated with two-phase flow instabilities and flow-induced mechanical vibration could be minimized. It is also found that the use of vessel coatings made of microporous metallic layers could greatly facilitate downward-facing boiling on the vessel outer surface. With vessel coatings, the local CHF limits at

  17. JET pump limiter

    International Nuclear Information System (INIS)

    Sonnenberg, K.; Deksnis, E.; Shaw, R.; Reiter, D.

    1988-01-01

    JET plans to install two pump limiter modules which can be used for belt-limiter, inner-wall and X-point discharges and, also, for 1-2s as the main limiter. A design is presented which is compatible with two diagnostic systems, and which allows partial removal of the pump limiter to provide access for remote-handling operations. The high heat-flux components are initially cooled during a pulse. Heat is removed between discharges by radiation and pressure contacts to a water-cooled support structure. The pumping edge will be made of annealed pyrolytic graphite. Exhaust efficiency has been estimated, for a 1-d edge model, using a Monte-Carlo calculation of neutral gas transport. When the pump limiter is operated together with other wall components we expect an efficiency of ≅ 5% (2.5 x 10 21 part/s). As a main limiter the efficiency increases to about 10%. (author)

  18. Continuous Variable Quantum Key Distribution with a Noisy Laser

    DEFF Research Database (Denmark)

    Jacobsen, Christian Scheffmann; Gehring, Tobias; Andersen, Ulrik Lund

    2015-01-01

    Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement...... a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances...

  19. RECOVIR Software for Identifying Viruses

    Science.gov (United States)

    Chakravarty, Sugoto; Fox, George E.; Zhu, Dianhui

    2013-01-01

    Most single-stranded RNA (ssRNA) viruses mutate rapidly to generate a large number of strains with highly divergent capsid sequences. Determining the capsid residues or nucleotides that uniquely characterize these strains is critical in understanding the strain diversity of these viruses. RECOVIR (an acronym for "recognize viruses") software predicts the strains of some ssRNA viruses from their limited sequence data. Novel phylogenetic-tree-based databases of protein or nucleic acid residues that uniquely characterize these virus strains are created. Strains of input virus sequences (partial or complete) are predicted through residue-wise comparisons with the databases. RECOVIR uses unique characterizing residues to identify automatically strains of partial or complete capsid sequences of picorna and caliciviruses, two of the most highly diverse ssRNA virus families. Partition-wise comparisons of the database residues with the corresponding residues of more than 300 complete and partial sequences of these viruses resulted in correct strain identification for all of these sequences. This study shows the feasibility of creating databases of hitherto unknown residues uniquely characterizing the capsid sequences of two of the most highly divergent ssRNA virus families. These databases enable automated strain identification from partial or complete capsid sequences of these human and animal pathogens.

  20. Reactor limit control system

    International Nuclear Information System (INIS)

    Rubbel, F.E.

    1982-01-01

    The very extensive use of limitations in the operational field between protection system and closed-loop controls is an important feature of German understanding of operational safety. The design of limitations is based on very large activities in the computational field but mostly on the high level of the plant-wide own commissioning experience of a turnkey contractor. Limitations combine intelligence features of closed-loop controls with the high availability of protection systems. (orig.)

  1. Detector limitations, STAR

    Energy Technology Data Exchange (ETDEWEB)

    Underwood, D. G.

    1998-07-13

    Every detector has limitations in terms of solid angle, particular technologies chosen, cracks due to mechanical structure, etc. If all of the presently planned parts of STAR [Solenoidal Tracker At RHIC] were in place, these factors would not seriously limit our ability to exploit the spin physics possible in RHIC. What is of greater concern at the moment is the construction schedule for components such as the Electromagnetic Calorimeters, and the limited funding for various levels of triggers.

  2. Performance limitations at ISABELLE

    International Nuclear Information System (INIS)

    Keil, E.

    1975-01-01

    The transverse stability of coasting beams in the planned ISABELLE storage rings was studied. The beam--beam tune shift limitation at 0.005 can be avoided, and a computer simulation seems to show 0.005 is a pessimistic limit. For beams of reasonable smoothness on the edge, the actual limit should be somewhat higher. Some coupling effects due to the beam--beam interaction are also examined

  3. Limit loads in nozzles

    International Nuclear Information System (INIS)

    Zouain, N.

    1983-01-01

    The static method for the evaluation of the limit loads of a perfectly elasto-plastic structure is presented. Using the static theorem of Limit Analysis and the Finite Element Method, a lower bound for the colapso load can be obtained through a linear programming problem. This formulation if then applied to symmetrically loaded shells of revolution and some numerical results of limit loads in nozzles are also presented. (Author) [pt

  4. Limit analysis via creep

    International Nuclear Information System (INIS)

    Taroco, E.; Feijoo, R.A.

    1981-07-01

    In this paper it is presented a variational method for the limit analysis of an ideal plastic solid. This method has been denominated as Modified Secundary Creep and enables to find the collapse loads through a minimization of a functional and a limit process. Given an ideal plastic material it is shown how to determinate the associated secundary creep constitutive equation. Finally, as an application, it is found the limit load in an pressurized von Mises rigid plastic sphere. (Author) [pt

  5. Method for limiting movement of a thermal shield for a nuclear reactor, and thermal shield displacement limiter therefor

    International Nuclear Information System (INIS)

    Meuschke, R.E.; Boyd, C.H.

    1989-01-01

    This patent describes a method of limiting the movement of a thermal shield of a nuclear reactor. It comprises: machining at least four (4) pockets in upper portions of a thermal shield circumferentially about a core barrel of a nuclear reactor to receive key-wave inserts; tapping bolt holes in the pockets of the thermal shield to receive bolts; positioning key-wave inserts into the pockets of the thermal shield to be bolted in place with the bolt holes; machining dowel holes at least partially through the positioned key-way inserts and the thermal shield to receive dowel pins; positioning dowel pins in the dowel holes in the key-way insert and thermal shield to tangentially restrain movement of the thermal shield relative to the core barrel; sliding limiter keys into the key-way inserts and bolting the limiter keys to the core barrel to tangentially restrain movement of the thermal shield relative and the core barrel while allowing radial and axial movement of the thermal shield relative to the core barrel; machining dowel holes through the limiter key and at least partially through the core barrel to receive dowel pins; positioning dowel pins in the dowel holes in the limiter key and core barrel to restrain tangential movement of the thermal shield relative to the core barrel of the nuclear reactor

  6. KEY COMPARISON: Key comparison CCQM-K60: Total selenium and selenomethionine in selenised wheat flour

    Science.gov (United States)

    Goenaga Infante, Heidi; Sargent, Mike

    2010-01-01

    Key comparison CCQM-K60 was performed to assess the analytical capabilities of national metrology institutes (NMIs) to accurately quantitate the mass fraction of selenomethionine (SeMet) and total selenium (at low mg kg-1 levels) in selenised wheat flour. It was organized by the Inorganic Analysis Working Group (IAWG) of the Comité Consultatif pour la Quantité de Matière (CCQM) as a follow-up key comparison to the previous pilot study CCQM-P86 on selenised yeast tablets. LGC Limited (Teddington, UK) and the Institute for National Measurement Standards, National Research Council Canada (NRCC, Ottawa, Canada) acted as the coordinating laboratories. CCQM-K60 was organized in parallel with a pilot study (CCQM-P86.1) involving not only NMIs but also expert laboratories worldwide, thus enabling them to assess their capabilities, discover problems and learn how to modify analytical procedures accordingly. Nine results for total Se and four results for SeMet were reported by the participant NMIs. Methods used for sample preparation were microwave assisted acid digestion for total Se and multiple-step enzymatic hydrolysis and hydrolysis with methanesulfonic acid for SeMet. For total Se, detection techniques included inductively coupled plasma mass spectrometry (ICP-MS) with external calibration, standard additions or isotope dilution analysis (IDMS); instrumental neutron activation analysis (INAA); and graphite furnace atomic absorption spectrometry (GFAAS) with external calibration. For determination of SeMet in the wheat flour sample, the four NMIs relied upon measurements using species-specific IDMS (using 76Se-enriched SeMet) with HPLC-ICP-MS. Eight of the nine participating NMIs reported results for total Se within 3.5% deviation from the key comparison reference value (KCRV). For SeMet, the four participating NMIs reported results within 3.2% deviation from the KCRV. This shows that the performance of the majority of the CCQM-K60 participants was very good

  7. Community Engagement for Identifying Cancer Education Needs in Puerto Rico.

    Science.gov (United States)

    Jiménez, Julio; Ramos, Axel; Ramos-Rivera, Francisco E; Gwede, Clement; Quinn, Gwendolyn P; Vadaparampil, Susan; Brandon, Thomas; Simmons, Vani; Castro, Eida

    2018-02-01

    Cancer is the leading cause of death in Puerto Rico, suggesting a need for improved strategies, programs, and resources devoted to cancer prevention. Enhanced prevention needs in Puerto Rico were initially identified in pilot studies conducted by the Ponce School of Medicine (PSM) in collaboration with the H. Lee Moffitt Cancer Center (MCC). In the current study, we used community engagement to identify specific needs in cancer prevention and education and strategies to create culturally attuned, effective cancer prevention education programs. A total of 37 participants attended a community forum and were assigned to one of three discussion groups: patients/survivors (n = 14); family/caregivers (n = 11); or healthcare providers (n = 12). Most participants were women (73 %), over 35 years of age, and a majority were married (58 %) and had a university education (81 %). The sessions were recorded and transcribed and analyzed for key themes. Participants wanted improved awareness of cancer prevention in Puerto Rico and believed cancer prevention education should start early, ideally in elementary school. Participants also stressed the importance of creating partnerships with private and government agencies to coordinate educational efforts. Suggested strategies included outreach to communities with limited resources, incorporating the testimony of cancer survivors, and utilizing social media to disseminate cancer prevention information.

  8. SPARQL-enabled identifier conversion with Identifiers.org

    Science.gov (United States)

    Wimalaratne, Sarala M.; Bolleman, Jerven; Juty, Nick; Katayama, Toshiaki; Dumontier, Michel; Redaschi, Nicole; Le Novère, Nicolas; Hermjakob, Henning; Laibe, Camille

    2015-01-01

    Motivation: On the semantic web, in life sciences in particular, data is often distributed via multiple resources. Each of these sources is likely to use their own International Resource Identifier for conceptually the same resource or database record. The lack of correspondence between identifiers introduces a barrier when executing federated SPARQL queries across life science data. Results: We introduce a novel SPARQL-based service to enable on-the-fly integration of life science data. This service uses the identifier patterns defined in the Identifiers.org Registry to generate a plurality of identifier variants, which can then be used to match source identifiers with target identifiers. We demonstrate the utility of this identifier integration approach by answering queries across major producers of life science Linked Data. Availability and implementation: The SPARQL-based identifier conversion service is available without restriction at http://identifiers.org/services/sparql. Contact: sarala@ebi.ac.uk PMID:25638809

  9. SPARQL-enabled identifier conversion with Identifiers.org.

    Science.gov (United States)

    Wimalaratne, Sarala M; Bolleman, Jerven; Juty, Nick; Katayama, Toshiaki; Dumontier, Michel; Redaschi, Nicole; Le Novère, Nicolas; Hermjakob, Henning; Laibe, Camille

    2015-06-01

    On the semantic web, in life sciences in particular, data is often distributed via multiple resources. Each of these sources is likely to use their own International Resource Identifier for conceptually the same resource or database record. The lack of correspondence between identifiers introduces a barrier when executing federated SPARQL queries across life science data. We introduce a novel SPARQL-based service to enable on-the-fly integration of life science data. This service uses the identifier patterns defined in the Identifiers.org Registry to generate a plurality of identifier variants, which can then be used to match source identifiers with target identifiers. We demonstrate the utility of this identifier integration approach by answering queries across major producers of life science Linked Data. The SPARQL-based identifier conversion service is available without restriction at http://identifiers.org/services/sparql. © The Author 2015. Published by Oxford University Press.

  10. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  11. Identifying motivational factors within a multinational company

    Directory of Open Access Journals (Sweden)

    Daniela Bradutanu

    2011-08-01

    Full Text Available The aim of the study is to identify the main motivational factors within a multinational company. The first objective is to identify work functions, formulated on Abraham Maslow’s pyramid, following the identification of the key characteristics that motivate an employee at the work place and last, but not least, the type of motivation that employees focus, intrinsic or extrinsic. The research method targeted a questionnaire based survey, including various company employees and an interview with the manager. The results confirmed that in Romania, employees put great emphasis on extrinsic motivation, a certain income and job security being primary. These results have implications for managers that in order to effectively motivate staff, first, must know their needs and expectations. To identify the main needs and motivational factors we had as a starting point Maslow's pyramid.

  12. Establishing Key Performance Indicators : Case company X

    OpenAIRE

    Singh, Jatinder

    2015-01-01

    The key performance indicators serve as the navigational tools for a business organization to monitor its performance. They enable the management team to take real time decisions to keep organization’s resources aligned to its business strategy to accomplish its strategic objec-tives. This research was conducted to analyse the process of establishing successful key per-formance indicators for a business organization. The research was conducted to recommend key performance indicators developme...

  13. Competency Assessment Using Key Performance Indicators

    OpenAIRE

    Elena Alexandra Toader; Laura Brad

    2015-01-01

    The paper proposes a method for computing the scores of the key performance indicators resulted in the competency assessment process. The key performance indicators are estimated considering four performance levels that an IT professional can obtain at the end of the assessment process. We suggest as the best approach for estimating the performance key indicators an online questionnaire filled by 60 employees that work in IT Romanian companies. The results provide evidence that the difference...

  14. Enciphered Data Steganography Using Secret Key

    Directory of Open Access Journals (Sweden)

    BANGALORE G.Tilak

    2010-10-01

    Full Text Available A new method is proposed to maintain thesecrecy of data by enciphering and embedding using asecret key. There is no restriction on the length of thekey used to encipher and embed the data. Since the keyis not stored for validation, it prevents unauthorizedaccess to the key, even if decoding procedure is known.The correct message can be recovered only with thespecific key used in encipherment and embedding. Thismethod can also be used for multiple levelsteganography.

  15. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  16. EPA Monthly Key Performance Indicator Dashboards 2017

    Science.gov (United States)

    Each month, the Web Analytics Program posts updated Key Performance Indicator (KPI) dashboards that correspond to three Web performance goals: content consumption, content discovery, and audience engagement.

  17. Nickel exposure from keys: a Brazilian issue.

    Science.gov (United States)

    Suzuki, Nathalie Mie; Duarte, Ida Alzira Gomes; Hafner, Mariana de Figueiredo Silva; Lazzarini, Rosana

    2017-01-01

    Keys are a significant source of exposure to metal allergens and can be a relevant problem for nickel-allergic individuals. This study aimed to perform nickel and cobalt spot testing among the 5 most common Brazilian brands of keys. Among the tested keys, 100% showed positive result to nickel spot test, 83,3% presented strong positive reaction. 50% exhibited cobalt release as well. Nickel release from keys is very common in our country and may cause a negative impact on sensitized individual's quality of life. Study's results highlight the importance of establishing directives to regulate nickel release in Brazil.

  18. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  19. Numerical Limit Analysis:

    DEFF Research Database (Denmark)

    Damkilde, Lars

    2007-01-01

    Limit State analysis has a long history and many prominent researchers have contributed. The theoretical foundation is based on the upper- and lower-bound theorems which give a very comprehensive and elegant formulation on complicated physical problems. In the pre-computer age Limit State analysis...... also enabled engineers to solve practical problems within reinforced concrete, steel structures and geotechnics....

  20. Advanced limiters for ISX

    International Nuclear Information System (INIS)

    Mioduszewski, P.K.; Edmonds, P.H.; Sheffield, J.

    1982-01-01

    Continuous removal of heat and particles becomes a vital necessity in future steady-state fusion devices. The pump limiter seems to be an attractive concept to combine these two tasks. On ISX, various schemes of pump limiters are being explored with the final goal to furnish the ISX--C device with a pump limiter to handle heat removal and particle control in steady state. The emphasis of the present paper is on pump limiters based on ballistic particle collection. If this concept turns out to be successful in supplying sufficient pumping efficiency, it may be possible to design pump limiters without a leading edge. Analytical calculations of the particle collection efficiency are given for various limiter configurations. Pumping efficiencies of approximately 4--10%, depending on the specific configuration, seem to be feasible and should be sufficient for steady-state operation. Initial experimental results on pump limiter studies in ISX--B confirm the calculated collection efficiencies. By measuring the ion saturation current to the limiter blade and the pressure buildup simultaneously, we found a correlation between the incident particle flux and the pressure rise that agrees well with a simple model