WorldWideScience

Sample records for identify key limiting

  1. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  2. Microscale optical cryptography using a subdiffraction-limit optical key

    Science.gov (United States)

    Ogura, Yusuke; Aino, Masahiko; Tanida, Jun

    2018-04-01

    We present microscale optical cryptography using a subdiffraction-limit optical pattern, which is finer than the diffraction-limit size of the decrypting optical system, as a key and a substrate with a reflectance distribution as an encrypted image. Because of the subdiffraction-limit spatial coding, this method enables us to construct a secret image with the diffraction-limit resolution. Simulation and experimental results demonstrate, both qualitatively and quantitatively, that the secret image becomes recognizable when and only when the substrate is illuminated with the designed key pattern.

  3. Secret Key Agreement: Fundamental Limits and Practical Challenges

    KAUST Repository

    Rezki, Zouheir

    2017-02-15

    Despite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.

  4. Research Note Identifying key grazing indicators to monitor trends in ...

    African Journals Online (AJOL)

    Research Note Identifying key grazing indicators to monitor trends in the veld condition of Lambert's Bay Strandveld, South Africa. ... from which a minimum number of species necessary to monitor trends in the condition of the veld were determined, making it user-friendly for land-users, extension officers and others. The key ...

  5. Identifying Key Stakeholders in Blended Tertiary Environments: Experts' Perspectives

    Science.gov (United States)

    Tuapawa, Kimberley

    2017-01-01

    Although key stakeholders in blended tertiary environments (BTEs) fulfil an extraordinary role in higher education, significant gaps in knowledge about their identities may be impeding the provision of stakeholder support, limiting their ability to promote effective learning and teaching. As online growth intensifies, it is critical that tertiary…

  6. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  7. Robustness bounds and practical limitations of quantum key distribution

    International Nuclear Information System (INIS)

    Khalique, Aeysha

    2008-01-01

    Quantum information theory is a modern branch of theoretical physics. One of its main goals is to interpret concepts of quantum physics. This leads to a deeper understanding of quantum theory. The most common examples of practical applications of basic quantum theory are quantum computation and quantum cryptography. Quantum cryptography provides secure communication between legitimate users even in the presence of an adversary by making possible the distribution of a secret key. It then allows error correction and privacy amplification, which is elimination of adversary information, through classical communication. In this thesis two important aspects of quantum key distribution are covered, namely robustness bounds with respect to provable entanglement for ideal protocols and practical quantum key distribution using two-way classical communication. In part one of the thesis, ideal quantum key distribution protocols and their robustness in terms of provable entanglement are discussed. The robustness bounds are proved for most general coherent attacks. These bounds for provable entanglement are already known to be 25% for the four-state protocol and 33% for the six-state protocol. We anticipate to provide a region in which the legitimate users share entanglement. This region is large for the four-state protocol and is reduced to a smaller region for the six-state protocol because of additional constraint on it. We also investigate the information cost which the adversary has to pay in order to reach these bounds. In part two we adopt a more practical approach. We investigate the limitation on distance of secure communication because of practical restrictions. In particular we investigate the restrictions due to the lack of single photon sources, the lossy channel and faulty detectors. These practical limitations have already been observed using one-way classical communication between legitimate users. It has been observed that it is actually the dark count rate that

  8. Methods of Developing User-Friendly Keys to Identify Green Sea Turtles (Chelonia mydas L. from Photographs

    Directory of Open Access Journals (Sweden)

    Jane R. Lloyd

    2012-01-01

    Full Text Available Identifying individual animals is important in understanding their ecology and behaviour, as well as providing estimates of population sizes for conservation efforts. We produce identification keys from photographs of green sea turtles to identify them while foraging in Akumal Bay, Mexico. We create three keys, which (a minimise the length of the key, (b present the most obvious differential characteristics first, and (c remove the strict dichotomy from key b. Keys were capable of identifying >99% of turtles in >2500 photographs during the six-month study period. The keys differed significantly in success rate for students to identify individual turtles, with key (c being the best with >70% success and correctly being followed further than other keys before making a mistake. User-friendly keys are, therefore, a suitable method for the photographic identification of turtles and could be used for other large marine vertebrates in conservation or behavioural studies.

  9. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters.

    Science.gov (United States)

    Lucamarini, M; Yuan, Z L; Dynes, J F; Shields, A J

    2018-05-01

    Quantum key distribution (QKD) 1,2 allows two distant parties to share encryption keys with security based on physical laws. Experimentally, QKD has been implemented via optical means, achieving key rates of 1.26 megabits per second over 50 kilometres of standard optical fibre 3 and of 1.16 bits per hour over 404 kilometres of ultralow-loss fibre in a measurement-device-independent configuration 4 . Increasing the bit rate and range of QKD is a formidable, but important, challenge. A related target, which is currently considered to be unfeasible without quantum repeaters 5-7 , is overcoming the fundamental rate-distance limit of QKD 8 . This limit defines the maximum possible secret key rate that two parties can distil at a given distance using QKD and is quantified by the secret-key capacity of the quantum channel 9 that connects the parties. Here we introduce an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station. Fields imparted with the same random phase are 'twins' and can be used to distil a quantum key. The key rate of this twin-field QKD exhibits the same dependence on distance as does a quantum repeater, scaling with the square-root of the channel transmittance, irrespective of who (malicious or otherwise) is in control of the measuring station. However, unlike schemes that involve quantum repeaters, ours is feasible with current technology and presents manageable levels of noise even on 550 kilometres of standard optical fibre. This scheme is a promising step towards overcoming the rate-distance limit of QKD and greatly extending the range of secure quantum communications.

  10. BENCHMARKING - PRACTICAL TOOLS IDENTIFY KEY SUCCESS FACTORS

    Directory of Open Access Journals (Sweden)

    Olga Ju. Malinina

    2016-01-01

    Full Text Available The article gives a practical example of the application of benchmarking techniques. The object of study selected fashion store Company «HLB & M Hennes & Mauritz», located in the shopping center «Gallery», Krasnodar. Hennes & Mauritz. The purpose of this article is to identify the best ways to develop a fashionable brand clothing store Hennes & Mauritz on the basis of benchmarking techniques. On the basis of conducted market research is a comparative analysis of the data from different perspectives. The result of the author’s study is a generalization of the ndings, the development of the key success factors that will allow to plan a successful trading activities in the future, based on the best experience of competitors.

  11. Identifying Key Attributes for Protein Beverages.

    Science.gov (United States)

    Oltman, A E; Lopetcharat, K; Bastian, E; Drake, M A

    2015-06-01

    This study identified key attributes of protein beverages and evaluated effects of priming on liking of protein beverages. An adaptive choice-based conjoint study was conducted along with Kano analysis to gain insight on protein beverage consumers (n = 432). Attributes evaluated included label claim, protein type, amount of protein, carbohydrates, sweeteners, and metabolic benefits. Utility scores for levels and importance scores for attributes were determined. Subsequently, two pairs of clear acidic whey protein beverages were manufactured that differed by age of protein source or the amount of whey protein per serving. Beverages were evaluated by 151 consumers on two occasions with or without priming statements. One priming statement declared "great flavor," the other priming statement declared 20 g protein per serving. A two way analysis of variance was applied to discern the role of each priming statement. The most important attribute for protein beverages was sweetener type, followed by amount of protein, followed by type of protein followed by label claim. Beverages with whey protein, naturally sweetened, reduced sugar and ≥15 g protein per serving were most desired. Three consumer clusters were identified, differentiated by their preferences for protein type, sweetener and amount of protein. Priming statements positively impacted concept liking (P 0.05). Consistent with trained panel profiles of increased cardboard flavor with higher protein content, consumers liked beverages with 10 g protein more than beverages with 20 g protein (6.8 compared with 5.7, P appeal. © 2015 Institute of Food Technologists®

  12. A User Centered Innovation Approach Identifying Key User Values for the E-Newspaper

    OpenAIRE

    Carina Ihlström Eriksson; Jesper Svensson

    2009-01-01

    We have studied the pre-adoption phase of the e-newspaper, i.e. a newspaper published with e-paper technology. The research question of this article is: In what way can a user centered innovation process contribute to identifying key values in mobile innovations? The aim of this article is threefold: firstly, to identify key values for the e-newspaper, secondly, to examine the intention to adopt a new possible innovation and thirdly, to explore user centered design processes ability to captur...

  13. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-05-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then

  14. Social Network Analysis Identifies Key Participants in Conservation Development.

    Science.gov (United States)

    Farr, Cooper M; Reed, Sarah E; Pejchar, Liba

    2018-05-01

    Understanding patterns of participation in private lands conservation, which is often implemented voluntarily by individual citizens and private organizations, could improve its effectiveness at combating biodiversity loss. We used social network analysis (SNA) to examine participation in conservation development (CD), a private land conservation strategy that clusters houses in a small portion of a property while preserving the remaining land as protected open space. Using data from public records for six counties in Colorado, USA, we compared CD participation patterns among counties and identified actors that most often work with others to implement CDs. We found that social network characteristics differed among counties. The network density, or proportion of connections in the network, varied from fewer than 2 to nearly 15%, and was higher in counties with smaller populations and fewer CDs. Centralization, or the degree to which connections are held disproportionately by a few key actors, was not correlated strongly with any county characteristics. Network characteristics were not correlated with the prevalence of wildlife-friendly design features in CDs. The most highly connected actors were biological and geological consultants, surveyors, and engineers. Our work demonstrates a new application of SNA to land-use planning, in which CD network patterns are examined and key actors are identified. For better conservation outcomes of CD, we recommend using network patterns to guide strategies for outreach and information dissemination, and engaging with highly connected actor types to encourage widespread adoption of best practices for CD design and stewardship.

  15. Path analysis suggests phytoene accumulation is the key step limiting the carotenoid pathway in white carrot roots

    Directory of Open Access Journals (Sweden)

    Carlos Antonio Fernandes Santos

    2005-01-01

    Full Text Available Two F2 carrot (Daucus carota L. populations (orange rooted Brasilia x very dark orange rooted High Carotene Mass - HCM cross and the dark orange rooted cultivated variety B493 x white rooted wild carrot Queen Anne's Lace - QAL cross with very unrelated genetic backgrounds were used to investigate intrinsic factors limiting carotenoid accumulation in carrots by applying phenotypic correlation and path analysis to study the relationships between major root carotenes, root color and several other morphological traits. Most of the correlations between traits were close and agreed in sign between the two populations. Root weight had a moderate to highly significant positive correlation with leaf length, root length and top and middle root diameter. Although phenotypic correlations failed to identify the order of the substrates and products in the carotenoid pathway the correct order of substrates and products (phytoene -> zeta-carotene -> lycopene was identified in the causal diagram of beta-carotene for the Brasilia x HCM population. Path analysis of beta-carotene synthesis in the B493 x QAL population suggested that selection for root carotenes had little effect on plant morphological traits. Causal model of beta-carotene and lycopene in the B493 x QAL population suggested that phytoene synthesis is the key step limiting the carotenoid pathway in white carrots. Path analysis, first presented by Sewall Wright to study quantitative traits, appears to be a powerful statistical approach for the identification of key compounds in complex pathways.

  16. Key Issues in Empirically Identifying Chronically Low-Performing and Turnaround Schools

    Science.gov (United States)

    Hansen, Michael

    2012-01-01

    One of the US Department of Education's key priorities is turning around the nation's persistently low-achieving schools, yet exactly how to identify low-performing schools is a task left to state policy makers, and a myriad of definitions have been utilized. In addition, exactly how to recognize when a school begins to turn around is not well…

  17. Identifying Key Performance Indicators for Holistic Hospital Management with a Modified DEMATEL Approach.

    Science.gov (United States)

    Si, Sheng-Li; You, Xiao-Yue; Liu, Hu-Chen; Huang, Jia

    2017-08-19

    Performance analysis is an important way for hospitals to achieve higher efficiency and effectiveness in providing services to their customers. The performance of the healthcare system can be measured by many indicators, but it is difficult to improve them simultaneously due to the limited resources. A feasible way is to identify the central and influential indicators to improve healthcare performance in a stepwise manner. In this paper, we propose a hybrid multiple criteria decision making (MCDM) approach to identify key performance indicators (KPIs) for holistic hospital management. First, through integrating evidential reasoning approach and interval 2-tuple linguistic variables, various assessments of performance indicators provided by healthcare experts are modeled. Then, the decision making trial and evaluation laboratory (DEMATEL) technique is adopted to build an interactive network and visualize the causal relationships between the performance indicators. Finally, an empirical case study is provided to demonstrate the proposed approach for improving the efficiency of healthcare management. The results show that "accidents/adverse events", "nosocomial infection", ''incidents/errors", "number of operations/procedures" are significant influential indicators. Also, the indicators of "length of stay", "bed occupancy" and "financial measures" play important roles in performance evaluation of the healthcare organization. The proposed decision making approach could be considered as a reference for healthcare administrators to enhance the performance of their healthcare institutions.

  18. Experimental quantum key distribution with simulated ground-to-satellite photon losses and processing limitations

    Science.gov (United States)

    Bourgoin, Jean-Philippe; Gigov, Nikolay; Higgins, Brendon L.; Yan, Zhizhong; Meyer-Scott, Evan; Khandani, Amir K.; Lütkenhaus, Norbert; Jennewein, Thomas

    2015-11-01

    Quantum key distribution (QKD) has the potential to improve communications security by offering cryptographic keys whose security relies on the fundamental properties of quantum physics. The use of a trusted quantum receiver on an orbiting satellite is the most practical near-term solution to the challenge of achieving long-distance (global-scale) QKD, currently limited to a few hundred kilometers on the ground. This scenario presents unique challenges, such as high photon losses and restricted classical data transmission and processing power due to the limitations of a typical satellite platform. Here we demonstrate the feasibility of such a system by implementing a QKD protocol, with optical transmission and full post-processing, in the high-loss regime using minimized computing hardware at the receiver. Employing weak coherent pulses with decoy states, we demonstrate the production of secure key bits at up to 56.5 dB of photon loss. We further illustrate the feasibility of a satellite uplink by generating a secure key while experimentally emulating the varying losses predicted for realistic low-Earth-orbit satellite passes at 600 km altitude. With a 76 MHz source and including finite-size analysis, we extract 3374 bits of a secure key from the best pass. We also illustrate the potential benefit of combining multiple passes together: while one suboptimal "upper-quartile" pass produces no finite-sized key with our source, the combination of three such passes allows us to extract 165 bits of a secure key. Alternatively, we find that by increasing the signal rate to 300 MHz it would be possible to extract 21 570 bits of a secure finite-sized key in just a single upper-quartile pass.

  19. Integrated systems approach identifies risk regulatory pathways and key regulators in coronary artery disease.

    Science.gov (United States)

    Zhang, Yan; Liu, Dianming; Wang, Lihong; Wang, Shuyuan; Yu, Xuexin; Dai, Enyu; Liu, Xinyi; Luo, Shanshun; Jiang, Wei

    2015-12-01

    Coronary artery disease (CAD) is the most common type of heart disease. However, the molecular mechanisms of CAD remain elusive. Regulatory pathways are known to play crucial roles in many pathogenic processes. Thus, inferring risk regulatory pathways is an important step toward elucidating the mechanisms underlying CAD. With advances in high-throughput data, we developed an integrated systems approach to identify CAD risk regulatory pathways and key regulators. Firstly, a CAD-related core subnetwork was identified from a curated transcription factor (TF) and microRNA (miRNA) regulatory network based on a random walk algorithm. Secondly, candidate risk regulatory pathways were extracted from the subnetwork by applying a breadth-first search (BFS) algorithm. Then, risk regulatory pathways were prioritized based on multiple CAD-associated data sources. Finally, we also proposed a new measure to prioritize upstream regulators. We inferred that phosphatase and tensin homolog (PTEN) may be a key regulator in the dysregulation of risk regulatory pathways. This study takes a closer step than the identification of disease subnetworks or modules. From the risk regulatory pathways, we could understand the flow of regulatory information in the initiation and progression of the disease. Our approach helps to uncover its potential etiology. We developed an integrated systems approach to identify risk regulatory pathways. We proposed a new measure to prioritize the key regulators in CAD. PTEN may be a key regulator in dysregulation of the risk regulatory pathways.

  20. Identifying key genes associated with acute myocardial infarction.

    Science.gov (United States)

    Cheng, Ming; An, Shoukuan; Li, Junquan

    2017-10-01

    This study aimed to identify key genes associated with acute myocardial infarction (AMI) by reanalyzing microarray data. Three gene expression profile datasets GSE66360, GSE34198, and GSE48060 were downloaded from GEO database. After data preprocessing, genes without heterogeneity across different platforms were subjected to differential expression analysis between the AMI group and the control group using metaDE package. P FI) network. Then, DEGs in each module were subjected to pathway enrichment analysis using DAVID. MiRNAs and transcription factors predicted to regulate target DEGs were identified. Quantitative real-time polymerase chain reaction (RT-PCR) was applied to verify the expression of genes. A total of 913 upregulated genes and 1060 downregulated genes were identified in the AMI group. A FI network consists of 21 modules and DEGs in 12 modules were significantly enriched in pathways. The transcription factor-miRNA-gene network contains 2 transcription factors FOXO3 and MYBL2, and 2 miRNAs hsa-miR-21-5p and hsa-miR-30c-5p. RT-PCR validations showed that expression levels of FOXO3 and MYBL2 were significantly increased in AMI, and expression levels of hsa-miR-21-5p and hsa-miR-30c-5p were obviously decreased in AMI. A total of 41 DEGs, such as SOCS3, VAPA, and COL5A2, are speculated to have roles in the pathogenesis of AMI; 2 transcription factors FOXO3 and MYBL2, and 2 miRNAs hsa-miR-21-5p and hsa-miR-30c-5p may be involved in the regulation of the expression of these DEGs.

  1. Identifying key performance indicators for nursing and midwifery care using a consensus approach.

    Science.gov (United States)

    McCance, Tanya; Telford, Lorna; Wilson, Julie; Macleod, Olive; Dowd, Audrey

    2012-04-01

    The aim of this study was to gain consensus on key performance indicators that are appropriate and relevant for nursing and midwifery practice in the current policy context. There is continuing demand to demonstrate effectiveness and efficiency in health and social care and to communicate this at boardroom level. Whilst there is substantial literature on the use of clinical indicators and nursing metrics, there is less evidence relating to indicators that reflect the patient experience. A consensus approach was used to identify relevant key performance indicators. A nominal group technique was used comprising two stages: a workshop involving all grades of nursing and midwifery staff in two HSC trusts in Northern Ireland (n = 50); followed by a regional Consensus Conference (n = 80). During the workshop, potential key performance indicators were identified. This was used as the basis for the Consensus Conference, which involved two rounds of consensus. Analysis was based on aggregated scores that were then ranked. Stage one identified 38 potential indicators and stage two prioritised the eight top-ranked indicators as a core set for nursing and midwifery. The relevance and appropriateness of these indicators were confirmed with nurses and midwives working in a range of settings and from the perspective of service users. The eight indicators identified do not conform to the majority of other nursing metrics generally reported in the literature. Furthermore, they are strategically aligned to work on the patient experience and are reflective of the fundamentals of nursing and midwifery practice, with the focus on person-centred care. Nurses and midwives have a significant contribution to make in determining the extent to which these indicators are achieved in practice. Furthermore, measurement of such indicators provides an opportunity to evidence of the unique impact of nursing/midwifery care on the patient experience. © 2011 Blackwell Publishing Ltd.

  2. Identifying Key Drivers of Return Reversal with Dynamical Bayesian Factor Graph.

    Directory of Open Access Journals (Sweden)

    Shuai Zhao

    Full Text Available In the stock market, return reversal occurs when investors sell overbought stocks and buy oversold stocks, reversing the stocks' price trends. In this paper, we develop a new method to identify key drivers of return reversal by incorporating a comprehensive set of factors derived from different economic theories into one unified dynamical Bayesian factor graph. We then use the model to depict factor relationships and their dynamics, from which we make some interesting discoveries about the mechanism behind return reversals. Through extensive experiments on the US stock market, we conclude that among the various factors, the liquidity factors consistently emerge as key drivers of return reversal, which is in support of the theory of liquidity effect. Specifically, we find that stocks with high turnover rates or high Amihud illiquidity measures have a greater probability of experiencing return reversals. Apart from the consistent drivers, we find other drivers of return reversal that generally change from year to year, and they serve as important characteristics for evaluating the trends of stock returns. Besides, we also identify some seldom discussed yet enlightening inter-factor relationships, one of which shows that stocks in Finance and Insurance industry are more likely to have high Amihud illiquidity measures in comparison with those in other industries. These conclusions are robust for return reversals under different thresholds.

  3. Identifying key hospital service quality factors in online health communities.

    Science.gov (United States)

    Jung, Yuchul; Hur, Cinyoung; Jung, Dain; Kim, Minki

    2015-04-07

    The volume of health-related user-created content, especially hospital-related questions and answers in online health communities, has rapidly increased. Patients and caregivers participate in online community activities to share their experiences, exchange information, and ask about recommended or discredited hospitals. However, there is little research on how to identify hospital service quality automatically from the online communities. In the past, in-depth analysis of hospitals has used random sampling surveys. However, such surveys are becoming impractical owing to the rapidly increasing volume of online data and the diverse analysis requirements of related stakeholders. As a solution for utilizing large-scale health-related information, we propose a novel approach to identify hospital service quality factors and overtime trends automatically from online health communities, especially hospital-related questions and answers. We defined social media-based key quality factors for hospitals. In addition, we developed text mining techniques to detect such factors that frequently occur in online health communities. After detecting these factors that represent qualitative aspects of hospitals, we applied a sentiment analysis to recognize the types of recommendations in messages posted within online health communities. Korea's two biggest online portals were used to test the effectiveness of detection of social media-based key quality factors for hospitals. To evaluate the proposed text mining techniques, we performed manual evaluations on the extraction and classification results, such as hospital name, service quality factors, and recommendation types using a random sample of messages (ie, 5.44% (9450/173,748) of the total messages). Service quality factor detection and hospital name extraction achieved average F1 scores of 91% and 78%, respectively. In terms of recommendation classification, performance (ie, precision) is 78% on average. Extraction and

  4. A matter of definition--key elements identified in a discourse analysis of definitions of palliative care.

    Science.gov (United States)

    Pastrana, T; Jünger, S; Ostgathe, C; Elsner, F; Radbruch, L

    2008-04-01

    For more than 30 years, the term "palliative care" has been used. From the outset, the term has undergone a series of transformations in its definitions and consequently in its tasks and goals. There remains a lack of consensus on a definition. The aim of this article is to analyse the definitions of palliative care in the specialist literature and to identify the key elements of palliative care using discourse analysis: a qualitative methodology. The literature search focused on definitions of the term 'palliative medicine' and 'palliative care' in the World Wide Web and medical reference books in English and German. A total of 37 English and 26 German definitions were identified and analysed. Our study confirmed the lack of a consistent meaning concerning the investigated terms, reflecting on-going discussion about the nature of the field among palliative care practitioners. Several common key elements were identified. Four main categories emerged from the discourse analysis of the definition of palliative care: target groups, structure, tasks and expertise. In addition, the theoretical principles and goals of palliative care were discussed and found to be key elements, with relief and prevention of suffering and improvement of quality of life as main goals. The identified key elements can contribute to the definition of the concept 'palliative care'. Our study confirms the importance of semantic and ethical influences on palliative care that should be considered in future research on semantics in different languages.

  5. Key clinical features to identify girls with CDKL5 mutations.

    Science.gov (United States)

    Bahi-Buisson, Nadia; Nectoux, Juliette; Rosas-Vargas, Haydeé; Milh, Mathieu; Boddaert, Nathalie; Girard, Benoit; Cances, Claude; Ville, Dorothée; Afenjar, Alexandra; Rio, Marlène; Héron, Delphine; N'guyen Morel, Marie Ange; Arzimanoglou, Alexis; Philippe, Christophe; Jonveaux, Philippe; Chelly, Jamel; Bienvenu, Thierry

    2008-10-01

    Mutations in the human X-linked cyclin-dependent kinase-like 5 (CDKL5) gene have been shown to cause infantile spasms as well as Rett syndrome (RTT)-like phenotype. To date, less than 25 different mutations have been reported. So far, there are still little data on the key clinical diagnosis criteria and on the natural history of CDKL5-associated encephalopathy. We screened the entire coding region of CDKL5 for mutations in 183 females with encephalopathy with early seizures by denaturing high liquid performance chromatography and direct sequencing, and we identified in 20 unrelated girls, 18 different mutations including 7 novel mutations. These mutations were identified in eight patients with encephalopathy with RTT-like features, five with infantile spasms and seven with encephalopathy with refractory epilepsy. Early epilepsy with normal interictal EEG and severe hypotonia are the key clinical features in identifying patients likely to have CDKL5 mutations. Our study also indicates that these patients clearly exhibit some RTT features such as deceleration of head growth, stereotypies and hand apraxia and that these RTT features become more evident in older and ambulatory patients. However, some RTT signs are clearly absent such as the so called RTT disease profile (period of nearly normal development followed by regression with loss of acquired fine finger skill in early childhood and characteristic intensive eye communication) and the characteristic evolution of the RTT electroencephalogram. Interestingly, in addition to the overall stereotypical symptomatology (age of onset and evolution of the disease) resulting from CDKL5 mutations, atypical forms of CDKL5-related conditions have also been observed. Our data suggest that phenotypic heterogeneity does not correlate with the nature or the position of the mutations or with the pattern of X-chromosome inactivation, but most probably with the functional transcriptional and/or translational consequences of CDKL5

  6. Predictive model identifies key network regulators of cardiomyocyte mechano-signaling.

    Directory of Open Access Journals (Sweden)

    Philip M Tan

    2017-11-01

    Full Text Available Mechanical strain is a potent stimulus for growth and remodeling in cells. Although many pathways have been implicated in stretch-induced remodeling, the control structures by which signals from distinct mechano-sensors are integrated to modulate hypertrophy and gene expression in cardiomyocytes remain unclear. Here, we constructed and validated a predictive computational model of the cardiac mechano-signaling network in order to elucidate the mechanisms underlying signal integration. The model identifies calcium, actin, Ras, Raf1, PI3K, and JAK as key regulators of cardiac mechano-signaling and characterizes crosstalk logic imparting differential control of transcription by AT1R, integrins, and calcium channels. We find that while these regulators maintain mostly independent control over distinct groups of transcription factors, synergy between multiple pathways is necessary to activate all the transcription factors necessary for gene transcription and hypertrophy. We also identify a PKG-dependent mechanism by which valsartan/sacubitril, a combination drug recently approved for treating heart failure, inhibits stretch-induced hypertrophy, and predict further efficacious pairs of drug targets in the network through a network-wide combinatorial search.

  7. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal

    DEFF Research Database (Denmark)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    , and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character......Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case...... also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication. The objective is addressed in a literature review and a case study. The literature...

  8. Iterative key-residues interrogation of a phytase with thermostability increasing substitutions identified in directed evolution.

    Science.gov (United States)

    Shivange, Amol V; Roccatano, Danilo; Schwaneberg, Ulrich

    2016-01-01

    Bacterial phytases have attracted industrial interest as animal feed supplement due to their high activity and sufficient thermostability (required for feed pelleting). We devised an approach named KeySIDE,  an iterative Key-residues interrogation of the wild type with Substitutions Identified in Directed Evolution for improving Yersinia mollaretii phytase (Ymphytase) thermostability by combining key beneficial substitutions and elucidating their individual roles. Directed evolution yielded in a discovery of nine positions in Ymphytase and combined iteratively to identify key positions. The "best" combination (M6: T77K, Q154H, G187S, and K289Q) resulted in significantly improved thermal resistance; the residual activity improved from 35 % (wild type) to 89 % (M6) at 58 °C and 20-min incubation. Melting temperature increased by 3 °C in M6 without a loss of specific activity. Molecular dynamics simulation studies revealed reduced flexibility in the loops located next to helices (B, F, and K) which possess substitutions (Helix-B: T77K, Helix-F: G187S, and Helix-K: K289E/Q). Reduced flexibility in the loops might be caused by strengthened hydrogen bonding network (e.g., G187S and K289E/K289Q) and a salt bridge (T77K). Our results demonstrate a promising approach to design phytases in food research, and we hope that the KeySIDE might become an attractive approach for understanding of structure-function relationships of enzymes.

  9. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    Directory of Open Access Journals (Sweden)

    Hualin Xie

    2014-02-01

    Full Text Available Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability.

  10. Improving the key biodiversity areas approach for effective conservation planning

    CSIR Research Space (South Africa)

    Knight, AT

    2007-03-01

    Full Text Available The key biodiversity areas (KBA) approach aims to identify globally important areas for species conservation. Although a similar methodology has been used successfully to identify important Bird Areas, the authors have identified five limitations...

  11. Identifying Key Stakeholder Groups for Implementing a Place Branding Policy in Saint Petersburg

    Directory of Open Access Journals (Sweden)

    Kulibanova V. V.

    2017-10-01

    Full Text Available Regional brands have become a valuable intangible asset and a crucial competitive resource for forging partnerships. An effective place branding policy is impossible without a precise understanding of the interests of stakeholder groups. It is essential to realize that each region is unique in its own way. Territories differ in the structure of stakeholders, their influence on regional development, and the range of leverages over regional decision-makers. This study aims to give a more precise definition of key groups of stakeholders in Saint Petersburg place branding, and to identify them. The authors employ the method of theoretical and empirical typology of a territory’s stakeholders within a theoretical framework proposed by E. Freeman, P. Kotler, S. Zenker, and E. Brown. The article defines the concept of key regional stakeholders and identifies them. The proposed target audience (stakeholder group model for a place branding policy is tested on the case of Saint Petersburg. The authors show that each target audience of place marketing requires an individual policy. This is explained by the fact that each group enjoys its unique features that should be taken into account when creating and transmitting messages.

  12. Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Kramer, Sharon; Previsic, Mirko; Nelson, Peter; Woo, Sheri

    2010-06-17

    Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: 4 wave energy generation technologies 3 tidal energy generation technologies 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal

  13. Experimental infections with Mycoplasma agalactiae identify key factors involved in host-colonization.

    Directory of Open Access Journals (Sweden)

    Eric Baranowski

    Full Text Available Mechanisms underlying pathogenic processes in mycoplasma infections are poorly understood, mainly because of limited sequence similarities with classical, bacterial virulence factors. Recently, large-scale transposon mutagenesis in the ruminant pathogen Mycoplasma agalactiae identified the NIF locus, including nifS and nifU, as essential for mycoplasma growth in cell culture, while dispensable in axenic media. To evaluate the importance of this locus in vivo, the infectivity of two knock-out mutants was tested upon experimental infection in the natural host. In this model, the parental PG2 strain was able to establish a systemic infection in lactating ewes, colonizing various body sites such as lymph nodes and the mammary gland, even when inoculated at low doses. In these PG2-infected ewes, we observed over the course of infection (i the development of a specific antibody response and (ii dynamic changes in expression of M. agalactiae surface variable proteins (Vpma, with multiple Vpma profiles co-existing in the same animal. In contrast and despite a sensitive model, none of the knock-out mutants were able to survive and colonize the host. The extreme avirulent phenotype of the two mutants was further supported by the absence of an IgG response in inoculated animals. The exact role of the NIF locus remains to be elucidated but these data demonstrate that it plays a key role in the infectious process of M. agalactiae and most likely of other pathogenic mycoplasma species as many carry closely related homologs.

  14. Identifying and weighting of key performance indicators of knowledge management2.0 in organizations

    Directory of Open Access Journals (Sweden)

    Saeed Khalilazar

    2016-03-01

    Full Text Available Main purpose of this research is identifying and weighting of key performance indicators of knowledge management2.0 in organizations. According to widespread permeation of technology, especially social media in different organizational dimensions and functional view to this phenomenon in knowledge management, performance measurement of this kind of media in order to meet organizational goals seems necessary. KM2.0 key performance indicators in this article has been identified and weighted through Delphi methodology, via questionnaire in three rounds. KM2.0 KPIs which are identified and weighted in this article are applicable in organizations that are eager to implement KM2.0 initiative and they can measure the performance of KM2.0 activities therefore this research is applicable in goal oriented approach. According to the results, KM2.0 participation process consists of 3 stages and 8 steps as mentioned below: First stage which is presence, consists of 3 steps which are registration, visit and download. Second stage which is feedback consists of 3 steps which are conversation, applause and amplification. Finally, third stage which is creation consists of 2 steps which are codification and personalization. Ultimate contribution of this research is identifying and weighting KPIs of KM2.0 in conceptual framework of KM2.0. Based on developing a conceptual framework and participation process in KM2.0 and listing related KPIs as an applicable solution in order to measure and improve the performance of organizational social media, this research has unique innovation among related and other articles.

  15. Identifying and characterizing key nodes among communities based on electrical-circuit networks.

    Science.gov (United States)

    Zhu, Fenghui; Wang, Wenxu; Di, Zengru; Fan, Ying

    2014-01-01

    Complex networks with community structures are ubiquitous in the real world. Despite many approaches developed for detecting communities, we continue to lack tools for identifying overlapping and bridging nodes that play crucial roles in the interactions and communications among communities in complex networks. Here we develop an algorithm based on the local flow conservation to effectively and efficiently identify and distinguish the two types of nodes. Our method is applicable in both undirected and directed networks without a priori knowledge of the community structure. Our method bypasses the extremely challenging problem of partitioning communities in the presence of overlapping nodes that may belong to multiple communities. Due to the fact that overlapping and bridging nodes are of paramount importance in maintaining the function of many social and biological networks, our tools open new avenues towards understanding and controlling real complex networks with communities accompanied with the key nodes.

  16. Modelling Creativity: Identifying Key Components through a Corpus-Based Approach.

    Science.gov (United States)

    Jordanous, Anna; Keller, Bill

    2016-01-01

    Creativity is a complex, multi-faceted concept encompassing a variety of related aspects, abilities, properties and behaviours. If we wish to study creativity scientifically, then a tractable and well-articulated model of creativity is required. Such a model would be of great value to researchers investigating the nature of creativity and in particular, those concerned with the evaluation of creative practice. This paper describes a unique approach to developing a suitable model of how creative behaviour emerges that is based on the words people use to describe the concept. Using techniques from the field of statistical natural language processing, we identify a collection of fourteen key components of creativity through an analysis of a corpus of academic papers on the topic. Words are identified which appear significantly often in connection with discussions of the concept. Using a measure of lexical similarity to help cluster these words, a number of distinct themes emerge, which collectively contribute to a comprehensive and multi-perspective model of creativity. The components provide an ontology of creativity: a set of building blocks which can be used to model creative practice in a variety of domains. The components have been employed in two case studies to evaluate the creativity of computational systems and have proven useful in articulating achievements of this work and directions for further research.

  17. Identifying key areas for active interprofessional learning partnerships: A facilitated dialogue.

    Science.gov (United States)

    Steven, Kathryn; Angus, Allyson; Breckenridge, Jenna; Davey, Peter; Tully, Vicki; Muir, Fiona

    2016-11-01

    Student and service user involvement is recognised as an important factor in creating interprofessional education (IPE) opportunities. We used a team-based learning approach to bring together undergraduate health professional students, early career professionals (ECPs), public partners, volunteers, and carers to explore learning partnerships. Influenced by evaluative inquiry, this qualitative study used a free text response to allow participants to give their own opinion. A total of 153 participants (50 public partners and 103 students and professionals representing 11 healthcare professions) took part. Participants were divided into mixed groups of six (n = 25) and asked to identify areas where students, professionals, and public could work together to improve health professional education. Each group documented their discussions by summarising agreed areas and next steps. Responses were collected and transcribed for inductive content analysis. Seven key themes (areas for joint working) were identified: communication, public as partners, standards of conduct, IPE, quality improvement, education, and learning environments. The team-based learning format enabled undergraduate and postgraduate health professionals to achieve consensus with public partners on areas for IPE and collaboration. Some of our results may be context-specific but the approach is generalisable to other areas.

  18. Identifying the key personnel in a nurse-initiated hospital waste reduction program.

    Science.gov (United States)

    McDermott-Levy, Ruth; Fazzini, Carol

    2010-01-01

    Hospitals in the United States generate more than 6600 tons of trash a day and approximately 85% of the waste is nonhazardous solid waste such as food, cardboard, and plastic. Treatment and management of hospital waste can lead to environmental problems for the communities that receive the waste. One health system's shared governance model provided the foundation to develop a nurse-led hospital waste reduction program that focused on point-of-care waste management. Waste reduction program development required working with a variety of departments within and external to the health system. The interdisciplinary approach informed the development of the waste reduction program. This article identifies the key departments that were necessary to include when developing a hospital waste reduction program.

  19. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana.

    Science.gov (United States)

    Engel, Julien; Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original multi-access electronic key for the identification of 389 tree genera occurring in French Guiana terra-firme forests, based on a set of 79 morphological characters related to vegetative, floral and fruit characters. Its purpose is to help Amazonian tree identification and to support the dissemination of botanical knowledge to non-specialists, including forest workers, students and researchers from other scientific disciplines. The electronic key is accessible with the free access software Xper ², and the database is publicly available on figshare: https://figshare.com/s/75d890b7d707e0ffc9bf (doi: 10.6084/m9.figshare.2682550).

  20. A Sensitivity Analysis Approach to Identify Key Environmental Performance Factors

    Directory of Open Access Journals (Sweden)

    Xi Yu

    2014-01-01

    Full Text Available Life cycle assessment (LCA is widely used in design phase to reduce the product’s environmental impacts through the whole product life cycle (PLC during the last two decades. The traditional LCA is restricted to assessing the environmental impacts of a product and the results cannot reflect the effects of changes within the life cycle. In order to improve the quality of ecodesign, it is a growing need to develop an approach which can reflect the changes between the design parameters and product’s environmental impacts. A sensitivity analysis approach based on LCA and ecodesign is proposed in this paper. The key environmental performance factors which have significant influence on the products’ environmental impacts can be identified by analyzing the relationship between environmental impacts and the design parameters. Users without much environmental knowledge can use this approach to determine which design parameter should be first considered when (redesigning a product. A printed circuit board (PCB case study is conducted; eight design parameters are chosen to be analyzed by our approach. The result shows that the carbon dioxide emission during the PCB manufacture is highly sensitive to the area of PCB panel.

  1. Modified Principal Component Analysis for Identifying Key Environmental Indicators and Application to a Large-Scale Tidal Flat Reclamation

    Directory of Open Access Journals (Sweden)

    Kejian Chu

    2018-01-01

    Full Text Available Identification of the key environmental indicators (KEIs from a large number of environmental variables is important for environmental management in tidal flat reclamation areas. In this study, a modified principal component analysis approach (MPCA has been developed for determining the KEIs. The MPCA accounts for the two important attributes of the environmental variables: pollution status and temporal variation, in addition to the commonly considered numerical divergence attribute. It also incorporates the distance correlation (dCor to replace the Pearson’s correlation to measure the nonlinear interrelationship between the variables. The proposed method was applied to the Tiaozini sand shoal, a large-scale tidal flat reclamation region in China. Five KEIs were identified as dissolved inorganic nitrogen, Cd, petroleum in the water column, Hg, and total organic carbon in the sediment. The identified KEIs were shown to respond well to the biodiversity of phytoplankton. This demonstrated that the identified KEIs adequately represent the environmental condition in the coastal marine system. Therefore, the MPCA is a practicable method for extracting effective indicators that have key roles in the coastal and marine environment.

  2. Computational modeling identifies key gene regulatory interactions underlying phenobarbital-mediated tumor promotion

    Science.gov (United States)

    Luisier, Raphaëlle; Unterberger, Elif B.; Goodman, Jay I.; Schwarz, Michael; Moggs, Jonathan; Terranova, Rémi; van Nimwegen, Erik

    2014-01-01

    Gene regulatory interactions underlying the early stages of non-genotoxic carcinogenesis are poorly understood. Here, we have identified key candidate regulators of phenobarbital (PB)-mediated mouse liver tumorigenesis, a well-characterized model of non-genotoxic carcinogenesis, by applying a new computational modeling approach to a comprehensive collection of in vivo gene expression studies. We have combined our previously developed motif activity response analysis (MARA), which models gene expression patterns in terms of computationally predicted transcription factor binding sites with singular value decomposition (SVD) of the inferred motif activities, to disentangle the roles that different transcriptional regulators play in specific biological pathways of tumor promotion. Furthermore, transgenic mouse models enabled us to identify which of these regulatory activities was downstream of constitutive androstane receptor and β-catenin signaling, both crucial components of PB-mediated liver tumorigenesis. We propose novel roles for E2F and ZFP161 in PB-mediated hepatocyte proliferation and suggest that PB-mediated suppression of ESR1 activity contributes to the development of a tumor-prone environment. Our study shows that combining MARA with SVD allows for automated identification of independent transcription regulatory programs within a complex in vivo tissue environment and provides novel mechanistic insights into PB-mediated hepatocarcinogenesis. PMID:24464994

  3. Protocol for a thematic synthesis to identify key themes and messages from a palliative care research network.

    LENUS (Irish Health Repository)

    Nicholson, Emma

    2016-10-21

    Research networks that facilitate collaborative research are increasing both regionally and globally and such collaborations contribute greatly to knowledge transfer particularly in health research. The Palliative Care Research Network is an Irish-based network that seeks to create opportunities and engender a collaborative environment to encourage innovative research that is relevant for policy and practice. The current review outlines a methodology to identify cross-cutting messages to identify how dissemination outputs can be optimized to ensure that key messages from this research reaches all knowledge users.

  4. Risk and Performance Technologies: Identifying the Keys to Successful Implementation

    International Nuclear Information System (INIS)

    McClain, Lynn; Smith, Art; O'Regan, Patrick

    2002-01-01

    The nuclear power industry has been utilizing risk and performance based technologies for over thirty years. Applications of these technologies have included risk assessment (e.g. Individual Plant Examinations), burden reduction (e.g. Risk-Informed Inservice Inspection, RI-ISI) and risk management (Maintenance Rule, 10CFR50.65). Over the last five to ten years the number of risk-informed (RI) burden reduction initiatives has increased. Unfortunately, the efficiencies of some of these applications have been questionable. This paper investigates those attributes necessary to support successful, cost-effective RI-applications. The premise to this paper is that by understanding the key attributes that support one successful application, insights can be gleaned that will streamline/coordinate future RI-applications. This paper is an extension to a paper presented at the Pressure Vessel and Piping (PVP-2001) Conference. In that paper, a number issues and opportunities were identified that needed to be assessed in order to support future (and efficient) RI-applications. It was noted in the paper that a proper understanding and resolution of these issues will facilitate implementation of risk and performance technology in the operation, maintenance and design disciplines. In addition, it will provide the foundation necessary to support regulatory review and approval. (authors)

  5. A genetic screen identifies BRCA2 and PALB2 as key regulators of G2 checkpoint maintenance

    DEFF Research Database (Denmark)

    Menzel, Tobias; Nähse-Kumpf, Viola; Kousholt, Arne Nedergaard

    2011-01-01

    To identify key connections between DNA-damage repair and checkpoint pathways, we performed RNA interference screens for regulators of the ionizing radiation-induced G2 checkpoint, and we identified the breast cancer gene BRCA2. The checkpoint was also abrogated following depletion of PALB2......, an interaction partner of BRCA2. BRCA2 and PALB2 depletion led to premature checkpoint abrogation and earlier activation of the AURORA A-PLK1 checkpoint-recovery pathway. These results indicate that the breast cancer tumour suppressors and homologous recombination repair proteins BRCA2 and PALB2 are main...

  6. A key to the Mexican and Central America Genera of Anthonomini (Curculionidae, Curculioninae)

    Science.gov (United States)

    Hernández, Macotulio Soto; Jones, Robert W.; Castillo, Pedro Reyes

    2013-01-01

    Abstract Presently the only keys available for identification of genera of Anthonomini are limited to those of the United States of America and Canada. A dichotomous key is presented to identify all genera of Mexican and Central American Anthonomini. Previous keys do not include the genera Achia, Botanebius, Loncophorus, Loncophorellus and Melexerus. A brief synopsis is given for each genus and photographs of representative species are included. PMID:23717181

  7. Postsecondary Students With Psychiatric Disabilities Identify Core Services and Key Ingredients to Supporting Education Goals.

    Science.gov (United States)

    Biebel, Kathleen; Mizrahi, Raphael; Ringeisen, Heather

    2017-10-26

    Accessing and successfully completing postsecondary educational opportunities may be challenging for those living with psychiatric disabilities. This exploratory study highlights the experiences of individuals with psychiatric disabilities participating in postsecondary educational support initiatives. Investigators conducted case studies with 3 education support initiatives across the United States. Focus groups revealed what concrete supported education services were helpful and key ingredients in delivering education supports. Access to specialists, mindfulness techniques, help with time management and procrastination, and facilitating classroom accommodations were identified as critical. Developing authentic relationships with supported education staff, flexibility in service delivery and access to student peers living with psychiatric disabilities were noted as key ingredients in service delivery. Incorporating the voice of students with psychiatric disabilities into supported education services can increase access, involvement, and retention, therein providing more supports to students with psychiatric disabilities achieving their postsecondary education goals. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  8. Use of a scenario-neutral approach to identify the key hydro-meteorological attributes that impact runoff from a natural catchment

    Science.gov (United States)

    Guo, Danlu; Westra, Seth; Maier, Holger R.

    2017-11-01

    Scenario-neutral approaches are being used increasingly for assessing the potential impact of climate change on water resource systems, as these approaches allow the performance of these systems to be evaluated independently of climate change projections. However, practical implementations of these approaches are still scarce, with a key limitation being the difficulty of generating a range of plausible future time series of hydro-meteorological data. In this study we apply a recently developed inverse stochastic generation approach to support the scenario-neutral analysis, and thus identify the key hydro-meteorological variables to which the system is most sensitive. The stochastic generator simulates synthetic hydro-meteorological time series that represent plausible future changes in (1) the average, extremes and seasonal patterns of rainfall; and (2) the average values of temperature (Ta), relative humidity (RH) and wind speed (uz) as variables that drive PET. These hydro-meteorological time series are then fed through a conceptual rainfall-runoff model to simulate the potential changes in runoff as a function of changes in the hydro-meteorological variables, and runoff sensitivity is assessed with both correlation and Sobol' sensitivity analyses. The method was applied to a case study catchment in South Australia, and the results showed that the most important hydro-meteorological attributes for runoff were winter rainfall followed by the annual average rainfall, while the PET-related meteorological variables had comparatively little impact. The high importance of winter rainfall can be related to the winter-dominated nature of both the rainfall and runoff regimes in this catchment. The approach illustrated in this study can greatly enhance our understanding of the key hydro-meteorological attributes and processes that are likely to drive catchment runoff under a changing climate, thus enabling the design of tailored climate impact assessments to specific

  9. Identifying the key concerns of Irish persons with intellectual disability.

    Science.gov (United States)

    García Iriarte, Edurne; O'Brien, Patricia; McConkey, Roy; Wolfe, Marie; O'Doherty, Siobhain

    2014-11-01

    Internationally, people with intellectual disability are socially marginalized, and their rights under the United Nations Convention for the Rights of Persons with Disabilities (CRPD) are often ignored. This paper aims to define the key concerns of adults with an intellectual disability in relation to their participation in society using an inclusive research strategy for both data gathering and data analysis. A national study involving 23 focus groups and 168 persons was conducted on the island of Ireland with people with intellectual disability as co-facilitators. A thematic content analysis was undertaken of the verbatim transcripts initially by university co-researchers, and 19 themes were identified. Co-researchers with intellectual disability joined in identifying the eight core themes. These were as follows: living options, employment, relationships, citizenship, leisure time, money management, self-advocacy, and communication. The concerns are discussed within the framework of the CRPD, and implications for transforming service policy are drawn. Why we did the research In many countries, people with intellectual disability have difficulties doing things other people without disabilities do, for example to study, to get a job or to live independently. They also find that their rights are not respected under the Convention on the Rights of Persons with Disabilities (the Convention). We did this study to Learn what are the main issues for adults with intellectual disability in Ireland. Do research with people with intellectual disability. How we did the research People with intellectual disability and their supporters worked with university researchers to plan and do the research. We met with people in groups and 168 people told us about things important to them. What we found out We found that there were very important things that people talked about in the groups. We chose the most important: living options, employment, relationships, rights, leisure, money

  10. Identifying key radiogenomic associations between DCE-MRI and micro-RNA expressions for breast cancer

    Science.gov (United States)

    Samala, Ravi K.; Chan, Heang-Ping; Hadjiiski, Lubomir; Helvie, Mark A.; Kim, Renaid

    2017-03-01

    Understanding the key radiogenomic associations for breast cancer between DCE-MRI and micro-RNA expressions is the foundation for the discovery of radiomic features as biomarkers for assessing tumor progression and prognosis. We conducted a study to analyze the radiogenomic associations for breast cancer using the TCGA-TCIA data set. The core idea that tumor etiology is a function of the behavior of miRNAs is used to build the regression models. The associations based on regression are analyzed for three study outcomes: diagnosis, prognosis, and treatment. The diagnosis group consists of miRNAs associated with clinicopathologic features of breast cancer and significant aberration of expression in breast cancer patients. The prognosis group consists of miRNAs which are closely associated with tumor suppression and regulation of cell proliferation and differentiation. The treatment group consists of miRNAs that contribute significantly to the regulation of metastasis thereby having the potential to be part of therapeutic mechanisms. As a first step, important miRNA expressions were identified and their ability to classify the clinical phenotypes based on the study outcomes was evaluated using the area under the ROC curve (AUC) as a figure-of-merit. The key mapping between the selected miRNAs and radiomic features were determined using least absolute shrinkage and selection operator (LASSO) regression analysis within a two-loop leave-one-out cross-validation strategy. These key associations indicated a number of radiomic features from DCE-MRI to be potential biomarkers for the three study outcomes.

  11. Bottom-up communication. Identifying opportunities and limitations through an exploratory field-based evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, C.; Irvine, K.N. [Institute of Energy and Sustainable Development, De Montfort University, Leicester, LE1 9BH (United Kingdom)

    2013-02-15

    Communication to promote behaviours like energy saving can use significant resources. What is less clear is the comparative value of different approaches available to communicators. While it is generally agreed that 'bottom-up' approaches, where individuals are actively involved rather than passive, are preferable to 'top-down' authority-led projects, there is a dearth of evidence that verifies why this should be. Additionally, while the literature has examined the mechanics of the different approaches, there has been less attention paid to the associated psychological implications. This paper reports on an exploratory comparative study that examined the effects of six distinct communication activities. The activities used different communication approaches, some participative and others more top-down informational. Two theories, from behavioural studies and communication, were used to identify key variables for consideration in this field-based evaluation. The evaluation aimed to assess not just which activity might be most successful, as this has limited generalisability, but to also gain insight into what psychological impacts might contribute to success. Analysis found support for the general hypothesis that bottom-up approaches have more impact on behaviour change than top-down. The study also identified that, in this instance, the difference in reported behaviour across the activities related partly to the extent to which intentions to change behaviour were implemented. One possible explanation for the difference in reported behaviour change across the activities is that a bottom-up approach may offer a supportive environment where participants can discuss progress with like-minded individuals. A further possible explanation is that despite controlling for intention at an individual level, the pre-existence of strong intentions may have an effect on group success. These suggestive findings point toward the critical need for additional and larger-scale studies

  12. Exploring the effects of spatial autocorrelation when identifying key drivers of wildlife crop-raiding.

    Science.gov (United States)

    Songhurst, Anna; Coulson, Tim

    2014-03-01

    Few universal trends in spatial patterns of wildlife crop-raiding have been found. Variations in wildlife ecology and movements, and human spatial use have been identified as causes of this apparent unpredictability. However, varying spatial patterns of spatial autocorrelation (SA) in human-wildlife conflict (HWC) data could also contribute. We explicitly explore the effects of SA on wildlife crop-raiding data in order to facilitate the design of future HWC studies. We conducted a comparative survey of raided and nonraided fields to determine key drivers of crop-raiding. Data were subsampled at different spatial scales to select independent raiding data points. The model derived from all data was fitted to subsample data sets. Model parameters from these models were compared to determine the effect of SA. Most methods used to account for SA in data attempt to correct for the change in P-values; yet, by subsampling data at broader spatial scales, we identified changes in regression estimates. We consequently advocate reporting both model parameters across a range of spatial scales to help biological interpretation. Patterns of SA vary spatially in our crop-raiding data. Spatial distribution of fields should therefore be considered when choosing the spatial scale for analyses of HWC studies. Robust key drivers of elephant crop-raiding included raiding history of a field and distance of field to a main elephant pathway. Understanding spatial patterns and determining reliable socio-ecological drivers of wildlife crop-raiding is paramount for designing mitigation and land-use planning strategies to reduce HWC. Spatial patterns of HWC are complex, determined by multiple factors acting at more than one scale; therefore, studies need to be designed with an understanding of the effects of SA. Our methods are accessible to a variety of practitioners to assess the effects of SA, thereby improving the reliability of conservation management actions.

  13. Limiting factor analysis of high availability nuclear plants (boiling water reactors). Final report

    International Nuclear Information System (INIS)

    Frederick, L.G.; Brady, R.M.; Shor, S.W.W.; McCusker, J.T.; Alden, W.M.; Kovacs, S.

    1979-08-01

    The pertinent results are presented of a 16-month study conducted for Electric Power Research Institute by General Electric Company, Bechtel Power Corporation, and Philadelphia Electric Company. The study centered around the Peach Bottom 2 Atomic Power Station, but also included limited study of operations at 20 additional operating boiling water reactors. The purpose of the study was to identify and evaluate key factors limiting plant availability, and to identify potential improvements for eliminating or alleviating those limitations. The key limiting factors were found to be refueling activities; activities related to the reactor fuel; reactor scrams; activities related to 20 operating systems or major components; delays due to radiation, turbid water during refueling operations, facilities/working conditions, and dirt/foreign material; and general maintenance/repair of valves and piping. Existing programs to reduce the effect on plant unavailability are identified, and suggestions for further action are made

  14. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  15. Human-automation collaboration in manufacturing: identifying key implementation factors

    OpenAIRE

    Charalambous, George; Fletcher, Sarah; Webb, Philip

    2013-01-01

    Human-automation collaboration refers to the concept of human operators and intelligent automation working together interactively within the same workspace without conventional physical separation. This concept has commanded significant attention in manufacturing because of the potential applications, such as the installation of large sub-assemblies. However, the key human factors relevant to human-automation collaboration have not yet been fully investigated. To maximise effective implement...

  16. The Use of Key Informant Method for Identifying Children with Blindness and Severe Visual Impairment in Developing Countries.

    Science.gov (United States)

    du Toit, Rènée; Courtright, Paul; Lewallen, Susan

    2017-06-01

    An estimated 19 million children are visually impaired; of these, 1.4 million are irreversibly blind. A key challenge is to identify them early in life to benefit maximally from visual rehabilitation, and/or treatment. This aggregative review and structured literature analysis summarizes evidence of what it is about the key informant (KI) approach that works to identify children with blindness or severe visual impairment (B/SVI) in the community (for whom, to what extent, in what circumstances, in what respect, how and why). Peer-reviewed (PubMed, hand search) and grey literature (Google, World Health Organization website, academic theses, direct requests) were included, and methods and criteria used for identification, productivity (number of children referred per KI), accuracy of referrals (positive predictive value, PPV), age of children with B/SVI, KI definition, sex, information about cost and comparisons aggregated. We included 31 documents describing 22 unique KI programs. Mostly KIs identified children with B/SVI in 1-3 weeks, i.e. "campaign mode." In 60%, KIs were community volunteers, others formal health sector workers (FHSW). Around 0.02-1.56 children per KI (median = 0.25) were successfully recruited. PPV ranged from 12 to 66%. In two studies comparing FHSWs and community KIs, the latter were 8 and 10 times more productive. KIs working in campaign mode may provide an effective approach to identifying children with B/SVI in communities. Including identification of ocular problems and/or other impairments has been recommended. Research on factors that influence effectiveness and on whether KIs continue to contribute could inform programs.

  17. Identifying critical recruitment bottlenecks limiting seedling establishment in a degraded seagrass ecosystem.

    Science.gov (United States)

    Statton, John; Montoya, Leonardo R; Orth, Robert J; Dixon, Kingsley W; Kendrick, Gary A

    2017-11-01

    Identifying early life-stage transitions limiting seagrass recruitment could improve our ability to target demographic processes most responsive to management. Here we determine the magnitude of life-stage transitions along gradients in physical disturbance limiting seedling establishment for the marine angiosperm, Posidonia australis. Transition matrix models and sensitivity analyses were used to identify which transitions were critical for successful seedling establishment during the first year of seed recruitment and projection models were used to predict the most appropriate environments and seeding densities. Total survival probability of seedlings was low (0.001), however, transition probabilities between life-stages differed across the environmental gradients; seedling recruitment was affected by grazing and bioturbation prevailing during the first life-stage transition (1 month), and 4-6 months later during the third life-stage transition when establishing seedlings are physically removed by winter storms. Models projecting population growth from different starting seed densities showed that seeds could replace other more labour intensive and costly methods, such as transplanting adult shoots, if disturbances are moderated sufficiently and if large numbers of seed can be collected in sufficient quantity and delivered to restoration sites efficiently. These outcomes suggest that by improving management of early demographic processes, we could increase recruitment in restoration programs.

  18. Identifying Determinants of Organizational Development as the Key Developers of Employee Soft Skill

    Directory of Open Access Journals (Sweden)

    Shahjahan Laghari

    2016-10-01

    Full Text Available The purpose of this article is to identify the determinants of organizational development as the key developers of employee soft skills. Various studies have been taken where determinants of organizational development defining soft skills in employees are discussed. However, the current study is different in Pakistani industry context as the link was missing about the determinants of organizational development which in synchronized way help in developing soft skills in employees of firm. This research uses explanatory approach; incorporating secondary data extracted under the light of existing school of thoughts paired with quantification through data collected from respondents in Pakistani corporate sector. Hypotheses are tested using structural equation model (SEM technique. Results This research showed an affirmative link between determinants of organizational development and development of soft skills in employees. Finally, the study proposes enriching insights on few missing links that can be researched and triggered achieving maximized outcomes.

  19. A mouse model of alcoholic liver fibrosis-associated acute kidney injury identifies key molecular pathways

    International Nuclear Information System (INIS)

    Furuya, Shinji; Chappell, Grace A.; Iwata, Yasuhiro; Uehara, Takeki; Kato, Yuki; Kono, Hiroshi; Bataller, Ramon; Rusyn, Ivan

    2016-01-01

    Clinical data strongly indicate that acute kidney injury (AKI) is a critical complication in alcoholic hepatitis, an acute-on-chronic form of liver failure in patients with advanced alcoholic fibrosis. Development of targeted therapies for AKI in this setting is hampered by the lack of an animal model. To enable research into molecular drivers and novel therapies for fibrosis- and alcohol-associated AKI, we aimed to combine carbon tetrachloride (CCl 4 )-induced fibrosis with chronic intra-gastric alcohol feeding. Male C57BL/6J mice were administered a low dose of CCl 4 (0.2 ml/kg 2 × week/6 weeks) followed by alcohol intragastrically (up to 25 g/kg/day for 3 weeks) and with continued CCl 4 . We observed that combined treatment with CCl 4 and alcohol resulted in severe liver injury, more pronounced than using each treatment alone. Importantly, severe kidney injury was evident only in the combined treatment group. This mouse model reproduced distinct pathological features consistent with AKI in human alcoholic hepatitis. Transcriptomic analysis of kidneys revealed profound effects in the combined treatment group, with enrichment for damage-associated pathways, such as apoptosis, inflammation, immune-response and hypoxia. Interestingly, Havcr1 and Lcn2, biomarkers of AKI, were markedly up-regulated. Overall, this study established a novel mouse model of fibrosis- and alcohol-associated AKI and identified key mechanistic pathways. - Highlights: • Acute kidney injury (AKI) is a critical complication in alcoholic hepatitis • We developed a novel mouse model of fibrosis- and alcohol-associated AKI • This model reproduces key molecular and pathological features of human AKI • This animal model can help identify new targeted therapies for alcoholic hepatitis

  20. Identifying key drivers of greenhouse gas emissions from biomass feedstocks for energy production

    International Nuclear Information System (INIS)

    Johnson, David R.; Curtright, Aimee E.; Willis, Henry H.

    2013-01-01

    Highlights: • Production emissions dominate transportation and processing emissions. • Choice of feedstock, geographic location and prior land use drive emissions profile. • Within scenarios, emissions variability is driven by uncertainty in yields. • Favorable scenarios maximize carbon storage from direct land-use change. • Similarly, biomass production should attempt to minimize indirect land-use change. -- Abstract: Many policies in the United States, at both the federal and state levels, encourage the adoption of renewable energy from biomass. Though largely motivated by a desire to reduce greenhouse gas emissions, these policies do not explicitly identify scenarios in which the use of biomass will produce the greatest benefits. We have modeled “farm-to-hopper” emissions associated with seven biomass feedstocks, under a wide variety of scenarios and production choices, to characterize the uncertainty in emissions. We demonstrate that only a handful of factors have a significant impact on life cycle emissions: choice of feedstock, geographic location, prior land use, and time dynamics. Within a given production scenario, the remaining variability in emissions is driven by uncertainty in feedstock yields and the release rate of N 2 O into the atmosphere from nitrogen fertilizers. With few exceptions, transport and processing choices have relatively little impact on total emissions. These results illustrate the key decisions that will determine the success of biomass programs in reducing the emissions profile of energy production, and our publicly available model provides a useful tool for identifying the most beneficial production scenarios. While model data and results are restricted to biomass production in the contiguous United States, we provide qualitative guidance for identifying favorable production scenarios that should be applicable in other regions

  1. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  2. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana

    OpenAIRE

    Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original mult...

  3. A mouse model of alcoholic liver fibrosis-associated acute kidney injury identifies key molecular pathways

    Energy Technology Data Exchange (ETDEWEB)

    Furuya, Shinji; Chappell, Grace A.; Iwata, Yasuhiro [Department of Veterinary Integrative Biosciences, Texas A& M University, College Station, TX (United States); Uehara, Takeki; Kato, Yuki [Laboratory of Veterinary Pathology, Osaka Prefecture University, Osaka (Japan); Kono, Hiroshi [First Department of Surgery, University of Yamanashi, Yamanashi (Japan); Bataller, Ramon [Division of Gastroenterology & Hepatology, Department of Medicine, University of North Carolina, Chapel Hill, NC (United States); Rusyn, Ivan, E-mail: irusyn@tamu.edu [Department of Veterinary Integrative Biosciences, Texas A& M University, College Station, TX (United States)

    2016-11-01

    Clinical data strongly indicate that acute kidney injury (AKI) is a critical complication in alcoholic hepatitis, an acute-on-chronic form of liver failure in patients with advanced alcoholic fibrosis. Development of targeted therapies for AKI in this setting is hampered by the lack of an animal model. To enable research into molecular drivers and novel therapies for fibrosis- and alcohol-associated AKI, we aimed to combine carbon tetrachloride (CCl{sub 4})-induced fibrosis with chronic intra-gastric alcohol feeding. Male C57BL/6J mice were administered a low dose of CCl{sub 4} (0.2 ml/kg 2 × week/6 weeks) followed by alcohol intragastrically (up to 25 g/kg/day for 3 weeks) and with continued CCl{sub 4}. We observed that combined treatment with CCl{sub 4} and alcohol resulted in severe liver injury, more pronounced than using each treatment alone. Importantly, severe kidney injury was evident only in the combined treatment group. This mouse model reproduced distinct pathological features consistent with AKI in human alcoholic hepatitis. Transcriptomic analysis of kidneys revealed profound effects in the combined treatment group, with enrichment for damage-associated pathways, such as apoptosis, inflammation, immune-response and hypoxia. Interestingly, Havcr1 and Lcn2, biomarkers of AKI, were markedly up-regulated. Overall, this study established a novel mouse model of fibrosis- and alcohol-associated AKI and identified key mechanistic pathways. - Highlights: • Acute kidney injury (AKI) is a critical complication in alcoholic hepatitis • We developed a novel mouse model of fibrosis- and alcohol-associated AKI • This model reproduces key molecular and pathological features of human AKI • This animal model can help identify new targeted therapies for alcoholic hepatitis.

  4. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  5. The Single Item Literacy Screener: Evaluation of a brief instrument to identify limited reading ability

    Directory of Open Access Journals (Sweden)

    Chew Lisa D

    2006-03-01

    Full Text Available Abstract Background Reading skills are important for accessing health information, using health care services, managing one's health and achieving desirable health outcomes. Our objective was to assess the diagnostic accuracy of the Single Item Literacy Screener (SILS to identify limited reading ability, one component of health literacy, as measured by the S-TOFHLA. Methods Cross-sectional interview with 999 adults with diabetes residing in Vermont and bordering states. Participants were randomly recruited from Primary Care practices in the Vermont Diabetes Information System June 2003 – December 2004. The main outcome was limited reading ability. The primary predictor was the SILS. Results Of the 999 persons screened, 169 (17% had limited reading ability. The sensitivity of the SILS in detecting limited reading ability was 54% [95% CI: 47%, 61%] and the specificity was 83% [95% CI: 81%, 86%] with an area under the Receiver Operating Characteristics Curve (ROC of 0.73 [95% CI: 0.69, 0.78]. Seven hundred seventy (77% screened negative on the SILS and 692 of these subjects had adequate reading skills (negative predictive value = 0.90 [95% CI: 0.88, 0.92]. Of the 229 who scored positive on the SILS, 92 had limited reading ability (positive predictive value = 0.4 [95% CI: 0.34, 0.47]. Conclusion The SILS is a simple instrument designed to identify patients with limited reading ability who need help reading health-related materials. The SILS performs moderately well at ruling out limited reading ability in adults and allows providers to target additional assessment of health literacy skills to those most in need. Further study of the use of the SILS in clinical settings and with more diverse populations is warranted.

  6. A Simple Key for Identifying the Sibling Species of the Malaria Vector Anopheles gambiae (Giles Complex by Polytene Chromosome Cytogenetics

    Directory of Open Access Journals (Sweden)

    Music Temitope OBEMBE

    2018-03-01

    Full Text Available It has been established that Anopheles gambiae complex sibling species are the major Plasmodium malaria vectors in Africa; however, not all the sibling species transmit the infection. Easier molecular methods, PCR-based assays, have been developed to distinguish the several members of the A. gambiae complex. However, malaria vector research in less developed countries, particularly sub-Saharan Africa, is being hampered by the lack of PCR facilities in laboratories and the cost of carrying out the assay within lack of funding. Hence, the present study was designed to develop a simple identification key, based on an affordable method of polytene chromosome cytotaxonomy, for identifying the major P. falciparum vectors. The Identification Key was successfully used to identify two members of the A. gambiae complex, A. gambiae sensu stricto and A. arabiensis, which are the most potent malaria vectors in Africa; even so, it could not be used to establish the infective and the refractory strains.

  7. Identifying key research objectives to make European forests greener for bats

    Directory of Open Access Journals (Sweden)

    Danilo Russo

    2016-07-01

    Full Text Available Bats are a biodiverse mammal order providing key ecosystem services such as pest suppression, pollination and seed dispersal. Bats are also very sensitive to human actions, and significant declines in many bat populations have been recorded consequently. Many bat species find crucial roosting and foraging opportunities in European forests. Such forests have historically been exploited by humans and are still influenced by harvesting. One of the consequences of this pressure is the loss of key habitat resources, often making forests inhospitable to bats. Despite the legal protection granted to bats across Europe, the impacts of forestry on bats are still often neglected. Because forest exploitation influences forest structure at several spatial scales, economically viable forestry could become more sustainable and even favour bats. We highlight that a positive future for bat conservation that simultaneously benefits forestry is foreseeable, although more applied research is needed to develop sound management. Key future research topics include the detection of factors influencing the carrying capacity of forests, and determining the impacts of forest management and the economic importance of bats in forests. Predictive tools to inform forest managers are much needed, together with greater synergies between forest managers and bat conservationists.

  8. Key Clinical Features to Identify Girls with "CDKL5" Mutations

    Science.gov (United States)

    Bahi-Buisson, Nadia; Nectoux, Juliette; Rosas-Vargas, Haydee; Milh, Mathieu; Boddaert, Nathalie; Girard, Benoit; Cances, Claude; Ville, Dorothee; Afenjar, Alexandra; Rio, Marlene; Heron, Delphine; Morel, Marie Ange N'Guyen; Arzimanoglou, Alexis; Philippe, Christophe; Jonveaux, Philippe; Chelly, Jamel; Bienvenu, Thierry

    2008-01-01

    Mutations in the human X-linked cyclin-dependent kinase-like 5 ("CDKL5") gene have been shown to cause infantile spasms as well as Rett syndrome (RTT)-like phenotype. To date, less than 25 different mutations have been reported. So far, there are still little data on the key clinical diagnosis criteria and on the natural history of…

  9. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  10. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  11. Aedes albopictus and Its Environmental Limits in Europe.

    Science.gov (United States)

    Cunze, Sarah; Kochmann, Judith; Koch, Lisa K; Klimpel, Sven

    2016-01-01

    The Asian tiger mosquito Aedes albopictus, native to South East Asia, is listed as one of the worst invasive vector species worldwide. In Europe the species is currently restricted to Southern Europe, but due to the ongoing climate change, Ae. albopictus is expected to expand its potential range further northwards. In addition to modelling the habitat suitability for Ae. albopictus under current and future climatic conditions in Europe by means of the maximum entropy approach, we here focused on the drivers of the habitat suitability prediction. We explored the most limiting factors for Aedes albopictus in Europe under current and future climatic conditions, a method which has been neglected in species distribution modelling so far. Ae. albopictus is one of the best-studied mosquito species, which allowed us to evaluate the applied Maxent approach for most limiting factor mapping. We identified three key limiting factors for Ae. albopictus in Europe under current climatic conditions: winter temperature in Eastern Europe, summer temperature in Southern Europe. Model findings were in good accordance with commonly known establishment thresholds in Europe based on climate chamber experiments and derived from the geographical distribution of the species. Under future climatic conditions low winter temperature were modelled to remain the most limiting factor in Eastern Europe, whereas in Central Europe annual mean temperature and summer temperatures were modelled to be replaced by summer precipitation, respectively, as most limiting factors. Changes in the climatic conditions in terms of the identified key limiting factors will be of great relevance regarding the invasive potential of the Ae. albopictus. Thus, our results may help to understand the key drivers of the suggested range expansion under climate change and may help to improve monitoring programmes. The applied approach of investigating limiting factors has proven to yield valuable results and may also provide

  12. [Key effect genes responding to nerve injury identified by gene ontology and computer pattern recognition].

    Science.gov (United States)

    Pan, Qian; Peng, Jin; Zhou, Xue; Yang, Hao; Zhang, Wei

    2012-07-01

    In order to screen out important genes from large gene data of gene microarray after nerve injury, we combine gene ontology (GO) method and computer pattern recognition technology to find key genes responding to nerve injury, and then verify one of these screened-out genes. Data mining and gene ontology analysis of gene chip data GSE26350 was carried out through MATLAB software. Cd44 was selected from screened-out key gene molecular spectrum by comparing genes' different GO terms and positions on score map of principal component. Function interferences were employed to influence the normal binding of Cd44 and one of its ligands, chondroitin sulfate C (CSC), to observe neurite extension. Gene ontology analysis showed that the first genes on score map (marked by red *) mainly distributed in molecular transducer activity, receptor activity, protein binding et al molecular function GO terms. Cd44 is one of six effector protein genes, and attracted us with its function diversity. After adding different reagents into the medium to interfere the normal binding of CSC and Cd44, varying-degree remissions of CSC's inhibition on neurite extension were observed. CSC can inhibit neurite extension through binding Cd44 on the neuron membrane. This verifies that important genes in given physiological processes can be identified by gene ontology analysis of gene chip data.

  13. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  14. Detector dead-time effects and paralyzability in high-speed quantum key distribution

    International Nuclear Information System (INIS)

    Rogers, Daniel J; Bienfang, Joshua C; Nakassis, Anastase; Xu Hai; Clark, Charles W

    2007-01-01

    Recent advances in quantum key distribution (QKD) have given rise to systems that operate at transmission periods significantly shorter than the dead times of their component single-photon detectors. As systems continue to increase in transmission rate, security concerns associated with detector dead times can limit the production rate of sifted bits. We present a model of high-speed QKD in this limit that identifies an optimum transmission rate for a system with given link loss and detector response characteristics

  15. Partitioned key-value store with atomic memory operations

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2017-02-07

    A partitioned key-value store is provided that supports atomic memory operations. A server performs a memory operation in a partitioned key-value store by receiving a request from an application for at least one atomic memory operation, the atomic memory operation comprising a memory address identifier; and, in response to the atomic memory operation, performing one or more of (i) reading a client-side memory location identified by the memory address identifier and storing one or more key-value pairs from the client-side memory location in a local key-value store of the server; and (ii) obtaining one or more key-value pairs from the local key-value store of the server and writing the obtained one or more key-value pairs into the client-side memory location identified by the memory address identifier. The server can perform functions obtained from a client-side memory location and return a result to the client using one or more of the atomic memory operations.

  16. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  17. A qualitative case study to identify possible barriers that limit effective elementary science education

    Science.gov (United States)

    Foster, Donald Carey

    The purpose of this case study was to identify barriers that limit the effectiveness of elementary teachers in the teaching of science. It is of the utmost urgency that barriers be first identified, so that possible solutions can be explored to bring about the improvement of elementary science education. This urgency has been imposed by the scheduled national testing of students in science by 2007, as mandated by the No Child Left Behind Act of 2001. Using qualitative case study methods, the researcher conducted interviews with 8 elementary teachers from two schools within one school district who taught 3rd, 4th, and 5th grade. These interviews were designed to gain insight into barriers these elementary teachers perceived as factors limiting their effectiveness in teaching science and preparing students for high-stakes testing. Barriers in the areas of teacher background, typical teaching day, curriculum, inservices, and legislative influences were explored. This study concluded that the barriers explored do have a substantial negative affect on the teaching and learning of science in the elementary grades. Specifically, the barriers revealed in this study include the limited science background of elementary teachers, inadequate class time devoted to science, non-comprehensive curriculum, ineffective or lack of inservice training, and pressures from legislated mandates. But it is also clear that these barriers are so intertwined that one cannot remove these barriers one at a time. It will take a collective effort from all involved, including legislators, administrators, teachers, parents, and students, to alleviate these barriers and discover effective solutions to improve elementary science education.

  18. Key identifiers and spelling conventions in MXit-lingo as found in conversations with Dr Math

    Directory of Open Access Journals (Sweden)

    Laurie Butgereit

    2012-07-01

    Full Text Available Different human languages look different from other human languages. To use a term from the computer industry, each human language has its own “look and feel”. European English speakers can easily recognise a phrase such as “Comment allez-vous?” as being written in French while the phrase “¿Habla usted español?” is written in Spanish. Each language has its own letter frequencies, word frequencies and other identifiers. This paper describes key identifiers in MXit lingo as found in Dr Math conversations. MXit is a mobile instant messaging system which originated in South Africa and is expanding to other countries. Dr Math is a mobile tutoring system which uses MXit as a communication protocol. Primary and secondary school pupils can receive help with the mathematics homework using the Dr Math tutoring system. The pupils use MXit on their cell phones and the tutors use traditional Internet workstations. After exploring how MXit lingo is written, this paper will briefly explore why MXit lingo is written the way it is. By identifying and describing the orthographic conventions visible in the spelling of MXit lingo, although with some theoretical support, insight into the purposeful and functional nature of written, mobile communication will be revealed. In highlighting spelling that is influenced by Black South African English, an attempt will be made to contribute to the empirical development of a field of study that explores the construction of words used in South African mobile communication. Keywords: MXit, Math, letters, writing, orthography Disciplines: Linguistics, mathematics, information technology

  19. Bayesian inference for partially identified models exploring the limits of limited data

    CERN Document Server

    Gustafson, Paul

    2015-01-01

    Introduction Identification What Is against Us? What Is for Us? Some Simple Examples of Partially Identified ModelsThe Road Ahead The Structure of Inference in Partially Identified Models Bayesian Inference The Structure of Posterior Distributions in PIMs Computational Strategies Strength of Bayesian Updating, Revisited Posterior MomentsCredible Intervals Evaluating the Worth of Inference Partial Identification versus Model Misspecification The Siren Call of Identification Comp

  20. Identifying the impacts of climate change on key pests and diseases of plant and animal industries

    International Nuclear Information System (INIS)

    Luck, Jo; Aurambout, Jean-Philippe; Finlay, Kyla; Azuloas, Joe; Constable, Fiona; Rijswijk, Bonny Rowles-Van

    2007-01-01

    Full text: Full text: Climate change is increasingly recognised as a major threat to natural and agricultural systems. Understanding these threats will enable government and primary industries to better prepare and adapt to climate change. While observations of climate change are well documented, the potential effects on pests, pathogens and their hosts are not clearly understood. To address this, a review of the potential impacts on plant biosecurity was undertaken to determine the effects of climate change on the behaviour and distribution of emergent plant pests and pathogens. The review identified increasing C02 and temperature, decreasing frost events, heavy and unseasonal rains, increased humidity, drought, cyclones and hurricanes, and warmer winter temperatures as influencing the behaviour of plant pests and pathogens. To study the effects of these changes in detail, three key plant biosecurity threats were analysed in case studies; wheat stripe rust, silver leaf whitefly and citrus canker. The predicted distribution of citrus canker was examined with increasing temperature scenarios using the bioclimatic model CLIMEX. The model predicted a southerly shift in the geographic range of the causal organism which would threaten the major southern citrus growing regions in future climates. A similar study on Bluetongue disease of sheep, spread by the Culicoides midge, also predicted a southerly shift in the vector's geographic range. Significant limitations were identified with bioclimatic modelling when examining the effects of climate change on pests and diseases. The model was unable to assess the plant and animal response to increasing temperature in conjunction with the pest. Also the influence of temperature on the life cycle of the organism, pathogenicity of strains, competition with other species, host coverage and the general effect on the biology of the organism could not be assessed. To begin to address this, a dynamic model was constructed using daily

  1. Identifying finite-time coherent sets from limited quantities of Lagrangian data

    Energy Technology Data Exchange (ETDEWEB)

    Williams, Matthew O. [Program in Applied and Computational Mathematics, Princeton University, New Jersey 08544 (United States); Rypina, Irina I. [Department of Physical Oceanography, Woods Hole Oceanographic Institute, Massachusetts 02543 (United States); Rowley, Clarence W. [Department of Mechanical and Aerospace Engineering, Princeton University, New Jersey 08544 (United States)

    2015-08-15

    A data-driven procedure for identifying the dominant transport barriers in a time-varying flow from limited quantities of Lagrangian data is presented. Our approach partitions state space into coherent pairs, which are sets of initial conditions chosen to minimize the number of trajectories that “leak” from one set to the other under the influence of a stochastic flow field during a pre-specified interval in time. In practice, this partition is computed by solving an optimization problem to obtain a pair of functions whose signs determine set membership. From prior experience with synthetic, “data rich” test problems, and conceptually related methods based on approximations of the Perron-Frobenius operator, we observe that the functions of interest typically appear to be smooth. We exploit this property by using the basis sets associated with spectral or “mesh-free” methods, and as a result, our approach has the potential to more accurately approximate these functions given a fixed amount of data. In practice, this could enable better approximations of the coherent pairs in problems with relatively limited quantities of Lagrangian data, which is usually the case with experimental geophysical data. We apply this method to three examples of increasing complexity: The first is the double gyre, the second is the Bickley Jet, and the third is data from numerically simulated drifters in the Sulu Sea.

  2. Identifying finite-time coherent sets from limited quantities of Lagrangian data

    International Nuclear Information System (INIS)

    Williams, Matthew O.; Rypina, Irina I.; Rowley, Clarence W.

    2015-01-01

    A data-driven procedure for identifying the dominant transport barriers in a time-varying flow from limited quantities of Lagrangian data is presented. Our approach partitions state space into coherent pairs, which are sets of initial conditions chosen to minimize the number of trajectories that “leak” from one set to the other under the influence of a stochastic flow field during a pre-specified interval in time. In practice, this partition is computed by solving an optimization problem to obtain a pair of functions whose signs determine set membership. From prior experience with synthetic, “data rich” test problems, and conceptually related methods based on approximations of the Perron-Frobenius operator, we observe that the functions of interest typically appear to be smooth. We exploit this property by using the basis sets associated with spectral or “mesh-free” methods, and as a result, our approach has the potential to more accurately approximate these functions given a fixed amount of data. In practice, this could enable better approximations of the coherent pairs in problems with relatively limited quantities of Lagrangian data, which is usually the case with experimental geophysical data. We apply this method to three examples of increasing complexity: The first is the double gyre, the second is the Bickley Jet, and the third is data from numerically simulated drifters in the Sulu Sea

  3. Identifying finite-time coherent sets from limited quantities of Lagrangian data.

    Science.gov (United States)

    Williams, Matthew O; Rypina, Irina I; Rowley, Clarence W

    2015-08-01

    A data-driven procedure for identifying the dominant transport barriers in a time-varying flow from limited quantities of Lagrangian data is presented. Our approach partitions state space into coherent pairs, which are sets of initial conditions chosen to minimize the number of trajectories that "leak" from one set to the other under the influence of a stochastic flow field during a pre-specified interval in time. In practice, this partition is computed by solving an optimization problem to obtain a pair of functions whose signs determine set membership. From prior experience with synthetic, "data rich" test problems, and conceptually related methods based on approximations of the Perron-Frobenius operator, we observe that the functions of interest typically appear to be smooth. We exploit this property by using the basis sets associated with spectral or "mesh-free" methods, and as a result, our approach has the potential to more accurately approximate these functions given a fixed amount of data. In practice, this could enable better approximations of the coherent pairs in problems with relatively limited quantities of Lagrangian data, which is usually the case with experimental geophysical data. We apply this method to three examples of increasing complexity: The first is the double gyre, the second is the Bickley Jet, and the third is data from numerically simulated drifters in the Sulu Sea.

  4. Genomic Landscape Survey Identifies SRSF1 as a Key Oncodriver in Small Cell Lung Cancer.

    Directory of Open Access Journals (Sweden)

    Liyan Jiang

    2016-04-01

    Full Text Available Small cell lung cancer (SCLC is an aggressive disease with poor survival. A few sequencing studies performed on limited number of samples have revealed potential disease-driving genes in SCLC, however, much still remains unknown, particularly in the Asian patient population. Here we conducted whole exome sequencing (WES and transcriptomic sequencing of primary tumors from 99 Chinese SCLC patients. Dysregulation of tumor suppressor genes TP53 and RB1 was observed in 82% and 62% of SCLC patients, respectively, and more than half of the SCLC patients (62% harbored TP53 and RB1 mutation and/or copy number loss. Additionally, Serine/Arginine Splicing Factor 1 (SRSF1 DNA copy number gain and mRNA over-expression was strongly associated with poor survival using both discovery and validation patient cohorts. Functional studies in vitro and in vivo demonstrate that SRSF1 is important for tumorigenicity of SCLC and may play a key role in DNA repair and chemo-sensitivity. These results strongly support SRSF1 as a prognostic biomarker in SCLC and provide a rationale for personalized therapy in SCLC.

  5. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  6. Limites e possibilidades da identificação de risco de autismo no primeiro ano de vida Limits and possibilities of identifying autism within the first year of life

    Directory of Open Access Journals (Sweden)

    Mariana Luisa Garcia

    2011-01-01

    Full Text Available Identificar risco de autismo no primeiro ano de vida possibilita intervir precocemente para um prognóstico mais favorável em crianças com autismo. O objetivo deste artigo é discutir limites e possibilidades metodológicas que viabilizem a identificação de sinais de risco de autismo entre 0-12 meses. A metodologia empregada em 24 estudos (retrospectivos e prospectivos sobre identificação de sinais precoces e seus resultados foram analisados. Verificou-se que os limites da identificação de risco de autismo no primeiro ano parecem residir na buscar por categorias comportamentais discretas e que as possibilidades podem residir em analisar categorias de interação e de ordem afetiva.Identifying signs of autism in the first year of life is justified by early intervention and better prognostic. This article aims at discussing methodological limits and possibilities of identifying risk of autism at 0-12 months. Methodology from 24 retrospective and prospective early signs studies and their outcomes were analyzed. Limits of identifying risk of autism in the 1st year of life lies in observing discrete behavioral categories, and possibilities seem to lie in analyzing interactional and affective categories.

  7. An open simulation approach to identify chances and limitations for vulnerable road user (VRU) active safety.

    Science.gov (United States)

    Seiniger, Patrick; Bartels, Oliver; Pastor, Claus; Wisch, Marcus

    2013-01-01

    It is commonly agreed that active safety will have a significant impact on reducing accident figures for pedestrians and probably also bicyclists. However, chances and limitations for active safety systems have only been derived based on accident data and the current state of the art, based on proprietary simulation models. The objective of this article is to investigate these chances and limitations by developing an open simulation model. This article introduces a simulation model, incorporating accident kinematics, driving dynamics, driver reaction times, pedestrian dynamics, performance parameters of different autonomous emergency braking (AEB) generations, as well as legal and logical limitations. The level of detail for available pedestrian accident data is limited. Relevant variables, especially timing of the pedestrian appearance and the pedestrian's moving speed, are estimated using assumptions. The model in this article uses the fact that a pedestrian and a vehicle in an accident must have been in the same spot at the same time and defines the impact position as a relevant accident parameter, which is usually available from accident data. The calculations done within the model identify the possible timing available for braking by an AEB system as well as the possible speed reduction for different accident scenarios as well as for different system configurations. The simulation model identifies the lateral impact position of the pedestrian as a significant parameter for system performance, and the system layout is designed to brake when the accident becomes unavoidable by the vehicle driver. Scenarios with a pedestrian running from behind an obstruction are the most demanding scenarios and will very likely never be avoidable for all vehicle speeds due to physical limits. Scenarios with an unobstructed person walking will very likely be treatable for a wide speed range for next generation AEB systems.

  8. Structural and Psycho-Social Limits to Climate Change Adaptation in the Great Barrier Reef Region.

    Science.gov (United States)

    Evans, Louisa S; Hicks, Christina C; Adger, W Neil; Barnett, Jon; Perry, Allison L; Fidelman, Pedro; Tobin, Renae

    2016-01-01

    Adaptation, as a strategy to respond to climate change, has limits: there are conditions under which adaptation strategies fail to alleviate impacts from climate change. Research has primarily focused on identifying absolute bio-physical limits. This paper contributes empirical insight to an emerging literature on the social limits to adaptation. Such limits arise from the ways in which societies perceive, experience and respond to climate change. Using qualitative data from multi-stakeholder workshops and key-informant interviews with representatives of the fisheries and tourism sectors of the Great Barrier Reef region, we identify psycho-social and structural limits associated with key adaptation strategies, and examine how these are perceived as more or less absolute across levels of organisation. We find that actors experience social limits to adaptation when: i) the effort of pursuing a strategy exceeds the benefits of desired adaptation outcomes; ii) the particular strategy does not address the actual source of vulnerability, and; iii) the benefits derived from adaptation are undermined by external factors. We also find that social limits are not necessarily more absolute at higher levels of organisation: respondents perceived considerable opportunities to address some psycho-social limits at the national-international interface, while they considered some social limits at the local and regional levels to be effectively absolute.

  9. Deleted in breast cancer 1 limits adipose tissue fat accumulation and plays a key role in the development of metabolic syndrome phenotype.

    Science.gov (United States)

    Escande, Carlos; Nin, Veronica; Pirtskhalava, Tamar; Chini, Claudia C S; Tchkonia, Tamar; Kirkland, James L; Chini, Eduardo N

    2015-01-01

    Obesity is often regarded as the primary cause of metabolic syndrome. However, many lines of evidence suggest that obesity may develop as a protective mechanism against tissue damage during caloric surplus and that it is only when the maximum fat accumulation capacity is reached and fatty acid spillover occurs into to peripheral tissues that metabolic diseases develop. In this regard, identifying the molecular mechanisms that modulate adipocyte fat accumulation and fatty acid spillover is imperative. Here we identify the deleted in breast cancer 1 (DBC1) protein as a key regulator of fat storage capacity of adipocytes. We found that knockout (KO) of DBC1 facilitated fat cell differentiation and lipid accumulation and increased fat storage capacity of adipocytes in vitro and in vivo. This effect resulted in a "healthy obesity" phenotype. DBC1 KO mice fed a high-fat diet, although obese, remained insulin sensitive, had lower free fatty acid in plasma, were protected against atherosclerosis and liver steatosis, and lived longer. We propose that DBC1 is part of the molecular machinery that regulates fat storage capacity in adipocytes and participates in the "turn-off" switch that limits adipocyte fat accumulation and leads to fat spillover into peripheral tissues, leading to the deleterious effects of caloric surplus. © 2015 by the American Diabetes Association. Readers may use this article as long as the work is properly cited, the use is educational and not for profit, and the work is not altered.

  10. Characteristics of evolving models of care for arthritis: A key informant study

    Directory of Open Access Journals (Sweden)

    Veinot Paula

    2008-07-01

    Full Text Available Abstract Background The burden of arthritis is increasing in the face of diminishing health human resources to deliver care. In response, innovative models of care delivery are developing to facilitate access to quality care. Most models have developed in response to local needs with limited evaluation. The primary objective of this study is to a examine the range of models of care that deliver specialist services using a medical/surgical specialist and at least one other health care provider and b document the strengths and challenges of the identified models. A secondary objective is to identify key elements of best practice models of care for arthritis. Methods Semi-structured interviews were conducted with a sample of key informants with expertise in arthritis from jurisdictions with primarily publicly-funded health care systems. Qualitative data were analyzed using a constant comparative approach to identify common types of models of care, strengths and challenges of models, and key components of arthritis care. Results Seventy-four key informants were interviewed from six countries. Five main types of models of care emerged. 1 Specialized arthritis programs deliver comprehensive, multidisciplinary team care for arthritis. Two models were identified using health care providers (e.g. nurses or physiotherapists in expanded clinical roles: 2 triage of patients with musculoskeletal conditions to the appropriate services including specialists; and 3 ongoing management in collaboration with a specialist. Two models promoting rural access were 4 rural consultation support and 5 telemedicine. Key informants described important components of models of care including knowledgeable health professionals and patients. Conclusion A range of models of care for arthritis have been developed. This classification can be used as a framework for discussing care delivery. Areas for development include integration of care across the continuum, including primary

  11. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  12. Using Range-Wide Abundance Modeling to Identify Key Conservation Areas for the Micro-Endemic Bolson Tortoise (Gopherus flavomarginatus.

    Directory of Open Access Journals (Sweden)

    Cinthya A Ureña-Aranda

    Full Text Available A widespread biogeographic pattern in nature is that population abundance is not uniform across the geographic range of species: most occurrence sites have relatively low numbers, whereas a few places contain orders of magnitude more individuals. The Bolson tortoise Gopherus flavomarginatus is endemic to a small region of the Chihuahuan Desert in Mexico, where habitat deterioration threatens this species with extinction. In this study we combined field burrows counts and the approach for modeling species abundance based on calculating the distance to the niche centroid to obtain range-wide abundance estimates. For the Bolson tortoise, we found a robust, negative relationship between observed burrows abundance and distance to the niche centroid, with a predictive capacity of 71%. Based on these results we identified four priority areas for the conservation of this microendemic and threatened tortoise. We conclude that this approach may be a useful approximation for identifying key areas for sampling and conservation efforts in elusive and rare species.

  13. Habitat Restoration as a Key Conservation Lever for Woodland Caribou: A review of restoration programs and key learnings from Alberta

    Directory of Open Access Journals (Sweden)

    Paula Bentham

    2015-12-01

    Full Text Available The Recovery Strategy for the Woodland Caribou (Rangifer tarandus caribou, Boreal Population in Canada (EC, 2012, identifies coordinated actions to reclaim woodland caribou habitat as a key step to meeting current and future caribou population objectives. Actions include restoring industrial landscape features such as roads, seismic lines, pipelines, cut-lines, and cleared areas in an effort to reduce landscape fragmentation and the changes in caribou population dynamics associated with changing predator-prey dynamics in highly fragmented landscapes. Reliance on habitat restoration as a recovery action within the federal recovery strategy is high, considering all Alberta populations have less than 65% undisturbed habitat, which is identified in the recovery strategy as a threshold providing a 60% chance that a local population will be self-sustaining. Alberta’s Provincial Woodland Caribou Policy also identifies habitat restoration as a critical component of long-term caribou habitat management. We review and discuss the history of caribou habitat restoration programs in Alberta and present outcomes and highlights of a caribou habitat restoration workshop attended by over 80 representatives from oil and gas, forestry, provincial and federal regulators, academia and consulting who have worked on restoration programs. Restoration initiatives in Alberta began in 2001 and have generally focused on construction methods, revegetation treatments, access control programs, and limiting plant species favourable to alternate prey. Specific treatments include tree planting initiatives, coarse woody debris management along linear features, and efforts for multi-company and multi-stakeholder coordinated habitat restoration on caribou range. Lessons learned from these programs have been incorporated into large scale habitat restoration projects near Grande Prairie, Cold Lake, and Fort McMurray. A key outcome of our review is the opportunity to provide a

  14. Method for limiting movement of a thermal shield for a nuclear reactor, and thermal shield displacement limiter therefor

    International Nuclear Information System (INIS)

    Meuschke, R.E.; Boyd, C.H.

    1989-01-01

    This patent describes a method of limiting the movement of a thermal shield of a nuclear reactor. It comprises: machining at least four (4) pockets in upper portions of a thermal shield circumferentially about a core barrel of a nuclear reactor to receive key-wave inserts; tapping bolt holes in the pockets of the thermal shield to receive bolts; positioning key-wave inserts into the pockets of the thermal shield to be bolted in place with the bolt holes; machining dowel holes at least partially through the positioned key-way inserts and the thermal shield to receive dowel pins; positioning dowel pins in the dowel holes in the key-way insert and thermal shield to tangentially restrain movement of the thermal shield relative to the core barrel; sliding limiter keys into the key-way inserts and bolting the limiter keys to the core barrel to tangentially restrain movement of the thermal shield relative and the core barrel while allowing radial and axial movement of the thermal shield relative to the core barrel; machining dowel holes through the limiter key and at least partially through the core barrel to receive dowel pins; positioning dowel pins in the dowel holes in the limiter key and core barrel to restrain tangential movement of the thermal shield relative to the core barrel of the nuclear reactor

  15. Secondary Engineering Design Graphics Educator Service Load of Students with Identified Categorical Disabilities and Limited English Proficiency

    Science.gov (United States)

    Ernst, Jeremy V.; Li, Songze; Williams, Thomas O.

    2014-01-01

    The ever-changing student population of engineering design graphics students necessitates broader sets of instructor adeptness. Specifically, preparedness to educate and provide adequate educational access to content for students with identified categorical disabilities and Limited English Proficiency (LEP) is now an essential readiness skill for…

  16. Identifying the Key Weaknesses in Network Security at Colleges.

    Science.gov (United States)

    Olsen, Florence

    2000-01-01

    A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)

  17. Key Supplier Relationship Management: The Case of Croatian Medium-Sized and Large Manufacturing Companies

    Directory of Open Access Journals (Sweden)

    Dario Miočević

    2011-06-01

    Full Text Available The key supplier relationship management represents a vital organizational process. Companies should pay attention not only to managing customer relationships but also to managing relationships with suppliers in order to perform well. They should identify the extent to which a certain supplier adds value through the procurement process. In this line of reasoning, both theory and practice make a distinction between strategic (key and non-strategic (transactional suppliers. By employing the segmentation of the supply market, companies balance their supplier portfolio and are capable of identifying the key suppliers. They can also develop specific programs and initiatives that are aimed at preserving these relationships. In the empirical part of the paper, a survey was conducted on a sample of 123 medium-sized and large Croatian manufacturing companies. The structural model involving the relationship between the key supplier relationship management and value-oriented purchasing was tested. The results indicate that there is a statistically direct, positive and significant relationship between these two constructs. Likewise, the results stress that a theoretical conceptualization and operationalization of the key supplier relationship management construct is both valid and justified. Finally, the theoretical and practical implications and limitations of this study are offered.

  18. Simulation-based Assessment to Reliably Identify Key Resident Performance Attributes.

    Science.gov (United States)

    Blum, Richard H; Muret-Wagstaff, Sharon L; Boulet, John R; Cooper, Jeffrey B; Petrusa, Emil R; Baker, Keith H; Davidyuk, Galina; Dearden, Jennifer L; Feinstein, David M; Jones, Stephanie B; Kimball, William R; Mitchell, John D; Nadelberg, Robert L; Wiser, Sarah H; Albrecht, Meredith A; Anastasi, Amanda K; Bose, Ruma R; Chang, Laura Y; Culley, Deborah J; Fisher, Lauren J; Grover, Meera; Klainer, Suzanne B; Kveraga, Rikante; Martel, Jeffrey P; McKenna, Shannon S; Minehart, Rebecca D; Mitchell, John D; Mountjoy, Jeremi R; Pawlowski, John B; Pilon, Robert N; Shook, Douglas C; Silver, David A; Warfield, Carol A; Zaleski, Katherine L

    2018-04-01

    Obtaining reliable and valid information on resident performance is critical to patient safety and training program improvement. The goals were to characterize important anesthesia resident performance gaps that are not typically evaluated, and to further validate scores from a multiscenario simulation-based assessment. Seven high-fidelity scenarios reflecting core anesthesiology skills were administered to 51 first-year residents (CA-1s) and 16 third-year residents (CA-3s) from three residency programs. Twenty trained attending anesthesiologists rated resident performances using a seven-point behaviorally anchored rating scale for five domains: (1) formulate a clear plan, (2) modify the plan under changing conditions, (3) communicate effectively, (4) identify performance improvement opportunities, and (5) recognize limits. A second rater assessed 10% of encounters. Scores and variances for each domain, each scenario, and the total were compared. Low domain ratings (1, 2) were examined in detail. Interrater agreement was 0.76; reliability of the seven-scenario assessment was r = 0.70. CA-3s had a significantly higher average total score (4.9 ± 1.1 vs. 4.6 ± 1.1, P = 0.01, effect size = 0.33). CA-3s significantly outscored CA-1s for five of seven scenarios and domains 1, 2, and 3. CA-1s had a significantly higher proportion of worrisome ratings than CA-3s (chi-square = 24.1, P < 0.01, effect size = 1.50). Ninety-eight percent of residents rated the simulations more educational than an average day in the operating room. Sensitivity of the assessment to CA-1 versus CA-3 performance differences for most scenarios and domains supports validity. No differences, by experience level, were detected for two domains associated with reflective practice. Smaller score variances for CA-3s likely reflect a training effect; however, worrisome performance scores for both CA-1s and CA-3s suggest room for improvement.

  19. Structural and Psycho-Social Limits to Climate Change Adaptation in the Great Barrier Reef Region.

    Directory of Open Access Journals (Sweden)

    Louisa S Evans

    Full Text Available Adaptation, as a strategy to respond to climate change, has limits: there are conditions under which adaptation strategies fail to alleviate impacts from climate change. Research has primarily focused on identifying absolute bio-physical limits. This paper contributes empirical insight to an emerging literature on the social limits to adaptation. Such limits arise from the ways in which societies perceive, experience and respond to climate change. Using qualitative data from multi-stakeholder workshops and key-informant interviews with representatives of the fisheries and tourism sectors of the Great Barrier Reef region, we identify psycho-social and structural limits associated with key adaptation strategies, and examine how these are perceived as more or less absolute across levels of organisation. We find that actors experience social limits to adaptation when: i the effort of pursuing a strategy exceeds the benefits of desired adaptation outcomes; ii the particular strategy does not address the actual source of vulnerability, and; iii the benefits derived from adaptation are undermined by external factors. We also find that social limits are not necessarily more absolute at higher levels of organisation: respondents perceived considerable opportunities to address some psycho-social limits at the national-international interface, while they considered some social limits at the local and regional levels to be effectively absolute.

  20. Gene Network Construction from Microarray Data Identifies a Key Network Module and Several Candidate Hub Genes in Age-Associated Spatial Learning Impairment.

    Science.gov (United States)

    Uddin, Raihan; Singh, Shiva M

    2017-01-01

    As humans age many suffer from a decrease in normal brain functions including spatial learning impairments. This study aimed to better understand the molecular mechanisms in age-associated spatial learning impairment (ASLI). We used a mathematical modeling approach implemented in Weighted Gene Co-expression Network Analysis (WGCNA) to create and compare gene network models of young (learning unimpaired) and aged (predominantly learning impaired) brains from a set of exploratory datasets in rats in the context of ASLI. The major goal was to overcome some of the limitations previously observed in the traditional meta- and pathway analysis using these data, and identify novel ASLI related genes and their networks based on co-expression relationship of genes. This analysis identified a set of network modules in the young, each of which is highly enriched with genes functioning in broad but distinct GO functional categories or biological pathways. Interestingly, the analysis pointed to a single module that was highly enriched with genes functioning in "learning and memory" related functions and pathways. Subsequent differential network analysis of this "learning and memory" module in the aged (predominantly learning impaired) rats compared to the young learning unimpaired rats allowed us to identify a set of novel ASLI candidate hub genes. Some of these genes show significant repeatability in networks generated from independent young and aged validation datasets. These hub genes are highly co-expressed with other genes in the network, which not only show differential expression but also differential co-expression and differential connectivity across age and learning impairment. The known function of these hub genes indicate that they play key roles in critical pathways, including kinase and phosphatase signaling, in functions related to various ion channels, and in maintaining neuronal integrity relating to synaptic plasticity and memory formation. Taken together, they

  1. Using sensitivity analysis to identify key factors for the propagation of a plant epidemic.

    Science.gov (United States)

    Rimbaud, Loup; Bruchou, Claude; Dallot, Sylvie; Pleydell, David R J; Jacquot, Emmanuel; Soubeyrand, Samuel; Thébaud, Gaël

    2018-01-01

    Identifying the key factors underlying the spread of a disease is an essential but challenging prerequisite to design management strategies. To tackle this issue, we propose an approach based on sensitivity analyses of a spatiotemporal stochastic model simulating the spread of a plant epidemic. This work is motivated by the spread of sharka, caused by plum pox virus , in a real landscape. We first carried out a broad-range sensitivity analysis, ignoring any prior information on six epidemiological parameters, to assess their intrinsic influence on model behaviour. A second analysis benefited from the available knowledge on sharka epidemiology and was thus restricted to more realistic values. The broad-range analysis revealed that the mean duration of the latent period is the most influential parameter of the model, whereas the sharka-specific analysis uncovered the strong impact of the connectivity of the first infected orchard. In addition to demonstrating the interest of sensitivity analyses for a stochastic model, this study highlights the impact of variation ranges of target parameters on the outcome of a sensitivity analysis. With regard to sharka management, our results suggest that sharka surveillance may benefit from paying closer attention to highly connected patches whose infection could trigger serious epidemics.

  2. Measuring social inclusion--a key outcome in global mental health.

    Science.gov (United States)

    Baumgartner, Joy Noel; Burns, Jonathan K

    2014-04-01

    Social inclusion is increasingly recognized as a key outcome for evaluating global mental health programmes and interventions. Whereas social inclusion as an outcome is not a new concept in the field of mental health, its measurement has been hampered by varying definitions, concepts and instruments. To move the field forward, this paper reviews the currently available instruments which measure social inclusion and are reported in the literature, realizing that no single measure will be appropriate for all studies or contexts. A systematic literature search of English language peer-reviewed articles published through February 2013 was undertaken to identify scales specifically developed to measure social inclusion or social/community integration among populations with mental disorders. Five instruments were identified through the search criteria. The scales are discussed in terms of their theoretical underpinnings, domains and/or key items and their potential for use in global settings. Whereas numerous reviewed abstracts discussed mental health and social inclusion or social integration, very few were concerned with direct measurement of the construct. All identified scales were developed in high-income countries with limited attention paid to how the scale could be adapted for cross-cultural use. Social inclusion is increasingly highlighted as a key outcome for global mental health policies and programmes, yet its measurement is underdeveloped. There is need for a global cross-cultural measure that has been developed and tested in diverse settings. However, until that need is met, some of the scales presented here may be amenable to adaptation.

  3. Numerical limit analysis of keyed shear joints in concrete structures

    DEFF Research Database (Denmark)

    Herfelt, Morten Andersen; Poulsen, Peter Noe; Hoang, Linh Cao

    2016-01-01

    This paper concerns the shear capacity of keyed joints, which are transversely reinforced with overlapping U-bar loops. It is known from experimental studies that the discontinuity of the transverse reinforcement affects the capacity as well as the failure mode; however, to the best knowledge...... theorem and uses the modified Mohr-Coulomb yield criterion, which is formulated for second-order cone programming. The model provides a statically admissible stress field as well as the failure mode. Twenty-four different test specimens are modelled and the calculations are compared to the experimental...

  4. Conceptualizing childhood health problems using survey data: a comparison of key indicators

    Directory of Open Access Journals (Sweden)

    Miller Anton R

    2007-12-01

    Full Text Available Abstract Background Many definitions are being used to conceptualize child health problems. With survey data, commonly used indicators for identifying children with health problems have included chronic condition checklists, measures of activity limitations, elevated service use, and health utility thresholds. This study compares these different indicators in terms of the prevalence rates elicited, and in terms of how the subgroups identified differ. Methods Secondary data analyses used data from the National Longitudinal Survey of Children and Youth, which surveyed a nationally representative sample of Canadian children (n = 13,790. Descriptive analyses compared healthy children to those with health problems, as classified by any of the key indicators. Additional analyses examined differences between subgroups of children captured by a single indicator and those described as having health problems by multiple indicators. Results This study demonstrates that children captured by any of the indicators had poorer health than healthy children, despite the fact that over half the sample (52.2% was characterized as having a health problem by at least one indicator. Rates of child ill health differed by indicator; 5.6% had an activity limitation, 9.2% exhibited a severe health difficulty, 31.7% reported a chronic condition, and 36.6% had elevated service use. Further, the four key indicators captured different types of children. Indicator groupings differed on child and socio-demographic factors. Compared to children identified by more than one indicator, those identified only by the severe health difficulty indicator displayed more cognitive problems (p Conclusion We provide information useful to researchers when selecting indicators from survey data to identify children with health problems. Researchers and policy makers need to be aware of the impact of such definitions on prevalence rates as well as on the composition of children classified as

  5. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  6. Identifying key factors and strategies for reducing industrial CO2 emissions from a non-Kyoto protocol member's (Taiwan) perspective

    International Nuclear Information System (INIS)

    Lin, Sue J.; Lu, I.J.; Lewis, Charles

    2006-01-01

    In this study we use Divisia index approach to identify key factors affecting CO 2 emission changes of industrial sectors in Taiwan. The changes of CO 2 emission are decomposed into emission coefficient, energy intensity, industrial structure and economic growth. Furthermore, comparisons with USA, Japan, Germany, the Netherlands and South Korea are made to have a better understanding of emission tendency in these countries and to help formulate our CO 2 reduction strategies for responding to the international calls for CO 2 cuts. The results show that economic growth and high energy intensity were two key factors for the rapid increase of industrial CO 2 emission in Taiwan, while adjustment of industrial structure was the main component for the decrease. Although economic development is important, Taiwan must keep pace with the international trends for CO 2 reduction. Among the most important strategies are continuous efforts to improve energy intensity, fuel mix toward lower carbon, setting targets for industrial CO 2 cuts, and advancing green technology through technology transfer. Also, the clean development mechanism (CDM) is expected to play an important role in the future

  7. Using the Delphi Technique to Identify Key Elements for Effective and Sustainable Visitor Use Planning Frameworks

    Directory of Open Access Journals (Sweden)

    Jessica P. Fefer

    2016-04-01

    Full Text Available Protected areas around the world receive nearly 800 billion visits/year, with international tourism continuing to increase. While protected areas provide necessary benefits to communities and visitors, the increased visitation may negatively impact the resource and the recreational experience, hence the need to manage visitor use in protected areas around the world. This research focused on obtaining information from experts to document their experiences utilizing one visitor use planning framework: Visitor Experience and Resource Protection (VERP. Using the Delphi Technique, 31 experts from seven regions around the world were asked to identify elements necessary for effective visitor management, as well as elements that facilitated or limited success when using VERP. Elements were categorized and rated in terms of importance. Scoring of the final categories was analyzed using Wilcoxon and Median non-parametric statistical tests. Results suggest that planning challenges stem from limitations in organizational capacity to support a long-term, adaptive management process, inferring that VERP may be sufficiently developed, but implementation capacity may not. The results can be used to refine existing frameworks, and to aid in the development of new recreation frameworks.

  8. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  9. An approach to identify issues affecting ERP implementation in Indian SMEs

    Directory of Open Access Journals (Sweden)

    Rana Basu

    2012-06-01

    Full Text Available Purpose: The purpose of this paper is to present the findings of a study which is based on the results of a comprehensive compilation of literature and subsequent analysis of ERP implementation success issues in context to Indian Small and Medium scale Enterprises (SME’s. This paper attempts to explore the existing literature and highlight those issues on ERP implementation and further to this the researchers applied TOPSIS (Technique for order preference by similarity to ideal solution method to prioritize issues affecting successful implementation of ERP. Design/methodology/approach: Based on the literature review certain issues leading to successful ERP implementation have been identified and to identify key issues Pareto Analysis (80-20 Rule have been applied. Further to extraction of key issues a survey based on TOPSIS was carried out in Indian small and medium scale enterprises. Findings: Based on review of literature 25 issues have been identified and further Pareto analysis has been done to extract key issues which is further prioritized by applying Topsis method. Research limitations/implications: Beside those identified issues there may be other issues that need to be explored. There is scope to enhance this study by taking into consideration different type of industries and by extending number of respondents. Practical implications: By identifying key issues for SMEs, managers can better prioritize issues to make implementation process smooth without disruption. ERP vendors can take inputs from this study to change their implementation approach while targeting small scale enterprises. Originality/value: There is no published literature available which followed a similar approach in identification of the critical issues affecting ERP in small and mid-sized companies in India or in any developing economy.

  10. The influence of the key limiting factors on the limitations of heat transfer in heat pipes with various working fluids

    Directory of Open Access Journals (Sweden)

    Melnyk R. S.

    2017-04-01

    Full Text Available Aluminium and copper heat pipes with grooved and metal fibrous capillary structure are high effective heat transfer devices. They are used in different cooling systems of electronic equipment like a LED modules, microprocessors, receive-transmit modules and so on. However thus heat pipes have heat transfer limitations. There are few types of this limitations: hydraulic limitation, boiling limitation, liquid entrainment by vapor flow and sonic limitation. There is necessity to know which one of these limitations is determinant for heat pipe due to design process. At a present article calculations of maximum heat transfer ability represented. All these calculations were made for LED cooling by using heat pipes with grooved and metal fibrous capillary structures. Pentane, acetone, isobutane and water were used as a coolants. It was shown that the main operation limit for axial grooved heat pipe, which determinate maximum heat transfer ability due to inclination angle for location of cooling zone higher than evaporation zone case, is entrainment limit for pentane and acetone coolants. Nevertheless, for isobutane coolant the main limitation is a boiling limit. However, for heat pipes with metal fibrous capillary structure the main limitation is a capillary limit. This limitation was a determinant for all calculated coolants: water, pentane and acetone. For high porosity range of capillary structure, capillary limit transfer to sonic limit for heat pipes with water, that means that the vapor velocity increases to sonic velocity and can't grow any more. Due to this, coolant cant in a needed quantity infill condensation zone and the last one drained. For heat pipes with acetone and pentane, capillary limit transfer to boiling limit. All calculations were made for vapor temperature equal to 50°C, and for porosity range from 30% to 90%.

  11. Projecting biodiversity and wood production in future forest landscapes: 15 key modeling considerations.

    Science.gov (United States)

    Felton, Adam; Ranius, Thomas; Roberge, Jean-Michel; Öhman, Karin; Lämås, Tomas; Hynynen, Jari; Juutinen, Artti; Mönkkönen, Mikko; Nilsson, Urban; Lundmark, Tomas; Nordin, Annika

    2017-07-15

    A variety of modeling approaches can be used to project the future development of forest systems, and help to assess the implications of different management alternatives for biodiversity and ecosystem services. This diversity of approaches does however present both an opportunity and an obstacle for those trying to decide which modeling technique to apply, and interpreting the management implications of model output. Furthermore, the breadth of issues relevant to addressing key questions related to forest ecology, conservation biology, silviculture, economics, requires insights stemming from a number of distinct scientific disciplines. As forest planners, conservation ecologists, ecological economists and silviculturalists, experienced with modeling trade-offs and synergies between biodiversity and wood biomass production, we identified fifteen key considerations relevant to assessing the pros and cons of alternative modeling approaches. Specifically we identified key considerations linked to study question formulation, modeling forest dynamics, forest processes, study landscapes, spatial and temporal aspects, and the key response metrics - biodiversity and wood biomass production, as well as dealing with trade-offs and uncertainties. We also provide illustrative examples from the modeling literature stemming from the key considerations assessed. We use our findings to reiterate the need for explicitly addressing and conveying the limitations and uncertainties of any modeling approach taken, and the need for interdisciplinary research efforts when addressing the conservation of biodiversity and sustainable use of environmental resources. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Structural identifiability of cyclic graphical models of biological networks with latent variables.

    Science.gov (United States)

    Wang, Yulin; Lu, Na; Miao, Hongyu

    2016-06-13

    Graphical models have long been used to describe biological networks for a variety of important tasks such as the determination of key biological parameters, and the structure of graphical model ultimately determines whether such unknown parameters can be unambiguously obtained from experimental observations (i.e., the identifiability problem). Limited by resources or technical capacities, complex biological networks are usually partially observed in experiment, which thus introduces latent variables into the corresponding graphical models. A number of previous studies have tackled the parameter identifiability problem for graphical models such as linear structural equation models (SEMs) with or without latent variables. However, the limited resolution and efficiency of existing approaches necessarily calls for further development of novel structural identifiability analysis algorithms. An efficient structural identifiability analysis algorithm is developed in this study for a broad range of network structures. The proposed method adopts the Wright's path coefficient method to generate identifiability equations in forms of symbolic polynomials, and then converts these symbolic equations to binary matrices (called identifiability matrix). Several matrix operations are introduced for identifiability matrix reduction with system equivalency maintained. Based on the reduced identifiability matrices, the structural identifiability of each parameter is determined. A number of benchmark models are used to verify the validity of the proposed approach. Finally, the network module for influenza A virus replication is employed as a real example to illustrate the application of the proposed approach in practice. The proposed approach can deal with cyclic networks with latent variables. The key advantage is that it intentionally avoids symbolic computation and is thus highly efficient. Also, this method is capable of determining the identifiability of each single parameter and

  13. Thermodynamic limit for coherence-limited solar power conversion

    Science.gov (United States)

    Mashaal, Heylal; Gordon, Jeffrey M.

    2014-09-01

    The spatial coherence of solar beam radiation is a key constraint in solar rectenna conversion. Here, we present a derivation of the thermodynamic limit for coherence-limited solar power conversion - an expansion of Landsberg's elegant basic bound, originally limited to incoherent converters at maximum flux concentration. First, we generalize Landsberg's work to arbitrary concentration and angular confinement. Then we derive how the values are further lowered for coherence-limited converters. The results do not depend on a particular conversion strategy. As such, they pertain to systems that span geometric to physical optics, as well as classical to quantum physics. Our findings indicate promising potential for solar rectenna conversion.

  14. Strategies to design clinical studies to identify predictive biomarkers in cancer research.

    Science.gov (United States)

    Perez-Gracia, Jose Luis; Sanmamed, Miguel F; Bosch, Ana; Patiño-Garcia, Ana; Schalper, Kurt A; Segura, Victor; Bellmunt, Joaquim; Tabernero, Josep; Sweeney, Christopher J; Choueiri, Toni K; Martín, Miguel; Fusco, Juan Pablo; Rodriguez-Ruiz, Maria Esperanza; Calvo, Alfonso; Prior, Celia; Paz-Ares, Luis; Pio, Ruben; Gonzalez-Billalabeitia, Enrique; Gonzalez Hernandez, Alvaro; Páez, David; Piulats, Jose María; Gurpide, Alfonso; Andueza, Mapi; de Velasco, Guillermo; Pazo, Roberto; Grande, Enrique; Nicolas, Pilar; Abad-Santos, Francisco; Garcia-Donas, Jesus; Castellano, Daniel; Pajares, María J; Suarez, Cristina; Colomer, Ramon; Montuenga, Luis M; Melero, Ignacio

    2017-02-01

    The discovery of reliable biomarkers to predict efficacy and toxicity of anticancer drugs remains one of the key challenges in cancer research. Despite its relevance, no efficient study designs to identify promising candidate biomarkers have been established. This has led to the proliferation of a myriad of exploratory studies using dissimilar strategies, most of which fail to identify any promising targets and are seldom validated. The lack of a proper methodology also determines that many anti-cancer drugs are developed below their potential, due to failure to identify predictive biomarkers. While some drugs will be systematically administered to many patients who will not benefit from them, leading to unnecessary toxicities and costs, others will never reach registration due to our inability to identify the specific patient population in which they are active. Despite these drawbacks, a limited number of outstanding predictive biomarkers have been successfully identified and validated, and have changed the standard practice of oncology. In this manuscript, a multidisciplinary panel reviews how those key biomarkers were identified and, based on those experiences, proposes a methodological framework-the DESIGN guidelines-to standardize the clinical design of biomarker identification studies and to develop future research in this pivotal field. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  15. Identifying key nodes in multilayer networks based on tensor decomposition.

    Science.gov (United States)

    Wang, Dingjie; Wang, Haitao; Zou, Xiufen

    2017-06-01

    The identification of essential agents in multilayer networks characterized by different types of interactions is a crucial and challenging topic, one that is essential for understanding the topological structure and dynamic processes of multilayer networks. In this paper, we use the fourth-order tensor to represent multilayer networks and propose a novel method to identify essential nodes based on CANDECOMP/PARAFAC (CP) tensor decomposition, referred to as the EDCPTD centrality. This method is based on the perspective of multilayer networked structures, which integrate the information of edges among nodes and links between different layers to quantify the importance of nodes in multilayer networks. Three real-world multilayer biological networks are used to evaluate the performance of the EDCPTD centrality. The bar chart and ROC curves of these multilayer networks indicate that the proposed approach is a good alternative index to identify real important nodes. Meanwhile, by comparing the behavior of both the proposed method and the aggregated single-layer methods, we demonstrate that neglecting the multiple relationships between nodes may lead to incorrect identification of the most versatile nodes. Furthermore, the Gene Ontology functional annotation demonstrates that the identified top nodes based on the proposed approach play a significant role in many vital biological processes. Finally, we have implemented many centrality methods of multilayer networks (including our method and the published methods) and created a visual software based on the MATLAB GUI, called ENMNFinder, which can be used by other researchers.

  16. Identifying the limitations of conventional biofiltration of diffuse methane emissions at long-term operation.

    Science.gov (United States)

    Gómez-Cuervo, S; Hernández, J; Omil, F

    2016-08-01

    There is growing international concern about the increasing levels of greenhouse gases in the atmosphere, particularly CO2 and methane. The emissions of methane derived from human activities are associated with large flows and very low concentrations, such as those emitted from landfills and wastewater treatment plants, among others. The present work was focused on the biological methane degradation at diffuse concentrations (0.2% vv(-1)) in a conventional biofilter using a mixture of compost, perlite and bark chips as carrier. An extensive characterization of the process was carried out at long-term operation (250 days) in a fully monitored pilot plant, achieving stable conditions during the entire period. Operational parameters such as waterings, nitrogen addition and inlet loads and contact time influences were evaluated. Obtained results indicate that empty bed residence times within 4-8 min are crucial to maximize elimination rates. Waterings and the type of nitrogen supplied in the nutrient solution (ammonia or nitrate) have a strong impact on the biofilter performance. The better results compatible with a stable operation were achieved using nitrate, with elimination capacities up to 7.6 ± 1.1 g CH4 m(-3 )h(-1). The operation at low inlet concentrations (IC) implied that removal rates obtained were quite limited (ranging 3-8 g CH4 m(-3 )h(-1)); however, these results could be significantly increased (up to 20.6 g CH4 m(-3) h(-1)) at higher IC, which indicates that the mass transfer from the gas to the liquid layer surrounding the biofilm is a key limitation of the process.

  17. Defining the anesthesia gap for reproductive health procedures in resource-limited settings.

    Science.gov (United States)

    Anderson, R Eleanor; Ahn, Roy; Nelson, Brett D; Chavez, Jean; de Redon, Emily; Burke, Thomas

    2014-12-01

    In resource-limited settings, severe shortages of anesthetists and anesthesiologists lead to surgical delays that increase maternal and neonatal mortality and morbidity. To more clearly understand the individual components of the anesthesia gap pertaining to reproductive health surgeries and procedures in resource-limited settings. Medline, the Cochrane Library, CINAHL, Embase, and POPLINE were systematically searched for reports published before December 31, 2013. Search terms were related to obstetric surgery, resource-limited settings, and anesthesia. Studies that addressed the use of anesthesia in reproductive procedures in resource-limited settings were included. Reviewers independently evaluated the full text of identified studies, extracted information related to study objectives and conclusions, and identified the anesthesia gap. Overall, 14 publications met the inclusion criteria. A significant lack of infrastructure, equipment and supplies, and trained personnel were identified as key factors responsible for a lack of anesthesia services. A shortage of trained anesthesia providers, equipment, supplies, medications, and infrastructure, along with limitations in transportation in resource-limited settings have produced a wide gap between available anesthesia services and the demand for them for reproductive health surgeries and procedures. Safe, affordable, and scalable solutions to address the anesthesia gap are urgently needed. Copyright © 2014 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  18. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  19. Identifying key performance indicators in food technology contract R&D

    NARCIS (Netherlands)

    Flipse, S.M.; Sanden, van der M.C.A.; Velden, van der T.; Fortuin, F.T.J.M.; Omta, S.W.F.; Osseweijer, P.

    2013-01-01

    Innovating companies increasingly rely on outsourcing to Contract Research Organisations (CROs) for their Research and Development (R&D), which are largely understudied. This paper presents the outcome of a case study in the field of food technology contract research, identifying context

  20. An examination of the flame spread limits in a dual fuel engine

    Energy Technology Data Exchange (ETDEWEB)

    Badr, O.; Karim, G.A.; Liu, B. [Calgary Univ., Dept. of Mechanical Engineering, Calgary, AB (Canada)

    1999-10-01

    The performance of a gas-fuelled diesel engine (dual fuel) is examined at light load and an effective threshold limit to the combustion of the gaseous fuel through bulk flame spread is identified. The relationship of such a limit to some of the key operating parameters is then discussed. A comparison between the measured values of the limit with those corresponding to the lower flammability limits of the gaseous fuel when evaluated under the prevailing cylinder conditions during pilot diesel fuel ignition showed similar trends. It is suggested that such a similarity may form a basis for estimating the lean operation limits for duel a fuel combustion in engines. A simple approach for estimating the limiting equivalence ratio for the apparent bulk flame spread limit is described for a methane-fuelled dual fuel engine. (Author)

  1. Integrated RNA-Seq and sRNA-Seq Analysis Identifies Chilling and Freezing Responsive Key Molecular Players and Pathways in Tea Plant (Camellia sinensis)

    Science.gov (United States)

    Zheng, Chao; Zhao, Lei; Wang, Yu; Shen, Jiazhi; Zhang, Yinfei; Jia, Sisi; Li, Yusheng; Ding, Zhaotang

    2015-01-01

    Tea [Camellia sinensis (L) O. Kuntze, Theaceae] is one of the most popular non-alcoholic beverages worldwide. Cold stress is one of the most severe abiotic stresses that limit tea plants’ growth, survival and geographical distribution. However, the genetic regulatory network and signaling pathways involved in cold stress responses in tea plants remain unearthed. Using RNA-Seq, DGE and sRNA-Seq technologies, we performed an integrative analysis of miRNA and mRNA expression profiling and their regulatory network of tea plants under chilling (4℃) and freezing (-5℃) stress. Differentially expressed (DE) miRNA and mRNA profiles were obtained based on fold change analysis, miRNAs and target mRNAs were found to show both coherent and incoherent relationships in the regulatory network. Furthermore, we compared several key pathways (e.g., ‘Photosynthesis’), GO terms (e.g., ‘response to karrikin’) and transcriptional factors (TFs, e.g., DREB1b/CBF1) which were identified as involved in the early chilling and/or freezing response of tea plants. Intriguingly, we found that karrikins, a new group of plant growth regulators, and β-primeverosidase (BPR), a key enzyme functionally relevant with the formation of tea aroma might play an important role in both early chilling and freezing response of tea plants. Quantitative reverse transcriptase-polymerase chain reaction (qRT-PCR) analysis further confirmed the results from RNA-Seq and sRNA-Seq analysis. This is the first study to simultaneously profile the expression patterns of both miRNAs and mRNAs on a genome-wide scale to elucidate the molecular mechanisms of early responses of tea plants to cold stress. In addition to gaining a deeper insight into the cold resistant characteristics of tea plants, we provide a good case study to analyse mRNA/miRNA expression and profiling of non-model plant species using next-generation sequencing technology. PMID:25901577

  2. In-Silico Integration Approach to Identify a Key miRNA Regulating a Gene Network in Aggressive Prostate Cancer

    Science.gov (United States)

    Colaprico, Antonio; Bontempi, Gianluca; Castiglioni, Isabella

    2018-01-01

    Like other cancer diseases, prostate cancer (PC) is caused by the accumulation of genetic alterations in the cells that drives malignant growth. These alterations are revealed by gene profiling and copy number alteration (CNA) analysis. Moreover, recent evidence suggests that also microRNAs have an important role in PC development. Despite efforts to profile PC, the alterations (gene, CNA, and miRNA) and biological processes that correlate with disease development and progression remain partially elusive. Many gene signatures proposed as diagnostic or prognostic tools in cancer poorly overlap. The identification of co-expressed genes, that are functionally related, can identify a core network of genes associated with PC with a better reproducibility. By combining different approaches, including the integration of mRNA expression profiles, CNAs, and miRNA expression levels, we identified a gene signature of four genes overlapping with other published gene signatures and able to distinguish, in silico, high Gleason-scored PC from normal human tissue, which was further enriched to 19 genes by gene co-expression analysis. From the analysis of miRNAs possibly regulating this network, we found that hsa-miR-153 was highly connected to the genes in the network. Our results identify a four-gene signature with diagnostic and prognostic value in PC and suggest an interesting gene network that could play a key regulatory role in PC development and progression. Furthermore, hsa-miR-153, controlling this network, could be a potential biomarker for theranostics in high Gleason-scored PC. PMID:29562723

  3. Identification of Key Indicators for Sustainable Construction Materials

    Directory of Open Access Journals (Sweden)

    Humphrey Danso

    2018-01-01

    Full Text Available Studies on sustainable construction materials are on the rise with their environmental, social, and economic benefits. This study identifies the key indicators for measuring sustainable construction materials. The design used for the study was that of a survey which relied on a questionnaire with five-point Likert scale to generate data for the analysis. For this purpose, 25 indicators from the three dimensions (environmental, social, and economic identified from the literature were presented to the respondents in a structured questionnaire, and responses were collected and analysed using SPSS. The study identified three key environmental indicators for measuring sustainable construction materials, and these indicators are human toxicity, climate change, and solid waste. Furthermore, adaptability, thermal comfort, local resources, and housing for all were identified as the four key social indicators for sustainable construction materials. In addition, maintenance cost, operational cost, initial cost, long-term savings, and life span were found to be the five key economic indicators for measuring sustainable construction materials. The study therefore suggests that these twelve indicators should be considered in future studies that seek to measure sustainable construction materials.

  4. Resilience Analysis of Key Update Strategies for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Severe resource limitations in certain types of networks lead to various open issues in security. Since such networks usually operate in unattended or hostile environments, revoking the cryptographic keys and establishing (also distributing) new keys – which we refer to as key update – is a criti...

  5. Selecting of key safety parameters in reactor nuclear safety supervision

    International Nuclear Information System (INIS)

    He Fan; Yu Hong

    2014-01-01

    The safety parameters indicate the operational states and safety of research reactor are the basis of nuclear safety supervision institution to carry out effective supervision to nuclear facilities. In this paper, the selecting of key safety parameters presented by the research reactor operating unit to National Nuclear Safety Administration that can express the research reactor operational states and safety when operational occurrence or nuclear accident happens, and the interrelationship between them are discussed. Analysis shows that, the key parameters to nuclear safety supervision of research reactor including design limits, operational limits and conditions, safety system settings, safety limits, acceptable limits and emergency action level etc. (authors)

  6. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal – a case study from health science [version 2; referees: 1 approved, 2 approved with reservations

    Directory of Open Access Journals (Sweden)

    Heidi Holst Madsen

    2016-09-01

    Full Text Available Unique identifiers (UID are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI, incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of

  7. Small Private Key PKS on an Embedded Microprocessor

    OpenAIRE

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor...

  8. Tetrapods on the EDGE: Overcoming data limitations to identify phylogenetic conservation priorities

    Science.gov (United States)

    Gray, Claudia L.; Wearn, Oliver R.; Owen, Nisha R.

    2018-01-01

    The scale of the ongoing biodiversity crisis requires both effective conservation prioritisation and urgent action. As extinction is non-random across the tree of life, it is important to prioritise threatened species which represent large amounts of evolutionary history. The EDGE metric prioritises species based on their Evolutionary Distinctiveness (ED), which measures the relative contribution of a species to the total evolutionary history of their taxonomic group, and Global Endangerment (GE), or extinction risk. EDGE prioritisations rely on adequate phylogenetic and extinction risk data to generate meaningful priorities for conservation. However, comprehensive phylogenetic trees of large taxonomic groups are extremely rare and, even when available, become quickly out-of-date due to the rapid rate of species descriptions and taxonomic revisions. Thus, it is important that conservationists can use the available data to incorporate evolutionary history into conservation prioritisation. We compared published and new methods to estimate missing ED scores for species absent from a phylogenetic tree whilst simultaneously correcting the ED scores of their close taxonomic relatives. We found that following artificial removal of species from a phylogenetic tree, the new method provided the closest estimates of their “true” ED score, differing from the true ED score by an average of less than 1%, compared to the 31% and 38% difference of the previous methods. The previous methods also substantially under- and over-estimated scores as more species were artificially removed from a phylogenetic tree. We therefore used the new method to estimate ED scores for all tetrapods. From these scores we updated EDGE prioritisation rankings for all tetrapod species with IUCN Red List assessments, including the first EDGE prioritisation for reptiles. Further, we identified criteria to identify robust priority species in an effort to further inform conservation action whilst

  9. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  10. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  11. Genome-wide expression profiling analysis to identify key genes in the anti-HIV mechanism of CD4+ and CD8+ T cells.

    Science.gov (United States)

    Gao, Lijie; Wang, Yunqi; Li, Yi; Dong, Ya; Yang, Aimin; Zhang, Jie; Li, Fengying; Zhang, Rongqiang

    2018-07-01

    Comprehensive bioinformatics analyses were performed to explore the key biomarkers in response to HIV infection of CD4 + and CD8 + T cells. The numbers of CD4 + and CD8 + T cells of HIV infected individuals were analyzed and the GEO database (GSE6740) was screened for differentially expressed genes (DEGs) in HIV infected CD4 + and CD8 + T cells. Gene Ontology enrichment, KEGG pathway analyses, and protein-protein interaction (PPI) network were performed to identify the key pathway and core proteins in anti-HIV virus process of CD4 + and CD8 + T cells. Finally, we analyzed the expressions of key proteins in HIV-infected T cells (GSE6740 dataset) and peripheral blood mononuclear cells(PBMCs) (GSE511 dataset). 1) CD4 + T cells counts and ratio of CD4 + /CD8 + T cells decreased while CD8 + T cells counts increased in HIV positive individuals; 2) 517 DEGs were found in HIV infected CD4 + and CD8 + T cells at acute and chronic stage with the criterial of P-value T cells. The main biological processes of the DEGs were response to virus and defense response to virus. At chronic stage, ISG15 protein, in conjunction with IFN-1 pathway might play key roles in anti-HIV responses of CD4 + T cells; and 4) The expression of ISG15 increased in both T cells and PBMCs after HIV infection. Gene expression profile of CD4 + and CD8 + T cells changed significantly in HIV infection, in which ISG15 gene may play a central role in activating the natural antiviral process of immune cells. © 2018 Wiley Periodicals, Inc.

  12. KeyPathwayMiner 4.0

    DEFF Research Database (Denmark)

    Alcaraz, Nicolas; Pauling, Josch; Batra, Richa

    2014-01-01

    release of KeyPathwayMiner (version 4.0) that is not limited to analyses of single omics data sets, e.g. gene expression, but is able to directly combine several different omics data types. Version 4.0 can further integrate existing knowledge by adding a search bias towards sub-networks that contain...... (avoid) genes provided in a positive (negative) list. Finally the new release now also provides a set of novel visualization features and has been implemented as an app for the standard bioinformatics network analysis tool: Cytoscape. CONCLUSION: With KeyPathwayMiner 4.0, we publish a Cytoscape app...

  13. Eight Key Facets of Small Business Management.

    Science.gov (United States)

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  14. The building blocks of a 'Liveable Neighbourhood': Identifying the key performance indicators for walking of an operational planning policy in Perth, Western Australia.

    Science.gov (United States)

    Hooper, Paula; Knuiman, Matthew; Foster, Sarah; Giles-Corti, Billie

    2015-11-01

    Planning policy makers are requesting clearer guidance on the key design features required to build neighbourhoods that promote active living. Using a backwards stepwise elimination procedure (logistic regression with generalised estimating equations adjusting for demographic characteristics, self-selection factors, stage of construction and scale of development) this study identified specific design features (n=16) from an operational planning policy ("Liveable Neighbourhoods") that showed the strongest associations with walking behaviours (measured using the Neighbourhood Physical Activity Questionnaire). The interacting effects of design features on walking behaviours were also investigated. The urban design features identified were grouped into the "building blocks of a Liveable Neighbourhood", reflecting the scale, importance and sequencing of the design and implementation phases required to create walkable, pedestrian friendly developments. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Challenges for strengthening the health workforce in the Lao People's Democratic Republic: perspectives from key stakeholders.

    Science.gov (United States)

    Qian, Yi; Yan, Fei; Wang, Wei; Clancy, Shayna; Akkhavong, Kongsap; Vonglokham, Manithong; Outhensackda, Somphou; Østbye, Truls

    2016-11-29

    The Lao People's Democratic Republic is facing a critical shortage and maldistribution of health workers. Strengthening of the health workforce has been adopted as one of the five priorities of the National Health Sector Strategy (2013-2025). This study aims to identify, explore, and better understand the key challenges for strengthening the Laotian health workforce. This study applied exploratory and descriptive qualitative methods and adapted a working life-span framework. Twenty-three key stakeholders with particular insights into the current situation of the health workforce were purposively recruited for in-depth interviews. Important policy documents were also collected from key informants during the interviews. Thematic analysis was employed for the textual data using MAXQDA 10. The overarching problem is that there is a perceived severe shortage of skilled health workers (doctors, nurses, and midwives) and lab technicians, especially in primary health facilities and rural areas. Key informants also identified five problems: insufficient production of health workers both in quantity and quality, a limited national budget to recruit enough health staff and provide sufficient and equitable salaries and incentives, limited management capacity, poor recruitment for work in rural areas, and lack of well-designed continuing education programs for professional development. These problems are interrelated, both in how the issues arise and in the effect they have on one another. To improve the distribution of health workers in rural areas, strategies for increasing production and strengthening retention should be well integrated for better effectiveness. It is also essential to take the Laotian-specific context into consideration during intervention development and implementation. Furthermore, the government should acknowledge the inadequate health management capacity and invest to improve human resource management capacity at all levels. Finally, assessment of

  16. Hillslope characterization: Identifying key controls on local-scale plant communities' distribution using remote sensing and subsurface data fusion.

    Science.gov (United States)

    Falco, N.; Wainwright, H. M.; Dafflon, B.; Leger, E.; Peterson, J.; Steltzer, H.; Wilmer, C.; Williams, K. H.; Hubbard, S. S.

    2017-12-01

    Mountainous watershed systems are characterized by extreme heterogeneity in hydrological and pedological properties that influence biotic activities, plant communities and their dynamics. To gain predictive understanding of how ecosystem and watershed system evolve under climate change, it is critical to capture such heterogeneity and to quantify the effect of key environmental variables such as topography, and soil properties. In this study, we exploit advanced geophysical and remote sensing techniques - coupled with machine learning - to better characterize and quantify the interactions between plant communities' distribution and subsurface properties. First, we have developed a remote sensing data fusion framework based on the random forest (RF) classification algorithm to estimate the spatial distribution of plant communities. The framework allows the integration of both plant spectral and structural information, which are derived from multispectral satellite images and airborne LiDAR data. We then use the RF method to evaluate the estimated plant community map, exploiting the subsurface properties (such as bedrock depth, soil moisture and other properties) and geomorphological parameters (such as slope, curvature) as predictors. Datasets include high-resolution geophysical data (electrical resistivity tomography) and LiDAR digital elevation maps. We demonstrate our approach on a mountain hillslope and meadow within the East River watershed in Colorado, which is considered to be a representative headwater catchment in the Upper Colorado Basin. The obtained results show the existence of co-evolution between above and below-ground processes; in particular, dominant shrub communities in wet and flat areas. We show that successful integration of remote sensing data with geophysical measurements allows identifying and quantifying the key environmental controls on plant communities' distribution, and provides insights into their potential changes in the future

  17. Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Kizhvatov, Ilya; Manzoor, Kamran

    2016-01-01

    , this algorithm outputs the full combined keys in the optimal order – from more likely to less likely ones. OKEA uses plenty of memory by its nature though, which limits its practical efficiency. Especially in the cases where the side-channel traces are noisy, the memory and running time requirements to find...... the right key can be prohibitively high. To tackle this problem, we propose a score-based key enumeration algorithm (SKEA). Though it is suboptimal in terms of the output order of candidate combined keys, SKEA’s memory and running time requirements are more practical than those of OKEA. We verify...... the advantage at the example of a DPA attack on an 8-bit embedded software implementation of AES-128. We vary the number of traces available to the adversary and report a significant increase in the success rate of the key recovery due to SKEA when compared to OKEA, within practical limitations on time...

  18. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  19. Local and regional energy companies offering energy services: Key activities and implications for the business model

    International Nuclear Information System (INIS)

    Kindström, Daniel; Ottosson, Mikael

    2016-01-01

    Highlights: • Many companies providing energy services are experiencing difficulties. • This research identifies key activities for the provision of energy services. • Findings are aggregated to the business-model level providing managerial insights. • This research identifies two different business model innovation paths. • Energy companies may need to renew parts of, or the entire, business model. - Abstract: Energy services play a key role in increasing energy efficiency in the industry. The key actors in these services are the local and regional energy companies that are increasingly implementing energy services as part of their market offering and developing service portfolios. Although expectations for energy services have been high, progress has so far been limited, and many companies offering energy services, including energy companies, are experiencing difficulties in implementing energy services and providing them to the market. Overall, this research examines what is needed for local and regional energy companies to successfully implement energy services (and consequently provide them to the market). In doing this, a two-stage process is used: first, we identify key activities for the successful implementation of energy services, and second, we aggregate the findings to the business model level. This research demonstrates that to succeed in implementing energy services, an energy company may need to renew parts or all of its existing product-based business model, formulate a new business model, or develop coexisting multiple business models. By discussing two distinct business model innovation processes, this research demonstrates that there can be different paths to success.

  20. Limitations in global information on species occurrences

    Directory of Open Access Journals (Sweden)

    Carsten Meyer

    2016-07-01

    Full Text Available Detailed information on species distributions is crucial for answering central questions in biogeography, ecology, evolutionary biology and conservation. Millions of species occurrence records have been mobilized via international data-sharing networks, but inherent biases, gaps and uncertainties hamper broader application. In my PhD thesis, I presented the first comprehensive analyses of global patterns and drivers of these limitations across different taxonomic groups and spatial scales. Integrating 300 million occurrence records for terrestrial vertebrates and plants with comprehensive taxonomic databases, expert range maps and regional checklists, I demonstrated extensive taxonomic, geographical and temporal biases, gaps and uncertainties. I identified key socio-economic drivers of data bias across different taxonomic groups and spatial scales. The results of my dissertation provide an empirical baseline for effectively accounting for data limitations in distribution models, as well as for prioritizing and monitoring efforts to collate additional occurrence information.

  1. Labont? Identifies Key Issues for Health Promoters in the New World Order

    OpenAIRE

    Raphael, Dennis

    2016-01-01

    For over 35 years Ronald Labonté has been critically analyzing the state of health promotion in Canada and the world. In 1981, he identified the shortcomings of the groundbreaking Lalonde Report by warning of the seductive appeal of so-called lifestyle approaches to health. Since then, he has left a trail of critical work identifying the barriers to — and opportunities for —health promotion work. More recently, he has shown how the rise of economic globalization and acceptance of neo-liberal ...

  2. Identifying Predictors, Moderators, and Mediators of Antidepressant Response in Major Depressive Disorder: Neuroimaging Approaches

    Science.gov (United States)

    Phillips, Mary L.; Chase, Henry W.; Sheline, Yvette I.; Etkin, Amit; Almeida, Jorge R.C.; Deckersbach, Thilo; Trivedi, Madhukar H.

    2015-01-01

    Objective Despite significant advances in neuroscience and treatment development, no widely accepted biomarkers are available to inform diagnostics or identify preferred treatments for individuals with major depressive disorder. Method In this critical review, the authors examine the extent to which multimodal neuroimaging techniques can identify biomarkers reflecting key pathophysiologic processes in depression and whether such biomarkers may act as predictors, moderators, and mediators of treatment response that might facilitate development of personalized treatments based on a better understanding of these processes. Results The authors first highlight the most consistent findings from neuroimaging studies using different techniques in depression, including structural and functional abnormalities in two parallel neural circuits: serotonergically modulated implicit emotion regulation circuitry, centered on the amygdala and different regions in the medial prefrontal cortex; and dopaminergically modulated reward neural circuitry, centered on the ventral striatum and medial prefrontal cortex. They then describe key findings from the relatively small number of studies indicating that specific measures of regional function and, to a lesser extent, structure in these neural circuits predict treatment response in depression. Conclusions Limitations of existing studies include small sample sizes, use of only one neuroimaging modality, and a focus on identifying predictors rather than moderators and mediators of differential treatment response. By addressing these limitations and, most importantly, capitalizing on the benefits of multimodal neuroimaging, future studies can yield moderators and mediators of treatment response in depression to facilitate significant improvements in shorter- and longer-term clinical and functional outcomes. PMID:25640931

  3. Identifying predictors, moderators, and mediators of antidepressant response in major depressive disorder: neuroimaging approaches.

    Science.gov (United States)

    Phillips, Mary L; Chase, Henry W; Sheline, Yvette I; Etkin, Amit; Almeida, Jorge R C; Deckersbach, Thilo; Trivedi, Madhukar H

    2015-02-01

    Despite significant advances in neuroscience and treatment development, no widely accepted biomarkers are available to inform diagnostics or identify preferred treatments for individuals with major depressive disorder. In this critical review, the authors examine the extent to which multimodal neuroimaging techniques can identify biomarkers reflecting key pathophysiologic processes in depression and whether such biomarkers may act as predictors, moderators, and mediators of treatment response that might facilitate development of personalized treatments based on a better understanding of these processes. The authors first highlight the most consistent findings from neuroimaging studies using different techniques in depression, including structural and functional abnormalities in two parallel neural circuits: serotonergically modulated implicit emotion regulation circuitry, centered on the amygdala and different regions in the medial prefrontal cortex; and dopaminergically modulated reward neural circuitry, centered on the ventral striatum and medial prefrontal cortex. They then describe key findings from the relatively small number of studies indicating that specific measures of regional function and, to a lesser extent, structure in these neural circuits predict treatment response in depression. Limitations of existing studies include small sample sizes, use of only one neuroimaging modality, and a focus on identifying predictors rather than moderators and mediators of differential treatment response. By addressing these limitations and, most importantly, capitalizing on the benefits of multimodal neuroimaging, future studies can yield moderators and mediators of treatment response in depression to facilitate significant improvements in shorter- and longer-term clinical and functional outcomes.

  4. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  5. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  6. RNA-Seq analysis identifies key genes associated with haustorial development in the root hemiparasite Santalum album

    Directory of Open Access Journals (Sweden)

    Xinhua eZhang

    2015-09-01

    Full Text Available Santalum album (sandalwood is one of the economically important plant species in the Santalaceae for its production of highly valued perfume oils. Sandalwood is also a hemiparasitic tree that obtains some of its water and simple nutrients by tapping into other plants through haustoria which are highly specialized organs in parasitic angiosperms. However, an understanding of the molecular mechanisms involved in haustorium development is limited. In this study, RNA sequencing (RNA-seq analyses were performed to identify changes in gene expression and metabolic pathways associated with the development of the S. album haustorium. A total of 56,011 non-redundant contigs with a mean contig size of 618 bp were obtained by de novo assembly of the transcriptome of haustoria and non-haustorial seedling roots. A substantial number of the identified differentially expressed genes were involved in cell wall metabolism and protein metabolism, as well as mitochondrial electron transport functions. Phytohormone-mediated regulation might play an important role during haustorial development. Especially, auxin signaling is likely to be essential for haustorial initiation, and genes related to cytokinin and gibberellin biosynthesis and metabolism are involved in haustorial development. Our results suggest that genes encoding nodulin-like proteins may be important for haustorial morphogenesis in S. album. The obtained sequence data will become a rich resource for future research in this interesting species. This information improves our understanding of haustorium development in root hemiparasitic species and will allow further exploration of the detailed molecular mechanisms underlying plant parasitism.

  7. [Breast cancer screening in Austria: Key figures, age limits, screening intervals and evidence].

    Science.gov (United States)

    Jeitler, Klaus; Semlitsch, Thomas; Posch, Nicole; Siebenhofer, Andrea; Horvath, Karl

    2015-01-01

    In January 2014, the first nationwide quality-assured breast cancer screening program addressing women aged ≥ 40 years was introduced in Austria. As part of the process of developing a patient information leaflet, the Evidence Based Medicine (EBM) Review Center of the Medical University of Graz was charged with the task of assessing the potential benefits and harms of breast cancer screening from the available evidence. Based on these results, key figures were derived for mortality, false-positive and false-negative mammography results, and overdiagnosis, considering Austria-specific incidence rates for breast cancer and breast cancer mortality. Furthermore, the current evidence regarding age limits and screening interval, which were the subjects of controversial public discussions, was analyzed. A systematic search for primary and secondary literature was performed and additional evidence was screened, e. g., evaluation reports of European breast cancer screening programs. On the basis of the available evidence and of the Austrian breast cancer mortality and incidence rates, it can be assumed that - depending on the age group - 1 to 4 breast cancer deaths can be avoided per 1,000 women screened in a structured breast cancer screening program, while the overall mortality remains unchanged. On the other hand, 150 to 200 of these 1,000 women will be affected by false-positive results and 1 to 9 women by overdiagnosis due to the structured breast cancer screening. Therefore, the overall benefit-harm balance is uncertain. If women from 40 to 44 or above 70 years of age are considered, who can also participate in the Austrian screening program, even a negative benefit-harm balance seems possible. However, with the implementation of quality standards in breast cancer screening and the dissemination of a patient information leaflet, an improvement in the medical treatment situation, specifically in terms of informed decision-making, can be expected. Copyright © 2015

  8. Investigating key beliefs guiding mothers' dietary decisions for their 2-3 year old.

    Science.gov (United States)

    Spinks, Teagan; Hamilton, Kyra

    2015-06-01

    Currently, there is no research in Australia that systematically investigates the underlying beliefs for mothers' decisions regarding their young child's nutritional needs based on current guidelines. We aimed to determine, using a Theory of Planned Behaviour (TPB) belief-based approach, key beliefs that guide mothers' decisions with regards to: (a) providing their child with a wide range of foods from the five food groups ('healthy eating'); and (b) limiting their child's intake of 'discretionary choices' (e.g. lollies). Mothers (N = 197, M age = 34.39, SD = 5.65) completed a main questionnaire either online or on hard copy (paper-based), with a 1-week phone follow-up of the target behaviours (N = 161). Correlations and multiple regression analyses were conducted, and a number of key behavioural, normative, and control beliefs emerged for both healthy eating and discretionary choice behaviours. For healthy eating, mothers identified behavioural beliefs 'improving my child's health' and 'resistance from my child'; normative beliefs 'other family members' and 'spouse/partner'; and control beliefs 'child's food preferences'. For discretionary choices, behavioural beliefs 'maintain consistent energy levels in my child' for intentions, and 'give my child their required nutritional intake'; normative beliefs 'spouse/partner', 'healthcare professionals' and 'friends'; and control beliefs 'child's food preferences' were identified. These findings can inform the development of future intervention programmes aimed at modifying mothers' child feeding practices to encourage healthy eating and limit discretionary choice intake and, ultimately, increase the life expectancy of the current generation of children. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    Science.gov (United States)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  10. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  11. Setting Organizational Key Performance Indicators in the Precision Machine Industry

    Directory of Open Access Journals (Sweden)

    Mei-Hsiu Hong

    2015-11-01

    Full Text Available The aim of this research is to define (or set organizational key performance indicators (KPIs in the precision machine industry using the concept of core competence and the supply chain operations reference (SCOR model. The research is conducted in three steps. In the first step, a benchmarking study is conducted to collect major items of core competence and to group them into main categories in order to form a foundation for the research. In the second step, a case company questionnaire and interviews are conducted to identify the key factors of core competence in the precision machine industry. The analysis is conducted based on four dimensions and hence several analysis rounds are completed. Questionnaire data is analyzed with grey relational analysis (GRA and resulted in 5–6 key factors in each dimension or sub-dimension. Based on the conducted interviews, 13 of these identified key factors are separated into one organization objective, five key factors of core competence and seven key factors of core ability. In the final step, organizational KPIs are defined (or set for the five identified key factors of core competence. The most competitive core abilities for each of the five key factors are established. After that, organizational KPIs are set based on the core abilities within 3 main categories of KPIs (departmental, office grade and hierarchal for each key factor. The developed KPI system based on organizational objectives, core competences, and core abilities allow enterprises to handle dynamic market demand and business environments, as well as changes in overall corporate objectives.

  12. Funnel plot control limits to identify poorly performing healthcare providers when there is uncertainty in the value of the benchmark.

    Science.gov (United States)

    Manktelow, Bradley N; Seaton, Sarah E; Evans, T Alun

    2016-12-01

    There is an increasing use of statistical methods, such as funnel plots, to identify poorly performing healthcare providers. Funnel plots comprise the construction of control limits around a benchmark and providers with outcomes falling outside the limits are investigated as potential outliers. The benchmark is usually estimated from observed data but uncertainty in this estimate is usually ignored when constructing control limits. In this paper, the use of funnel plots in the presence of uncertainty in the value of the benchmark is reviewed for outcomes from a Binomial distribution. Two methods to derive the control limits are shown: (i) prediction intervals; (ii) tolerance intervals Tolerance intervals formally include the uncertainty in the value of the benchmark while prediction intervals do not. The probability properties of 95% control limits derived using each method were investigated through hypothesised scenarios. Neither prediction intervals nor tolerance intervals produce funnel plot control limits that satisfy the nominal probability characteristics when there is uncertainty in the value of the benchmark. This is not necessarily to say that funnel plots have no role to play in healthcare, but that without the development of intervals satisfying the nominal probability characteristics they must be interpreted with care. © The Author(s) 2014.

  13. Identifying Key Flavors in Strawberries Driving Liking via Internal and External Preference Mapping.

    Science.gov (United States)

    Oliver, Penelope; Cicerale, Sara; Pang, Edwin; Keast, Russell

    2018-04-01

    Australian consumers desire the development of a more flavorsome Australian strawberry cultivar. To aid in the development of well-liked strawberries, the attributes driving liking need to be identified. The objective of this research is to apply Preference Mapping (PM) techniques to the descriptive profile of commercial and newly bred strawberry cultivars, together with consumer preference data to determine the flavors contributing to liking. A trained sensory panel (n = 12) used Quantitative Descriptive Analysis (QDA®) methodology to evaluate two appearance, seven aroma, five texture, 10 flavor and 10 aftertaste attributes of three commercial strawberry cultivars and six elite breeding lines grown in Victoria, Australia. Strawberry consumers (n = 150) assessed their liking of the same strawberry cultivars. QDA® significantly discriminated strawberries on 28 of the 34 sensory attributes. There were significant differences in hedonic ratings of strawberries (F(8,714) = 11.5, P = 0.0001), with Hierarchical Cluster Analysis (HCA) identifying three consumer clusters each displaying differing patterns of preference. Internal and external PM techniques were applied to the data to identify the attributes driving consumer acceptability. Sweet, berry, caramel, fruity and floral attributes were identified as most contributing to liking. Sour, citrus, green, astringent, firm and gritty attributes were conversely associated with a reduction in consumer liking. Elite Lines 2 and 6 have been identified as having the broadest appeal, satisfying between 60% and 70% of consumers in the population assessed, thus the introduction of these cultivars should satisfy the largest group of consumers in the Australian market. The results of this research could be applied to breeding programs, to ensure newly bred cultivars express characteristics that were identified as well-liked amongst consumers. In addition, this research provides evidence for marketing strawberries by

  14. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  15. LBTool: A stochastic toolkit for leave-based key updates

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    Quantitative techniques have been successfully employed in verification of information and communication systems. However, the use of such techniques are still rare in the area of security. In this paper, we present a toolkit that implements transient analysis on a key update method for wireless...... sensor networks. The analysis aims to find out the probability of a network key being compromised at a specific time point, which result in fluctuations over time for a specific key update method called Leave-based key update. For such a problem, the use of current tools is limited in many ways...

  16. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  17. Efficient Key Management System for Large-scale Smart RFID Applications

    Directory of Open Access Journals (Sweden)

    Mohammad Fal Sadikin

    2015-08-01

    Full Text Available Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system. Indeed, it is not feasible to recall all RFID tags in order to update their security properties (e.g. update their private keys. On the other hand, using common key management solution like standard TLS/SSL is too heavy-weight that can drain and overload the limited resources. Furthermore, most of existing solutions are highly susceptible to various threats reaching from privacy threats, physical attacks to various technics of Man-in-the-Middle attacks. This paper introduces novel key management system, tailored to the limited resources of smart RFID system. It proposes light-weight mutual authentication and identity protection to mitigate the existing threats.

  18. High-Rate Field Demonstration of Large-Alphabet Quantum Key Distribution

    Science.gov (United States)

    2016-10-12

    count rate of Bob’s detectors. In this detector-limited regime , it is advantageous to increase M to encode as much information as possible in each...High- rate field demonstration of large-alphabet quantum key distribution Catherine Lee,1, 2 Darius Bunandar,1 Zheshen Zhang,1 Gregory R. Steinbrecher...October 12, 2016) 2 Quantum key distribution (QKD) enables secure symmetric key exchange for information-theoretically secure com- munication via one-time

  19. Key barriers to gout care: a systematic review and thematic synthesis of qualitative studies.

    Science.gov (United States)

    Rai, Sharan K; Choi, Hyon K; Choi, Sally H J; Townsend, Anne F; Shojania, Kam; De Vera, Mary A

    2018-04-17

    Gout care remains highly suboptimal, contributing to an increased global disease burden. To understand barriers to gout care, our aim was to provide a systematic review and thematic synthesis of qualitative studies worldwide reporting provider and patient perspectives and experiences with management. We conducted a mapped search of MEDLINE, EMBASE, Cumulative Index to Nursing and Allied Health Literature, and Social Sciences Citation Index databases and selected qualitative studies of provider and patient perspectives on gout management. We used thematic synthesis to combine the included studies and identify key themes across studies. We included 20 studies that reported the experiences and perspectives of 480 gout patients and 120 providers spanning five different countries across three continents. We identified three predominant provider themes: knowledge gaps and management approaches; perceptions and beliefs about gout patients; and system barriers to optimal gout care (e.g. time constraints and a lack of incentives). We also identified four predominant themes among gout patients: limited gout knowledge; interactions with health-care providers; attitudes towards and experiences with taking medication; and practical barriers to long-term medication use. Our systematic review of worldwide literature consistently identified gaps in gout knowledge among providers, which is likely to contribute to patients' lack of appropriate education about the fundamental causes of and essential treatment approaches for gout. Furthermore, system barriers among providers and day-to-day challenges of taking long-term medications among patients are considerable. These factors provide key targets to improve the widespread suboptimal gout care.

  20. Key Research Issues in Clostridium difficile

    Directory of Open Access Journals (Sweden)

    George Zhanel

    2005-01-01

    Full Text Available Clostridium difficile is an emerging pathogen that causes C difficile-associated diarrhea, an important nosocomial infection. Control of this infection remains a challenge, and much needs to be determined about the antimicrobial resistance of the organism, antibiotic stewardship, contamination of the patient environment, and various host factors that determine susceptibility or resistance to infection. A national symposium focusing on C difficile infections, the Clostridium difficile Symposium on Emerging Issues and Research, was hosted on November 23, 2004, by the Department of Medical Microbiology and Infectious Diseases at the University of Manitoba, Winnipeg, Manitoba, in partnership with the Canadian Institutes of Health Research. This symposium, which aimed to summarize key research issues regarding C difficile infections in Canada, had the following objectives: to provide a forum for learning and discussion about C difficile and its impact on the health of Canadians; to identify the key research issues that should be addressed; and to explore potential research funding opportunities and collaboration. The present report summarizes key research issues identified for C difficile infections in Canada by addressing four major themes: diagnosis and surveillance, infection prevention and control, antibiotic stewardship, and clinical management.

  1. Demonstration Of The Violation Of Bell Inequality In Quantum Key Distribution

    International Nuclear Information System (INIS)

    Dermez, R.

    2010-01-01

    Today, the data privacy has become very important. Quantum Key Distribution (QKD) system is developed in this area. QKD, coding technique with single-use method of encoding used keys (information and messages) security guarantees. The system is based on Quantum Mechanics (The Certainty Principle). However, in some cases for quantum communication, QKD are limited. In determining this limit Bell Inequality (CHSH Inequality, 1969) is used. Bell inequality shows a violation of Quantum Key Distribution. In this study, using the program of Matematica 6, QKD through bilateral quantum system (system with two qubits) has been investigating the leak case and the violations. We showed leakage and violations in these figures via the calculations results in Matematica program.

  2. Soil fauna: key to new carbon models

    OpenAIRE

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; Jiménez, Juan José

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined ...

  3. Utility and Limitations of Using Gene Expression Data to Identify Functional Associations.

    Directory of Open Access Journals (Sweden)

    Sahra Uygun

    2016-12-01

    Full Text Available Gene co-expression has been widely used to hypothesize gene function through guilt-by association. However, it is not clear to what degree co-expression is informative, whether it can be applied to genes involved in different biological processes, and how the type of dataset impacts inferences about gene functions. Here our goal is to assess the utility and limitations of using co-expression as a criterion to recover functional associations between genes. By determining the percentage of gene pairs in a metabolic pathway with significant expression correlation, we found that many genes in the same pathway do not have similar transcript profiles and the choice of dataset, annotation quality, gene function, expression similarity measure, and clustering approach significantly impacts the ability to recover functional associations between genes using Arabidopsis thaliana as an example. Some datasets are more informative in capturing coordinated expression profiles and larger data sets are not always better. In addition, to recover the maximum number of known pathways and identify candidate genes with similar functions, it is important to explore rather exhaustively multiple dataset combinations, similarity measures, clustering algorithms and parameters. Finally, we validated the biological relevance of co-expression cluster memberships with an independent phenomics dataset and found that genes that consistently cluster with leucine degradation genes tend to have similar leucine levels in mutants. This study provides a framework for obtaining gene functional associations by maximizing the information that can be obtained from gene expression datasets.

  4. Investigating on the fermentation behavior of six lactic acid bacteria strains in barley malt wort reveals limitation in key amino acids and buffer capacity.

    Science.gov (United States)

    Nsogning, Sorelle Dongmo; Fischer, Susann; Becker, Thomas

    2018-08-01

    Understanding lactic acid bacteria (LAB) fermentation behavior in malt wort is a milestone towards flavor improvement of lactic acid fermented malt beverages. Therefore, this study aims to outline deficiencies that may exist in malt wort fermentation. First, based on six LAB strains, cell viability and vitality were evaluated. Second, sugars, organic acids, amino acids, pH value and buffering capacity (BC) were monitored. Finally, the implication of key amino acids, fructose and wort BC on LAB growth was determined. Short growth phase coupled with prompt cell death and a decrease in metabolic activity was observed. Low wort BC caused rapid pH drop with lactic acid accumulation, which conversely increased the BC leading to less pH change at late-stage fermentation. Lactic acid content (≤3.9 g/L) was higher than the reported inhibitory concentration (1.8 g/L). Furthermore, sugars were still available but fructose and key amino acids lysine, arginine and glutamic acid were considerably exhausted (≤98%). Wort supplementations improved cell growth and viability leading to conclude that key amino acid depletion coupled with low BC limits LAB growth in malt wort. Then, a further increase in organic acid reduces LAB viability. This knowledge opens doors for LAB fermentation process optimization in malt wort. Copyright © 2018 Elsevier Ltd. All rights reserved.

  5. Legislation on violence against women: overview of key components.

    Science.gov (United States)

    Ortiz-Barreda, Gaby; Vives-Cases, Carmen

    2013-01-01

    This study aimed to determine if legislation on violence against women (VAW) worldwide contains key components recommended by the Pan American Health Organization (PAHO) and the United Nations (UN) to help strengthen VAW prevention and provide better integrated victim protection, support, and care. A systematic search for VAW legislation using international legal databases and other electronic sources plus data from previous research identified 124 countries/territories with some type of VAW legislation. Full legal texts were found for legislation from 104 countries/territories. Those available in English, Portuguese, and Spanish were downloaded and compiled and the selection criteria applied (use of any of the common terms related to VAW, including intimate partner violence (IPV), and reference to at least two of six sectors (education, health, judicial system, mass media, police, and social services) with regard to VAW interventions (protection, support, and care). A final sample from 80 countries/territories was selected and analyzed for the presence of key components recommended by PAHO and the UN (reference to the term "violence against women" in the title; definitions of different types of VAW; identification of women as beneficiaries; and promotion of (reference to) the participation of multiple sectors in VAW interventions). Few countries/territories specifically identified women as the beneficiaries of their VAW legislation, including those that labeled their legislation "domestic violence" law ( n = 51), of which only two explicitly mentioned women as complainants/survivors. Only 28 countries/territories defined the main forms of VAW (economic, physical, psychological, and sexual) in their VAW legislation. Most highlighted the role of the judicial system, followed by that of social services and the police. Only 28 mentioned the health sector. Despite considerable efforts worldwide to strengthen VAW legislation, most VAW laws do not incorporate the key

  6. Identifying determinants of effective complementary feeding behaviour change interventions in developing countries

    Science.gov (United States)

    Fabrizio, Cecilia S; van Liere, Marti; Pelto, Gretel

    2014-01-01

    As stunting moves to the forefront of the global agenda, there is substantial evidence that behaviour change interventions (BCI) can improve infant feeding practices and growth. However, this evidence has not been translated into improved outcomes on a national level because we do not know enough about what makes these interventions work, for whom, when, why, at what cost and for how long. Our objective was to examine the design and implementation of complementary feeding BCI, from the peer-reviewed literature, to identify generalisable key determinants. We identified 29 studies that evaluated BCI efficacy or effectiveness, were conducted in developing countries, and reported outcomes on infant and young children aged 6–24 months. Two potential determinants emerged: (1) effective studies used formative research to identify cultural barriers and enablers to optimal feeding practices, to shape the intervention strategy, and to formulate appropriate messages and mediums for delivery; (2) effective studies delineated the programme impact pathway to the target behaviour change and assessed intermediary behaviour changes to learn what worked. We found that BCI that used these developmental and implementation processes could be effective despite heterogeneous approaches and design components. Our analysis was constrained, however, by the limited published data on how design and implementation were carried out, perhaps because of publishing space limits. Information on cost-effectiveness, sustainability and scalability was also very limited. We suggest a more comprehensive reporting process and a more strategic research agenda to enable generalisable evidence to accumulate. PMID:24798264

  7. One Step Quantum Key Distribution Based on EPR Entanglement.

    Science.gov (United States)

    Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao

    2016-06-30

    A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.

  8. Fundamental limits of measurement in telecommunications: Experimental and modeling studies in a test optical network on proposal for the reform of telecommunication quantitations

    International Nuclear Information System (INIS)

    Egan, James; McMillan, Normal; Denieffe, David

    2011-01-01

    Proposals for a review of the limits of measurement for telecommunications are made. The measures are based on adapting work from the area of chemical metrology for the field of telecommunications. Currie has introduced recommendations for defining the limits of measurement in chemical metrology and has identified three key fundamental limits of measurement. These are the critical level, the detection limit and the determination limit. Measurements on an optical system are used to illustrate the utility of these measures and discussion is given into the advantages of using these fundamental quantitations over existing methods.

  9. Fundamental limits of measurement in telecommunications: Experimental and modeling studies in a test optical network on proposal for the reform of telecommunication quantitations

    Energy Technology Data Exchange (ETDEWEB)

    Egan, James; McMillan, Normal; Denieffe, David, E-mail: eganj@itcarlow.ie [IT Carlow (Ireland)

    2011-08-17

    Proposals for a review of the limits of measurement for telecommunications are made. The measures are based on adapting work from the area of chemical metrology for the field of telecommunications. Currie has introduced recommendations for defining the limits of measurement in chemical metrology and has identified three key fundamental limits of measurement. These are the critical level, the detection limit and the determination limit. Measurements on an optical system are used to illustrate the utility of these measures and discussion is given into the advantages of using these fundamental quantitations over existing methods.

  10. Identifying Key Features of Student Performance in Educational Video Games and Simulations through Cluster Analysis

    Science.gov (United States)

    Kerr, Deirdre; Chung, Gregory K. W. K.

    2012-01-01

    The assessment cycle of "evidence-centered design" (ECD) provides a framework for treating an educational video game or simulation as an assessment. One of the main steps in the assessment cycle of ECD is the identification of the key features of student performance. While this process is relatively simple for multiple choice tests, when…

  11. An Integrated Strategy to Identify Key Genes in Almond Adventitious Shoot Regeneration

    Science.gov (United States)

    Plant genetic transformation usually depends on efficient adventitious regeneration systems. In almond (Prunus dulcis Mill.), regeneration of transgenic adventitious shoots was achieved but with low efficiency. Histological studies identified two main stages of organogenesis in almond explants that ...

  12. Bi-directional gene set enrichment and canonical correlation analysis identify key diet-sensitive pathways and biomarkers of metabolic syndrome

    Directory of Open Access Journals (Sweden)

    Gaora Peadar Ó

    2010-10-01

    Full Text Available Abstract Background Currently, a number of bioinformatics methods are available to generate appropriate lists of genes from a microarray experiment. While these lists represent an accurate primary analysis of the data, fewer options exist to contextualise those lists. The development and validation of such methods is crucial to the wider application of microarray technology in the clinical setting. Two key challenges in clinical bioinformatics involve appropriate statistical modelling of dynamic transcriptomic changes, and extraction of clinically relevant meaning from very large datasets. Results Here, we apply an approach to gene set enrichment analysis that allows for detection of bi-directional enrichment within a gene set. Furthermore, we apply canonical correlation analysis and Fisher's exact test, using plasma marker data with known clinical relevance to aid identification of the most important gene and pathway changes in our transcriptomic dataset. After a 28-day dietary intervention with high-CLA beef, a range of plasma markers indicated a marked improvement in the metabolic health of genetically obese mice. Tissue transcriptomic profiles indicated that the effects were most dramatic in liver (1270 genes significantly changed; p Conclusion Bi-directional gene set enrichment analysis more accurately reflects dynamic regulatory behaviour in biochemical pathways, and as such highlighted biologically relevant changes that were not detected using a traditional approach. In such cases where transcriptomic response to treatment is exceptionally large, canonical correlation analysis in conjunction with Fisher's exact test highlights the subset of pathways showing strongest correlation with the clinical markers of interest. In this case, we have identified selenoamino acid metabolism and steroid biosynthesis as key pathways mediating the observed relationship between metabolic health and high-CLA beef. These results indicate that this type of

  13. Water dynamics clue to key residues in protein folding

    International Nuclear Information System (INIS)

    Gao, Meng; Zhu, Huaiqiu; Yao, Xin-Qiu; She, Zhen-Su

    2010-01-01

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  14. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  15. Measurement errors in voice-key naming latency for Hiragana.

    Science.gov (United States)

    Yamada, Jun; Tamaoka, Katsuo

    2003-12-01

    This study makes explicit the limitations and possibilities of voice-key naming latency research on single hiragana symbols (a Japanese syllabic script) by examining three sets of voice-key naming data against Sakuma, Fushimi, and Tatsumi's 1997 speech-analyzer voice-waveform data. Analysis showed that voice-key measurement errors can be substantial in standard procedures as they may conceal the true effects of significant variables involved in hiragana-naming behavior. While one can avoid voice-key measurement errors to some extent by applying Sakuma, et al.'s deltas and by excluding initial phonemes which induce measurement errors, such errors may be ignored when test items are words and other higher-level linguistic materials.

  16. The Promise of Virtual Teams: Identifying Key Factors in Effectiveness and Failure

    Science.gov (United States)

    Horwitz, Frank M.; Bravington, Desmond; Silvis, Ulrik

    2006-01-01

    Purpose: The aim of the investigation is to identify enabling and disenabling factors in the development and operation of virtual teams; to evaluate the importance of factors such as team development, cross-cultural variables, leadership, communication and social cohesion as contributors to virtual team effectiveness. Design/methodology/approach:…

  17. Identifying key factors for mobilising under-utilised low carbon land resources : A case study on Kalimantan

    NARCIS (Netherlands)

    Goh, Chun Sheng; Junginger, Martin; Potter, Lesley; Faaij, André; Wicke, Birka

    2018-01-01

    Mobilising under-utilised low carbon (ULC) land for future agricultural expansion helps minimising further carbon stock loss. This study examined the regency cases in Kalimantan, a carbon loss hotspot, to understand the key factors for mobilising ULC land via narrative interviews with a range of

  18. Anti-schistosomal intervention targets identified by lifecycle transcriptomic analyses.

    Directory of Open Access Journals (Sweden)

    Jennifer M Fitzpatrick

    2009-11-01

    Full Text Available Novel methods to identify anthelmintic drug and vaccine targets are urgently needed, especially for those parasite species currently being controlled by singular, often limited strategies. A clearer understanding of the transcriptional components underpinning helminth development will enable identification of exploitable molecules essential for successful parasite/host interactions. Towards this end, we present a combinatorial, bioinformatics-led approach, employing both statistical and network analyses of transcriptomic data, for identifying new immunoprophylactic and therapeutic lead targets to combat schistosomiasis.Utilisation of a Schistosoma mansoni oligonucleotide DNA microarray consisting of 37,632 elements enabled gene expression profiling from 15 distinct parasite lifecycle stages, spanning three unique ecological niches. Statistical approaches of data analysis revealed differential expression of 973 gene products that minimally describe the three major characteristics of schistosome development: asexual processes within intermediate snail hosts, sexual maturation within definitive vertebrate hosts and sexual dimorphism amongst adult male and female worms. Furthermore, we identified a group of 338 constitutively expressed schistosome gene products (including 41 transcripts sharing no sequence similarity outside the Platyhelminthes, which are likely to be essential for schistosome lifecycle progression. While highly informative, statistics-led bioinformatics mining of the transcriptional dataset has limitations, including the inability to identify higher order relationships between differentially expressed transcripts and lifecycle stages. Network analysis, coupled to Gene Ontology enrichment investigations, facilitated a re-examination of the dataset and identified 387 clusters (containing 12,132 gene products displaying novel examples of developmentally regulated classes (including 294 schistosomula and/or adult transcripts with no

  19. Key figures for the regional- and distribution grid

    International Nuclear Information System (INIS)

    Vikingstad, S.

    1996-02-01

    In Norway, improving the efficiency of the hydroelectric grid operation is a stated goal of the Energy Act. Several studies have identified potential profits of such improvement. This publication focuses on costs and improvement potentials. Publication of key figures may stimulate grid owners, boards and administrations to improve the operating efficiency of their grids. The publication shows key figures for the regional- and distribution grid and is based on accounting data for 1994. The key figures are divided into: (1) Cost structure: The key figures express the relative contributions of each cost component to the total income of the grid, (2) Costs and physical quantities: The key figures show the cost of delivering the transport services, (3) Physical quantities: The key figures describe the working conditions of the energy utility. It appears that the cost structure of the sector varies considerably. The same is true of the cost related to the delivery of grid services. 30 figs., 6 tabs

  20. The Limits of Exercise Physiology

    DEFF Research Database (Denmark)

    Gabriel, Brendan M; Zierath, Juleen R

    2017-01-01

    Many of the established positive health benefits of exercise have been documented by historical discoveries in the field of exercise physiology. These investigations often assess limits: the limits of performance, or the limits of exercise-induced health benefits. Indeed, several key findings have...... been informed by studying highly trained athletes, in addition to healthy or unhealthy people. Recent progress has been made in regard to skeletal muscle metabolism and personalized exercise regimes. In this perspective, we review some of the historical milestones of exercise physiology, discuss how...

  1. Identifying Topics in Microblogs Using Wikipedia.

    Science.gov (United States)

    Yıldırım, Ahmet; Üsküdarlı, Suzan; Özgür, Arzucan

    2016-01-01

    Twitter is an extremely high volume platform for user generated contributions regarding any topic. The wealth of content created at real-time in massive quantities calls for automated approaches to identify the topics of the contributions. Such topics can be utilized in numerous ways, such as public opinion mining, marketing, entertainment, and disaster management. Towards this end, approaches to relate single or partial posts to knowledge base items have been proposed. However, in microblogging systems like Twitter, topics emerge from the culmination of a large number of contributions. Therefore, identifying topics based on collections of posts, where individual posts contribute to some aspect of the greater topic is necessary. Models, such as Latent Dirichlet Allocation (LDA), propose algorithms for relating collections of posts to sets of keywords that represent underlying topics. In these approaches, figuring out what the specific topic(s) the keyword sets represent remains as a separate task. Another issue in topic detection is the scope, which is often limited to specific domain, such as health. This work proposes an approach for identifying domain-independent specific topics related to sets of posts. In this approach, individual posts are processed and then aggregated to identify key tokens, which are then mapped to specific topics. Wikipedia article titles are selected to represent topics, since they are up to date, user-generated, sophisticated articles that span topics of human interest. This paper describes the proposed approach, a prototype implementation, and a case study based on data gathered during the heavily contributed periods corresponding to the four US election debates in 2012. The manually evaluated results (0.96 precision) and other observations from the study are discussed in detail.

  2. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  3. Mapping key antecedents of employee-driven innovations

    DEFF Research Database (Denmark)

    Smith, Pernille; Ulhøi, John Parm; Kesting, Peter

    2012-01-01

    Research on employee-driven innovation (EDI) is still in its infancy, and as yet there is no independent body of literature on the topic. The aim of this paper is to review existing insights into the key antecedents of EDI in other research contexts. In particular, we focus on: leader support......, autonomy, collaboration, and organisational norms of exploration. The main contribution of this paper is to discuss how these key antecedents apply to the specific case of EDI and to identify an agenda for new research....

  4. Identifying key components for an effective case report poster: an observational study.

    Science.gov (United States)

    Willett, Lisa L; Paranjape, Anuradha; Estrada, Carlos

    2009-03-01

    Residents demonstrate scholarly activity by presenting posters at academic meetings. Although recommendations from national organizations are available, evidence identifying which components are most important is not. To develop and test an evaluation tool to measure the quality of case report posters and identify the specific components most in need of improvement. Faculty evaluators reviewed case report posters and provided on-site feedback to presenters at poster sessions of four annual academic general internal medicine meetings. A newly developed ten-item evaluation form measured poster quality for specific components of content, discussion, and format (5-point Likert scale, 1 = lowest, 5 = highest). Evaluation tool performance, including Cronbach alpha and inter-rater reliability, overall poster scores, differences across meetings and evaluators and specific components of the posters most in need of improvement. Forty-five evaluators from 20 medical institutions reviewed 347 posters. Cronbach's alpha of the evaluation form was 0.84 and inter-rater reliability, Spearman's rho 0.49 (p words. Our evaluation tool provides empirical data to guide trainees as they prepare posters for presentation which may improve poster quality and enhance their scholarly productivity.

  5. SNP interaction pattern identifier (SIPI)

    DEFF Research Database (Denmark)

    Lin, Hui Yi; Chen, Dung Tsa; Huang, Po Yu

    2017-01-01

    Motivation: Testing SNP-SNP interactions is considered as a key for overcoming bottlenecks of genetic association studies. However, related statistical methods for testing SNP-SNP interactions are underdeveloped. Results: We propose the SNP Interaction Pattern Identifier (SIPI), which tests 45...

  6. Performance limits for fusion first-wall structural materials

    International Nuclear Information System (INIS)

    Smith, D.L.; Majumdar, S.; Billone, M.; Mattas, R.

    2000-01-01

    Key features of fusion energy relate primarily to potential advantages associated with safety and environmental considerations and the near endless supply of fuel. However, high-performance fusion power systems will be required in order to be an economically competitive energy option. As in most energy systems, the operating limits of structural materials pose a primary constraint to the performance of fusion power systems. In the case of fusion power, the first-wall/blanket system will have a dominant impact on both economic and safety/environmental attractiveness. This paper presents an assessment of the influence of key candidate structural material properties on performance limits for fusion first-wall blanket applications. Key issues associated with interactions of the structural materials with the candidate coolant/breeder materials are discussed

  7. 104 Key words: Moringa, marinade, bacteria, fungi, catfish, smoke ...

    African Journals Online (AJOL)

    Osondu

    2013-01-16

    Jan 16, 2013 ... spoilage thus limiting economic loss and possible heath risk to consumers. Key words: Moringa, marinade, bacteria, fungi, catfish, smoke-dried. Introduction ..... were reared because E. coli is an indicator organism and its ...

  8. Daylight operation of a free space, entanglement-based quantum key distribution system

    Energy Technology Data Exchange (ETDEWEB)

    Peloso, Matthew P; Gerhardt, Ilja; Ho, Caleb; Lamas-Linares, AntIa; Kurtsiefer, Christian [Centre for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore 117543 (Singapore)], E-mail: christian.kurtsiefer@gmail.com

    2009-04-15

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from the background light. Here, we present a lean entanglement-based QKD system overcoming that limitation. By implementing spectral, spatial and temporal filtering techniques, we establish a secure key continuously over several days under varying light and weather conditions.

  9. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huang Jen-Yan

    2011-01-01

    Full Text Available Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station, cluster heads, and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes, security breaches, key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks: guessing attacks, replay attacks, man-in-the-middle attacks, node capture attacks, and denial-of-service attacks.

  10. Key successes and challenges in providing mental health care in an urban male remand prison: a qualitative study.

    Science.gov (United States)

    Samele, Chiara; Forrester, Andrew; Urquía, Norman; Hopkin, Gareth

    2016-04-01

    This study aimed to describe the workings of an urban male remand prison mental health service exploring the key challenges and successes, levels of integration and collaboration with other services. A purposive sampling was used to recruit key prison and healthcare professionals for in-depth interviews. A thematic analysis was used to analyse transcripts based on an initial coding frame of several predefined themes. Other key themes were also identified. Twenty-eight interviews were conducted. Prisoners referred to the service had complex, sometimes acute mental illness requiring specialist assessment and treatment. Key successes of the in-reach service included the introduction of an open referral system, locating a mental health nurse at reception to screen all new prisoners and a zoning system to prioritise urgent or non-urgent cases. Achieving an integrated system of healthcare was challenging because of the numerous internal and external services operating across the prison, a highly transient population, limited time and space to deliver services and difficulties with providing inpatient care (e.g., establishing the criteria for admission and managing patient flow). Collaborative working between prison and healthcare staff was required to enable best care for prisoners. The prison mental health in-reach service worked well in assessing and prioritising those who required specialist mental health care. Although the challenges of working within the prison context limited what the in-reach team could achieve. Further work was needed to improve the unit environment and how best to target and deliver inpatient care within the prison.

  11. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  12. SARS: Key factors in crisis management.

    Science.gov (United States)

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  13. Key management issue in SCADA networks: A review

    Directory of Open Access Journals (Sweden)

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  14. Key challenges to expanding renewable energy

    International Nuclear Information System (INIS)

    Stram, Bruce N.

    2016-01-01

    The key advantage of renewables is that they are free of direct pollution and carbon emissions. Given concern over global warming caused by carbon emissions, there are substantial policy efforts to increase renewable penetrations. The purpose of this paper is to outline and evaluate the challenges presented by increasing penetrations of renewable electricity generation. These generation sources primarily include solar and wind which are growing rapidly and are new enough to the grid that the impact of high penetrations is not fully understood. The intrinsic nature of solar and wind power is very likely to present greater system challenges than “conventional” sources. Within limits, those challenges can be overcome, but at a cost. Later sections of the paper will draw on a variety of sources to identify a range of such costs, at least as they are foreseen by researchers helping prepare ambitious plans for grids to obtain high shares (30–50%) of their megawatt hours from primarily solar and wind generation. Energy poverty issues are outlined and related to renewable costs issues. - Highlights: •Integration of intermittent renewables with existing power grids. •Renewable ramping and over production issues. •Renewable caused system costs. •Energy poverty circumstances and consequences.

  15. Energy-efficient key distribution using electrocardiograph biometric set for secure communications in wireless body healthcare networks.

    Science.gov (United States)

    Shi, Jinyang; Lam, Kwok-Yan; Gu, Ming; Li, Mingze; Chung, Siu-Leung

    2011-10-01

    Wireless body sensor network (WBSN) has gained significant interests as an important infrastructure for real-time biomedical healthcare systems, while the security of the sensitive health information becomes one of the main challenges. Due to the constraints of limited power, traditional cryptographic key distribution schemes are not suitable for WBSN. This paper proposes a novel energy-efficient approach, BodyKey, which can distribute the keys using the electrocardiograph biometrics. BodyKey represents the biometric features as ordered set, and deals with the biometric variations using set reconciliation. In this way, only limited necessary information needs to be communicated for key agreement, and the total energy consumption for key distribution can thus be reduced. Experiments on the PhysioBank Database show that BodyKey can perform an energy consumption rate of 0.01 mJ/bit with an equal accuracy rate of 97.28%, allowing the system to be used as an energy-efficient key distribution scheme for secure communications in WBSN.

  16. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  17. Small private key MQPKS on an embedded microprocessor.

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  18. Small Private Key PKS on an Embedded Microprocessor

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  19. Peaking for optimal performance: Research limitations and future directions.

    Science.gov (United States)

    Pyne, David B; Mujika, Iñigo; Reilly, Thomas

    2009-02-01

    A key element of the physical preparation of athletes is the taper period in the weeks immediately preceding competition. Existing research has defined the taper, identified various forms used in contemporary sport, and examined the prescription of training volume, load, intensity, duration, and type (progressive or step). Current limitations include: the lack of studies on team, combative, racquet, and precision (target) sports; the relatively small number of randomized controlled trials; the narrow focus on a single competition (single peak) compared with multiple peaking for weekly, multi-day or multiple events; and limited understanding of the physiological, neuromuscular, and biomechanical basis of the taper. Future research should address these limitations, together with the influence of prior training on optimal tapering strategies, and the interactions between the taper and long-haul travel, heat, and altitude. Practitioners seek information on how to prescribe tapers from season to season during an athlete's career, or a team's progression through a domestic league season, or multi-year Olympic or World Cup cycle. Practical guidelines for planning effective tapers for the Vancouver 2010 and London 2012 Olympics will evolve from both experimental investigations and modelling of successful tapers currently employed in a wide range of sports.

  20. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  1. Critical and shielding parametric studies with the Monte Carlo code TRIPOLI to identify the key points to take into account during the transportation of blanket assemblies with high ratio of americium

    International Nuclear Information System (INIS)

    Gosmain, Cecile-Aline

    2011-01-01

    In the framework of French research program on Generation IV sodium cooled fast reactor, one possible option consists in burning minor actinides in this kind of Advanced Sodium Technological Reactor. Two types of transmutation mode are studied in the world : the homogeneous mode of transmutation where actinides are scattered with very low enrichment ratio in fissile assemblies and the heterogeneous mode where fissile core is surrounded by blanket assemblies filled with minor actinides with ratio of incorporated actinides up to 20%. Depending on which element is considered to be burnt and on its content, these minor actinides contents imply constraints on assemblies' transportation between Nuclear Power Plants and fuel cycle facilities. In this study, we present some academic studies in order to identify some key constraints linked to the residual power and neutron/gamma load of such kind of blanket assemblies. To simplify the approach, we considered a modeling of a 'model cask' dedicated to the transportation of a unique irradiated blanket assembly loaded with 20% of Americium and basically inspired from an existent cask designed initially for the damaged fissile Superphenix assembly transport. Thermal calculations performed with EDF-SYRTHES code have shown that due to thermal limitations on cladding temperature, the decay time to be considered before transportation is 20 years. This study is based on explicit 3D representations of the cask and the contained blanket assembly with the Monte Carlo code TRIPOLI/JEFF3.1.1 library and concludes that after such a decay time, the transportation of a unique Americium radial blanket is feasible only if the design of our model cask is modified in order to comply with the dose limitation criterion. (author)

  2. Key Questions in Building Defect Prediction Models in Practice

    Science.gov (United States)

    Ramler, Rudolf; Wolfmaier, Klaus; Stauder, Erwin; Kossak, Felix; Natschläger, Thomas

    The information about which modules of a future version of a software system are defect-prone is a valuable planning aid for quality managers and testers. Defect prediction promises to indicate these defect-prone modules. However, constructing effective defect prediction models in an industrial setting involves a number of key questions. In this paper we discuss ten key questions identified in context of establishing defect prediction in a large software development project. Seven consecutive versions of the software system have been used to construct and validate defect prediction models for system test planning. Furthermore, the paper presents initial empirical results from the studied project and, by this means, contributes answers to the identified questions.

  3. Identifying Topics in Microblogs Using Wikipedia.

    Directory of Open Access Journals (Sweden)

    Ahmet Yıldırım

    Full Text Available Twitter is an extremely high volume platform for user generated contributions regarding any topic. The wealth of content created at real-time in massive quantities calls for automated approaches to identify the topics of the contributions. Such topics can be utilized in numerous ways, such as public opinion mining, marketing, entertainment, and disaster management. Towards this end, approaches to relate single or partial posts to knowledge base items have been proposed. However, in microblogging systems like Twitter, topics emerge from the culmination of a large number of contributions. Therefore, identifying topics based on collections of posts, where individual posts contribute to some aspect of the greater topic is necessary. Models, such as Latent Dirichlet Allocation (LDA, propose algorithms for relating collections of posts to sets of keywords that represent underlying topics. In these approaches, figuring out what the specific topic(s the keyword sets represent remains as a separate task. Another issue in topic detection is the scope, which is often limited to specific domain, such as health. This work proposes an approach for identifying domain-independent specific topics related to sets of posts. In this approach, individual posts are processed and then aggregated to identify key tokens, which are then mapped to specific topics. Wikipedia article titles are selected to represent topics, since they are up to date, user-generated, sophisticated articles that span topics of human interest. This paper describes the proposed approach, a prototype implementation, and a case study based on data gathered during the heavily contributed periods corresponding to the four US election debates in 2012. The manually evaluated results (0.96 precision and other observations from the study are discussed in detail.

  4. The relationship between anatomically correct electric and magnetic field dosimetry and publishe delectric and magnetic field exposure limits.

    Science.gov (United States)

    Kavet, Robert; Dovan, Thanh; Reilly, J Patrick

    2012-12-01

    Electric and magnetic field exposure limits published by International Commission for Non-Ionizing Radiation Protection and Institute of Electrical and Electronics Engineers are aimed at protection against adverse electrostimulation, which may occur by direct coupling to excitable tissue and, in the case of electric fields, through indirect means associated with surface charge effects (e.g. hair vibration, skin sensations), spark discharge and contact current. For direct coupling, the basic restriction (BR) specifies the not-to-be-exceeded induced electric field. The key results of anatomically based electric and magnetic field dosimetry studies and the relevant characteristics of excitable tissue were first identified. This permitted us to assess the electric and magnetic field exposure levels that induce dose in tissue equal to the basic restrictions, and the relationships of those exposure levels to the limits now in effect. We identify scenarios in which direct coupling of electric fields to peripheral nerve could be a determining factor for electric field limits.

  5. The relationship between anatomically correct electric and magnetic field dosimetry and published electric and magnetic field exposure limits

    International Nuclear Information System (INIS)

    Kavet, R.; Dovan, T.; Patrick Reilly, J.

    2012-01-01

    Electric and magnetic field exposure limits published by International Commission for Non-Ionizing Radiation Protection and Inst. of Electrical and Electronics Engineers are aimed at protection against adverse electro-stimulation, which may occur by direct coupling to excitable tissue and, in the case of electric fields, through indirect means associated with surface charge effects (e.g. hair vibration, skin sensations), spark discharge and contact current. For direct coupling, the basic restriction (BR) specifies the not-to-be-exceeded induced electric field. The key results of anatomically based electric and magnetic field dosimetry studies and the relevant characteristics of excitable tissue were first identified. This permitted us to assess the electric and magnetic field exposure levels that induce dose in tissue equal to the basic restrictions, and the relationships of those exposure levels to the limits now in effect. We identify scenarios in which direct coupling of electric fields to peripheral nerve could be a determining factor for electric field limits. (authors)

  6. The Double Contingency as a Key to Redifine the Concept of Social Order

    Directory of Open Access Journals (Sweden)

    Juan Pablo Gonnet

    2017-10-01

    Full Text Available The double contingency represents a key concept in Niklas Luhmann’s theory of social systems by giving rise to a new treatment of the problem of social order. From its consideration, it is possible to explain social order without blocking the contingency of both individual action and social structures. However, something that has remained out of discussion is precisely what concept of “order” is implied in the author's proposal. In principle, we identify a frequently assumed conception of order in social theory, which is related to the limitation (or conditioning of individual action/communication/selection. The aim of this paper is to demonstrate that the double contingency would also allow us to problematize and redefine this conception.

  7. Security proof of continuous-variable quantum key distribution using three coherent states

    Science.gov (United States)

    Brádler, Kamil; Weedbrook, Christian

    2018-02-01

    We introduce a ternary quantum key distribution (QKD) protocol and asymptotic security proof based on three coherent states and homodyne detection. Previous work had considered the binary case of two coherent states and here we nontrivially extend this to three. Our motivation is to leverage the practical benefits of both discrete and continuous (Gaussian) encoding schemes creating a best-of-both-worlds approach; namely, the postprocessing of discrete encodings and the hardware benefits of continuous ones. We present a thorough and detailed security proof in the limit of infinite signal states which allows us to lower bound the secret key rate. We calculate this is in the context of collective eavesdropping attacks and reverse reconciliation postprocessing. Finally, we compare the ternary coherent state protocol to other well-known QKD schemes (and fundamental repeaterless limits) in terms of secret key rates and loss.

  8. GENERALIZED MATRIXES OF GALOIS PROTOCOLS EXCHANGE ENCRYPTION KEYS

    Directory of Open Access Journals (Sweden)

    Anatoly Beletsky

    2016-03-01

    Full Text Available The methods of construction of matrix formation the secret protocols legalized subscribers of public communications networks encryption keys. Based key exchange protocols laid asymmetric cryptography algorithms. The solution involves the calculation of one-way functions and is based on the use of generalized Galois arrays of isomorphism relationship with forming elements, and depending on the selected irreducible polynomial generating matrix. A simple method for constructing generalized Galois matrix by the method of filling the diagonal. In order to eliminate the isomorphism of Galois arrays and their constituent elements, limiting the possibility of building one-way functions, Galois matrix subjected to similarity transformation carried out by means of permutation matrices. The variant of the organization of the algebraic attacks on encryption keys sharing protocols and discusses options for easing the consequences of an attack.

  9. ALPS - advanced limiter-divertor plasma-facing systems

    International Nuclear Information System (INIS)

    Allain, J. P.; Bastasz, R.; Brooks, J. N.; Evans, T.; Hassanein, A.; Luckhardt, S.; Maingi, R.; Mattas, R. F.; McCarthy, K.; Mioduszewski, P.; Mogahed, E.; Moir, R.; Molokov, S.; Morely, N.; Nygren, R.; Reed, C.; Rognlien, T.; Ruzic, D.; Sviatoslavsky, I.; Sze, D.; Tillack, M.; Ulrickson, M.; Wade, P. M.; Wong, C.; Wooley, R.

    1999-01-01

    The Advanced Limiter-divertor Plasma-facing Systems (ALPS) program was initiated in order to evaluate the potential for improved performance and lifetime for plasma-facing systems. The main goal of the program is to demonstrate the advantages of advanced limiter/divertor systems over conventional systems in terms of power density capability, component lifetime, and power conversion efficiency, while providing for safe operation and minimizing impurity concerns for the plasma. Most of the work to date has been applied to free surface liquids. A multi-disciplinary team from several institutions has been organized to address the key issues associated with these systems. The main performance goals for advanced limiters and diverters are a peak heat flux of >50 MW/m 2 ,elimination of a lifetime limit for erosion, and the ability to extract useful heat at high power conversion efficiency (approximately40%). The evaluation of various options is being conducted through a combination of laboratory experiments, modeling of key processes, and conceptual design studies. The current emphasis for the work is on the effects of free surface liquids on plasma edge performance

  10. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks

    Science.gov (United States)

    Naranjo, J. A. M.; López-Ramos, J. A.; Casado, L. G.

    Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.

  11. Small Private Key MQPKS on an Embedded Microprocessor

    Directory of Open Access Journals (Sweden)

    Hwajeong Seo

    2014-03-01

    Full Text Available Multivariate quadratic (MQ cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011, a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  12. KeyWare: an open wireless distributed computing environment

    Science.gov (United States)

    Shpantzer, Isaac; Schoenfeld, Larry; Grindahl, Merv; Kelman, Vladimir

    1995-12-01

    Deployment of distributed applications in the wireless domain lack equivalent tools, methodologies, architectures, and network management that exist in LAN based applications. A wireless distributed computing environment (KeyWareTM) based on intelligent agents within a multiple client multiple server scheme was developed to resolve this problem. KeyWare renders concurrent application services to wireline and wireless client nodes encapsulated in multiple paradigms such as message delivery, database access, e-mail, and file transfer. These services and paradigms are optimized to cope with temporal and spatial radio coverage, high latency, limited throughput and transmission costs. A unified network management paradigm for both wireless and wireline facilitates seamless extensions of LAN- based management tools to include wireless nodes. A set of object oriented tools and methodologies enables direct asynchronous invocation of agent-based services supplemented by tool-sets matched to supported KeyWare paradigms. The open architecture embodiment of KeyWare enables a wide selection of client node computing platforms, operating systems, transport protocols, radio modems and infrastructures while maintaining application portability.

  13. Identifying Key Actors in Heterogeneous Networks

    Science.gov (United States)

    2017-11-29

    Department of Defense (DOD) present social situations that are outside the scope and violate the assumptions of existing formal social science models. SNA by...assumptions of these existing social science models. SNA by its very construction focuses on dyadic relations and standard SNA metrics are focused only on...problematic for our purposes of determining relative valuations among vertices, but it is in contrast to the behavior of valuations like the Shapley value

  14. The use of conversation mapping to frame key perceptual issues facing the general dental practice system in England.

    Science.gov (United States)

    Harris, R V; Dancer, J M; Smith, D; Campbell, S

    2009-06-01

    To demonstrate the use of a novel qualitative methodology namely conversation mapping, which can be used to capture differences in stakeholder perspectives and give a root definition of the problem in a complex policy area. The methodology is used in the context of the changes introduced in the English general dental practice system in April 2006, to investigate the key issues facing the system, as perceived by general dental practitioners (GDPs). From a broad trigger statement, three transformational statements were produced. Each participant recorded their contribution on a hard diagrammatic form as a 'map', with others responding with their own written comment, thus generating three conversation maps. Thematic analysis resulted in the generation of a preliminary model summarising key perceptual issues. The five emergent themes identified were: financing, dentists' wants/needs, the role of the public and patients, system goals and policy level decision making. Financing was identified as the core category to which all other categories were related. Conversation mapping, a methodology arising from a systems approach, can be used to develop a 'rich picture' of an oral health care system in order to define the core problem within this policy area. Findings suggest that GDPs identify the financing of the system as a fundamental source of problems within the general dental practice system. This appears to be at variance with the perception of policy makers, who report a more limited view, identifying the system of remuneration as the 'heart of the problem'.

  15. Application of the key characteristics of carcinogens in cancer hazard identification

    Science.gov (United States)

    Guyton, Kathryn Z; Rusyn, Ivan; Chiu, Weihsueh A; Corpet, Denis E; van den Berg, Martin; Ross, Matthew K; Christiani, David C; Beland, Frederick A; Smith, Martyn T

    2018-01-01

    Abstract Smith et al. (Env. Health Perspect. 124: 713, 2016) identified 10 key characteristics (KCs), one or more of which are commonly exhibited by established human carcinogens. The KCs reflect the properties of a cancer-causing agent, such as ‘is genotoxic,’ ‘is immunosuppressive’ or ‘modulates receptor-mediated effects,’ and are distinct from the hallmarks of cancer, which are the properties of tumors. To assess feasibility and limitations of applying the KCs to diverse agents, methods and results of mechanistic data evaluations were compiled from eight recent IARC Monograph meetings. A systematic search, screening and evaluation procedure identified a broad literature encompassing multiple KCs for most (12/16) IARC Group 1 or 2A carcinogens identified in these meetings. Five carcinogens are genotoxic and induce oxidative stress, of which pentachlorophenol, hydrazine and malathion also showed additional KCs. Four others, including welding fumes, are immunosuppressive. The overall evaluation was upgraded to Group 2A based on mechanistic data for only two agents, tetrabromobisphenol A and tetrachloroazobenzene. Both carcinogens modulate receptor-mediated effects in combination with other KCs. Fewer studies were identified for Group 2B or 3 agents, with the vast majority (17/18) showing only one or no KCs. Thus, an objective approach to identify and evaluate mechanistic studies pertinent to cancer revealed strong evidence for multiple KCs for most Group 1 or 2A carcinogens but also identified opportunities for improvement. Further development and mapping of toxicological and biomarker endpoints and pathways relevant to the KCs can advance the systematic search and evaluation of mechanistic data in carcinogen hazard identification. PMID:29562322

  16. Scalable Multi-group Key Management for Advanced Metering Infrastructure

    OpenAIRE

    Benmalek , Mourad; Challal , Yacine; Bouabdallah , Abdelmadjid

    2015-01-01

    International audience; Advanced Metering Infrastructure (AMI) is composed of systems and networks to incorporate changes for modernizing the electricity grid, reduce peak loads, and meet energy efficiency targets. AMI is a privileged target for security attacks with potentially great damage against infrastructures and privacy. For this reason, Key Management has been identified as one of the most challenging topics in AMI development. In this paper, we propose a new Scalable multi-group key ...

  17. High-dimensional quantum key distribution based on multicore fiber using silicon photonic integrated circuits

    DEFF Research Database (Denmark)

    Ding, Yunhong; Bacco, Davide; Dalgaard, Kjeld

    2017-01-01

    is intrinsically limited to 1 bit/photon. Here we propose and experimentally demonstrate, for the first time, a high-dimensional quantum key distribution protocol based on space division multiplexing in multicore fiber using silicon photonic integrated lightwave circuits. We successfully realized three mutually......-dimensional quantum states, and enables breaking the information efficiency limit of traditional quantum key distribution protocols. In addition, the silicon photonic circuits used in our work integrate variable optical attenuators, highly efficient multicore fiber couplers, and Mach-Zehnder interferometers, enabling...

  18. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  19. Get the Basics Right: A Description of the Key Priorities for Establishing a Neonatal Service in a Resource-Limited Setting in Cambodia.

    Science.gov (United States)

    Fox-Lewis, Shivani; Genasci Smith, Wyatt; Lor, Vary; McKellar, Gregor; Phal, Chea; Fox-Lewis, Andrew; Turner, Paul; Neou, Leakhena; Turner, Claudia

    2018-05-28

    Worldwide, reduction in under-five mortality has not sufficiently included neonates, who represent 45% of deaths in children of age under five years. The least progress has been observed in resource-limited settings. This mixed methods study conducted at a Cambodian non-governmental paediatric hospital described the key priorities of the ongoing neonatal service. Routinely collected data from the hospital and microbiology databases included the number of admissions, discharges and deaths and the number of cases of bacteraemias (2011-2016). Semi-structured interviews with the management staff explored the essential features of the service. There were 2127 neonatal admissions and 247 deaths. The incidence of facility-based neonatal mortality decreased by 81%. Bacteraemic healthcare-associated infections decreased by 68%. A dedicated area for neonatal care was perceived as crucial, allowing better infection control and delivery of staff training. In this hospital, the neonatal service prioritized basic measures, particularly, having a dedicated neonatal area. Facility-based mortality and bacteraemic healthcare-associated infections decreased.

  20. Identifying key genes in rheumatoid arthritis by weighted gene co-expression network analysis.

    Science.gov (United States)

    Ma, Chunhui; Lv, Qi; Teng, Songsong; Yu, Yinxian; Niu, Kerun; Yi, Chengqin

    2017-08-01

    This study aimed to identify rheumatoid arthritis (RA) related genes based on microarray data using the WGCNA (weighted gene co-expression network analysis) method. Two gene expression profile datasets GSE55235 (10 RA samples and 10 healthy controls) and GSE77298 (16 RA samples and seven healthy controls) were downloaded from Gene Expression Omnibus database. Characteristic genes were identified using metaDE package. WGCNA was used to find disease-related networks based on gene expression correlation coefficients, and module significance was defined as the average gene significance of all genes used to assess the correlation between the module and RA status. Genes in the disease-related gene co-expression network were subject to functional annotation and pathway enrichment analysis using Database for Annotation Visualization and Integrated Discovery. Characteristic genes were also mapped to the Connectivity Map to screen small molecules. A total of 599 characteristic genes were identified. For each dataset, characteristic genes in the green, red and turquoise modules were most closely associated with RA, with gene numbers of 54, 43 and 79, respectively. These genes were enriched in totally enriched in 17 Gene Ontology terms, mainly related to immune response (CD97, FYB, CXCL1, IKBKE, CCR1, etc.), inflammatory response (CD97, CXCL1, C3AR1, CCR1, LYZ, etc.) and homeostasis (C3AR1, CCR1, PLN, CCL19, PPT1, etc.). Two small-molecule drugs sanguinarine and papaverine were predicted to have a therapeutic effect against RA. Genes related to immune response, inflammatory response and homeostasis presumably have critical roles in RA pathogenesis. Sanguinarine and papaverine have a potential therapeutic effect against RA. © 2017 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  1. Diagnosing climate change impacts and identifying adaptation strategies by involving key stakeholder organisations and farmers in Sikkim, India: Challenges and opportunities.

    Science.gov (United States)

    Azhoni, Adani; Goyal, Manish Kumar

    2018-06-01

    Narrowing the gap between research, policy making and implementing adaptation remains a challenge in many parts of the world where climate change is likely to severely impact water security. This research aims to narrow this gap by matching the adaptation strategies being framed by policy makers to that of the perspectives of development agencies, researchers and farmers in the Himalayan state of Sikkim in India. Our case study examined the perspectives of various stakeholders for climate change impacts, current adaptation strategies, knowledge gaps and adaptation barriers, particularly in the context of implementing the Sikkim State Action Plan on Climate Change through semi-structured interviews carried out with decision makers in the Sikkim State Government, researchers, consultants, local academia, development agencies and farmers. Using Stakeholders Network Analysis tools, this research unravels the complexities of perceiving climate change impacts, identifying strategies, and implementing adaptation. While farmers are less aware about the global phenomenon of climate change impacts for water security, their knowledge of the local conditions and their close interaction with the State Government Agriculture Department provides them opportunities. Although important steps are being initiated through the Sikkim State Action Plan on Climate Change it is yet to deliver effective means of adaptation implementation and hence, strengthening the networks of close coordination between the various implementing agencies will pay dividends. Knowledge gaps and the need for capacity building identified in this research, based on the understandings of key stakeholders are highly relevant to both the research community and for informing policy. Copyright © 2018 Elsevier B.V. All rights reserved.

  2. Continuous Variable Quantum Key Distribution with a Noisy Laser

    DEFF Research Database (Denmark)

    Jacobsen, Christian Scheffmann; Gehring, Tobias; Andersen, Ulrik Lund

    2015-01-01

    Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement...... a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances...

  3. Assessment of Health Effects of Exogenous Urea: Summary and Key Findings.

    Science.gov (United States)

    Dickerson, Aisha S; Lee, Janice S; Keshava, Channa; Hotchkiss, Andrew; Persad, Amanda S

    2018-05-01

    Urea has been utilized as a reductant in diesel fuels to lower emission of nitrogen oxides, igniting interest in probable human health hazards associated with exposure to exogenous urea. Here, we summarize and update key findings on potential health effects of exogenous urea, including carcinogenicity. No definitive target organs for oral exposure were identified; however, results in animal studies suggest that the liver and kidney could be potential target organs of urea toxicity. The available human-subject literature suggests that the impact on lung function is minimal. Based on the literature on exogenous urea, we concluded that there was inadequate information to assess the carcinogenic potential of urea, or perform a quantitative assessment to derive reference values. Given the limited information on exogenous urea, additional research to address gaps for exogenous urea should include long-term cancer bioassays, two-generation reproductive toxicity studies, and mode-of-action investigations.

  4. Use of participant focus groups to identify barriers and facilitators to worksite exercise therapy adherence in randomized controlled trials involving firefighters

    Directory of Open Access Journals (Sweden)

    Mayer JM

    2013-03-01

    Full Text Available John M Mayer,1 James L Nuzzo,1 Simon Dagenais2 1School of Physical Therapy and Rehabilitation Sciences, College of Medicine, University of South Florida, Tampa, FL, 2Palladian Health, West Seneca, NY, USA Background: Firefighters are at increased risk for back injuries, which may be mitigated through exercise therapy to increase trunk muscle endurance. However, long-term adherence to exercise therapy is generally poor, limiting its potential benefits. Focus groups can be used to identify key barriers and facilitators to exercise adherence among study participants. Objective: To explore barriers and facilitators to worksite exercise therapy adherence among firefighters to inform future randomized controlled trials (RCTs. Methods: Participants enrolled in a previous RCT requiring twice-weekly worksite exercise therapy for 24 weeks were asked to take part in moderated focus group discussions centered on eight open-ended questions related to exercise adherence. Responses were analyzed qualitatively using a social ecological framework to identify key intrapersonal, interpersonal, and institutional barriers and potential facilitators to exercise adherence. Results: A total of 27 participants were included in the four focus group discussions, representing 50% of those assigned to a worksite exercise therapy group in the previous RCT, in which only 67% of scheduled exercise therapy sessions were completed. Lack of self-motivation was cited as the key intrapersonal barrier to adherence, while lack of peer support was the key interpersonal barrier reported, and lack of time to exercise during work shifts was the key institutional barrier identified. Conclusion: Focus group discussions identified both key barriers and potential facilitators to increase worksite exercise therapy adherence among firefighters. Future studies should consider educating and reminding participants about the benefits of exercise, providing individual and group incentives based on

  5. Identifying the "Right Stuff": An Exploration-Focused Astronaut Job Analysis

    Science.gov (United States)

    Barrett, J. D.; Holland, A. W.; Vessey, W. B.

    2015-01-01

    Industrial and organizational (I/O) psychologists play a key role in NASA astronaut candidate selection through the identification of the competencies necessary to successfully engage in the astronaut job. A set of psychosocial competencies, developed by I/O psychologists during a prior job analysis conducted in 1996 and updated in 2003, were identified as necessary for individuals working and living in the space shuttle and on the International Space Station (ISS). This set of competencies applied to the space shuttle and applies to current ISS missions, but may not apply to longer-duration or long-distance exploration missions. With the 2015 launch of the first 12- month ISS mission and the shift in the 2020s to missions beyond low earth orbit, the type of missions that astronauts will conduct and the environment in which they do their work will change dramatically, leading to new challenges for these crews. To support future astronaut selection, training, and research, I/O psychologists in NASA's Behavioral Health and Performance (BHP) Operations and Research groups engaged in a joint effort to conduct an updated analysis of the astronaut job for current and future operations. This project will result in the identification of behavioral competencies critical to performing the astronaut job, along with relative weights for each of the identified competencies, through the application of job analysis techniques. While this job analysis is being conducted according to job analysis best practices, the project poses a number of novel challenges. These challenges include the need to identify competencies for multiple mission types simultaneously, to evaluate jobs that have no incumbents as they have never before been conducted, and working with a very limited population of subject matter experts. Given these challenges, under the guidance of job analysis experts, we used the following methods to conduct the job analysis and identify the key competencies for current and

  6. Structural and mechanistic analysis of a β-glycoside phosphorylase identified by screening a metagenomic library.

    Science.gov (United States)

    Macdonald, Spencer S; Patel, Ankoor; Larmour, Veronica L C; Morgan-Lang, Connor; Hallam, Steven J; Mark, Brian L; Withers, Stephen G

    2018-03-02

    Glycoside phosphorylases have considerable potential as catalysts for the assembly of useful glycans for products ranging from functional foods and prebiotics to novel materials. However, the substrate diversity of currently identified phosphorylases is relatively small, limiting their practical applications. To address this limitation, we developed a high-throughput screening approach using the activated substrate 2,4-dinitrophenyl β-d-glucoside (DNPGlc) and inorganic phosphate for identifying glycoside phosphorylase activity and used it to screen a large insert metagenomic library. The initial screen, based on release of 2,4-dinitrophenyl from DNPGlc in the presence of phosphate, identified the gene bglP, encoding a retaining β-glycoside phosphorylase from the CAZy GH3 family. Kinetic and mechanistic analysis of the gene product, BglP, confirmed a double displacement ping-pong mechanism involving a covalent glycosyl-enzyme intermediate. X-ray crystallographic analysis provided insights into the phosphate-binding mode and identified a key glutamine residue in the active site important for substrate recognition. Substituting this glutamine for a serine swapped the substrate specificity from glucoside to N -acetylglucosaminide. In summary, we present a high-throughput screening approach for identifying β-glycoside phosphorylases, which was robust, simple to implement, and useful in identifying active clones within a metagenomics library. Implementation of this screen enabled discovery of a new glycoside phosphorylase class and has paved the way to devising simple ways in which enzyme specificity can be encoded and swapped, which has implications for biotechnological applications. © 2018 by The American Society for Biochemistry and Molecular Biology, Inc.

  7. The Impact of IFRS 16 on the Companies’ Key Performance Indicators: Limits, Advantages and Drawbacks

    OpenAIRE

    Alin Eliodor Tanase; Traian Ovidiu Calota; Florin Razvan Oncioiu

    2018-01-01

    t This article focuses on the impact of the new standard IFRS 16 Leases on the companies’ key performance indicators. The magnitude of this impact could be said to change depending on the usage density of the lease in the companies and also depending on the sector they are in. The results show that future transactions may be influenced by IFRS 16 such as sale and leaseback, acquisitions and mergers, and lease vs. buying.

  8. Continuous Variable Quantum Key Distribution Using Polarized Coherent States

    Science.gov (United States)

    Vidiella-Barranco, A.; Borelli, L. F. M.

    We discuss a continuous variables method of quantum key distribution employing strongly polarized coherent states of light. The key encoding is performed using the variables known as Stokes parameters, rather than the field quadratures. Their quantum counterpart, the Stokes operators Ŝi (i=1,2,3), constitute a set of non-commuting operators, being the precision of simultaneous measurements of a pair of them limited by an uncertainty-like relation. Alice transmits a conveniently modulated two-mode coherent state, and Bob randomly measures one of the Stokes parameters of the incoming beam. After performing reconciliation and privacy amplification procedures, it is possible to distill a secret common key. We also consider a non-ideal situation, in which coherent states with thermal noise, instead of pure coherent states, are used for encoding.

  9. Practical long-distance quantum key distribution system using decoy levels

    International Nuclear Information System (INIS)

    Rosenberg, D; Peterson, C G; Harrington, J W; Rice, P R; Dallmann, N; Tyagi, K T; McCabe, K P; Hughes, R J; Nordholt, J E; Nam, S; Baek, B; Hadfield, R H

    2009-01-01

    Quantum key distribution (QKD) has the potential for widespread real-world applications, but no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from the laboratory to the real world due largely to limitations in synchronization and poor detector performance. Here, we report results obtained using a fully automated, robust QKD system based on the Bennett Brassard 1984 (BB84) protocol with low-noise superconducting nanowire single-photon detectors (SNSPDs) and decoy levels to produce a secret key with unconditional security over a record 140.6 km of optical fibre, an increase of more than a factor of five compared with the previous record for unconditionally secure key generation in a practical QKD system.

  10. ZEPLIN-II limits on WIMP-nucelon interactions

    International Nuclear Information System (INIS)

    Alner, G. J.; Bungau, C.; Camanzi, B.; Durkin, T.; Edwards, B.; Lewin, J. D.; Luescher, R.; Preece, R. M.; Smith, N. J. T.; Smith, P. F.; Sumner, T. J.; Thorne, C.; Araujo, H. M.; Bewick, A.; Davidge, D.; Dawson, J.; Howard, A. S.; Jones, W. G.; Joshi, M.; Lebedenko, V. N.

    2009-01-01

    ZEPLIN II is a two-phase xenon detector designed to detect dark matter in the form of Weakly Interacting Massive Particles (WIMPs). Following the first 31-day underground run in Boulby Mine, UK, the collaboration published dark matter limits in January 2007; the first such limits using two-phase xenon technology. We outline the key detector design, performance and results here.

  11. Using the Theory of Planned Behavior to identify key beliefs underlying chlamydia testing intentions in a sample of young people living in deprived areas.

    Science.gov (United States)

    Booth, Amy R; Norman, Paul; Harris, Peter R; Goyder, Elizabeth

    2015-09-01

    The Theory of Planned Behavior was used to identify the key behavioural, normative and control beliefs underlying intentions to test regularly for chlamydia among young people living in socially and economically deprived areas - a high-risk group for infection. Participants (N = 278, 53% male; mean age 17 years) were recruited from a vocational college situated in an area in the most deprived national quintile (England). Participants completed measures of behavioural, normative and control beliefs, plus intention to test regularly for chlamydia. The behavioural, normative and control beliefs most strongly correlated with intentions to test regularly for chlamydia were beliefs about stopping the spread of infection, partners' behaviour and the availability of testing. These beliefs represent potential targets for interventions to increase chlamydia testing among young people living in deprived areas. © The Author(s) 2013.

  12. Co-extinction in a host-parasite network: identifying key hosts for network stability.

    Science.gov (United States)

    Dallas, Tad; Cornelius, Emily

    2015-08-17

    Parasites comprise a substantial portion of total biodiversity. Ultimately, this means that host extinction could result in many secondary extinctions of obligate parasites and potentially alter host-parasite network structure. Here, we examined a highly resolved fish-parasite network to determine key hosts responsible for maintaining parasite diversity and network structure (quantified here as nestedness and modularity). We evaluated four possible host extinction orders and compared the resulting co-extinction dynamics to random extinction simulations; including host removal based on estimated extinction risk, parasite species richness and host level contributions to nestedness and modularity. We found that all extinction orders, except the one based on realistic extinction risk, resulted in faster declines in parasite diversity and network structure relative to random biodiversity loss. Further, we determined species-level contributions to network structure were best predicted by parasite species richness and host family. Taken together, we demonstrate that a small proportion of hosts contribute substantially to network structure and that removal of these hosts results in rapid declines in parasite diversity and network structure. As network stability can potentially be inferred through measures of network structure, our findings may provide insight into species traits that confer stability.

  13. Scoping review identifies significant number of knowledge translation theories, models and frameworks with limited use.

    Science.gov (United States)

    Strifler, Lisa; Cardoso, Roberta; McGowan, Jessie; Cogo, Elise; Nincic, Vera; Khan, Paul A; Scott, Alistair; Ghassemi, Marco; MacDonald, Heather; Lai, Yonda; Treister, Victoria; Tricco, Andrea C; Straus, Sharon E

    2018-04-13

    To conduct a scoping review of knowledge translation (KT) theories, models and frameworks that have been used to guide dissemination or implementation of evidence-based interventions targeted to prevention and/or management of cancer or other chronic diseases. We used a comprehensive multistage search process from 2000-2016, which included traditional bibliographic database searching, searching using names of theories, models and frameworks, and cited reference searching. Two reviewers independently screened the literature and abstracted data. We found 596 studies reporting on the use of 159 KT theories, models or frameworks. A majority (87%) of the identified theories, models or frameworks were used in five or fewer studies, with 60% used once. The theories, models and frameworks were most commonly used to inform planning/design, implementation and evaluation activities, and least commonly used to inform dissemination and sustainability/scalability activities. Twenty-six were used across the full implementation spectrum (from planning/design to sustainability/scalability) either within or across studies. All were used for at least individual-level behavior change, while 48% were used for organization-level, 33% for community-level and 17% for system-level change. We found a significant number of KT theories, models and frameworks with a limited evidence base describing their use. Copyright © 2018. Published by Elsevier Inc.

  14. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  15. Collaboration between employers and occupational health service providers: a systematic review of key characteristics.

    Science.gov (United States)

    Halonen, Jaana I; Atkins, Salla; Hakulinen, Hanna; Pesonen, Sanna; Uitti, Jukka

    2017-01-05

    Employees are major contributors to economic development, and occupational health services (OHS) can have an important role in supporting their health. Key to this is collaboration between employers and OHS. We reviewed the evidence regarding the characteristics of good collaboration between employers and OHS providers that is essential to construct more effective collaboration and services. A systematic review of the factors of good collaboration between employers and OHS providers was conducted. We searched five databases between January 2000 and March 2016 and back referenced included articles. Two reviewers evaluated 639 titles, 63 abstracts and 20 full articles, and agreed that six articles, all on qualitative studies, met the predetermined relevance and publication criteria and were included. Data were extracted by one reviewer and checked by a second reviewer and analysed using thematic analysis. Three themes and nine subthemes related to good collaboration were identified. The first theme included time, space and contract requirements for effective collaboration with three subthemes (i.e., key characteristics): flexible OHS/flexible contracts including tailor-made services accounting for the needs of the employer, geographical proximity of the stakeholders allowing easy access to services, and long-term contracts as collaboration develops over time. The second theme was related to characteristics of the dialogue in effective collaboration that consisted of shared goals, reciprocity, frequent contact and trust. According to the third theme the definition of roles of the stakeholders was important; OHS providers should have competence and knowledge about the workplace, become strategic partners with the employers as well as provide quality services. Although literature regarding collaboration between the employers and OHS providers was limited, we identified several key factors that contribute to effective collaboration. This information is useful in

  16. Collaboration between employers and occupational health service providers: a systematic review of key characteristics

    Directory of Open Access Journals (Sweden)

    Jaana I. Halonen

    2017-01-01

    Full Text Available Abstract Background Employees are major contributors to economic development, and occupational health services (OHS can have an important role in supporting their health. Key to this is collaboration between employers and OHS. We reviewed the evidence regarding the characteristics of good collaboration between employers and OHS providers that is essential to construct more effective collaboration and services. Methods A systematic review of the factors of good collaboration between employers and OHS providers was conducted. We searched five databases between January 2000 and March 2016 and back referenced included articles. Two reviewers evaluated 639 titles, 63 abstracts and 20 full articles, and agreed that six articles, all on qualitative studies, met the predetermined relevance and publication criteria and were included. Data were extracted by one reviewer and checked by a second reviewer and analysed using thematic analysis. Results Three themes and nine subthemes related to good collaboration were identified. The first theme included time, space and contract requirements for effective collaboration with three subthemes (i.e., key characteristics: flexible OHS/flexible contracts including tailor-made services accounting for the needs of the employer, geographical proximity of the stakeholders allowing easy access to services, and long-term contracts as collaboration develops over time. The second theme was related to characteristics of the dialogue in effective collaboration that consisted of shared goals, reciprocity, frequent contact and trust. According to the third theme the definition of roles of the stakeholders was important; OHS providers should have competence and knowledge about the workplace, become strategic partners with the employers as well as provide quality services. Conclusion Although literature regarding collaboration between the employers and OHS providers was limited, we identified several key factors that contribute

  17. The Impact of IFRS 16 on the Companies’ Key Performance Indicators: Limits, Advantages and Drawbacks

    Directory of Open Access Journals (Sweden)

    Alin Eliodor Tanase

    2018-03-01

    Full Text Available t This article focuses on the impact of the new standard IFRS 16 Leases on the companies’ key performance indicators. The magnitude of this impact could be said to change depending on the usage density of the lease in the companies and also depending on the sector they are in. The results show that future transactions may be influenced by IFRS 16 such as sale and leaseback, acquisitions and mergers, and lease vs. buying.

  18. Why we still don't understand the social aspects of wind power: A critique of key assumptions within the literature

    International Nuclear Information System (INIS)

    Aitken, Mhairi

    2010-01-01

    The literature on public attitudes to wind power is underpinned by key assumptions which limit its scope and restrict the findings it can present. Five key assumptions are that: (1) The majority of the public supports wind power. (2) Opposition to wind power is therefore deviant. (3) Opponents are ignorant or misinformed. (4) The reason for understanding opposition is to overcome it. (5) Trust is key. The paper calls for critical reflection on each of these assumptions. It should not be assumed that opposition to wind power is deviant/illegitimate. Opposition cannot be dismissed as ignorant or misinformed instead it must be acknowledged that objectors are often very knowledgeable. Public attitudes and responses to wind power should not be examined in order to mitigate potential future opposition, but rather in order to understand the social context of renewable energy. Trust is identified as a key issue, however greater trust must be placed in members of the public and in their knowledge. In sum, the literature must abandon the assumption that it knows who is 'right' and instead must engage with the possibility that objectors to wind power are not always 'wrong'.

  19. Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks

    International Nuclear Information System (INIS)

    Patel, K. A.; Dynes, J. F.; Lucamarini, M.; Choi, I.; Sharpe, A. W.; Yuan, Z. L.; Shields, A. J.; Penty, R. V.

    2014-01-01

    We demonstrate quantum key distribution (QKD) with bidirectional 10 Gb/s classical data channels in a single fiber using dense wavelength division multiplexing. Record secure key rates of 2.38 Mbps and fiber distances up to 70 km are achieved. Data channels are simultaneously monitored for error-free operation. The robustness of QKD is further demonstrated with a secure key rate of 445 kbps over 25 km, obtained in the presence of data lasers launching conventional 0 dBm power. We discuss the fundamental limit for the QKD performance in the multiplexing environment

  20. Materials Genome in Action: Identifying the Performance Limits of Physical Hydrogen Storage

    Science.gov (United States)

    2017-01-01

    The Materials Genome is in action: the molecular codes for millions of materials have been sequenced, predictive models have been developed, and now the challenge of hydrogen storage is targeted. Renewably generated hydrogen is an attractive transportation fuel with zero carbon emissions, but its storage remains a significant challenge. Nanoporous adsorbents have shown promising physical adsorption of hydrogen approaching targeted capacities, but the scope of studies has remained limited. Here the Nanoporous Materials Genome, containing over 850 000 materials, is analyzed with a variety of computational tools to explore the limits of hydrogen storage. Optimal features that maximize net capacity at room temperature include pore sizes of around 6 Å and void fractions of 0.1, while at cryogenic temperatures pore sizes of 10 Å and void fractions of 0.5 are optimal. Our top candidates are found to be commercially attractive as “cryo-adsorbents”, with promising storage capacities at 77 K and 100 bar with 30% enhancement to 40 g/L, a promising alternative to liquefaction at 20 K and compression at 700 bar. PMID:28413259

  1. A Constitutive Relationship between Fatigue Limit and Microstructure in Nanostructured Bainitic Steels

    Science.gov (United States)

    Mueller, Inga; Rementeria, Rosalia; Caballero, Francisca G.; Kuntz, Matthias; Sourmail, Thomas; Kerscher, Eberhard

    2016-01-01

    The recently developed nanobainitic steels show high strength as well as high ductility. Although this combination seems to be promising for fatigue design, fatigue properties of nanostructured bainitic steels are often surprisingly low. To improve the fatigue behavior, an understanding of the correlation between the nanobainitic microstructure and the fatigue limit is fundamental. Therefore, our hypothesis to predict the fatigue limit was that the main function of the microstructure is not necessarily totally avoiding the initiation of a fatigue crack, but the microstructure has to increase the ability to decelerate or to stop a growing fatigue crack. Thus, the key to understanding the fatigue behavior of nanostructured bainite is to understand the role of the microstructural features that could act as barriers for growing fatigue cracks. To prove this hypothesis, we carried out fatigue tests, crack growth experiments, and correlated these results to the size of microstructural features gained from microstructural analysis by light optical microscope and EBSD-measurements. Finally, we were able to identify microstructural features that influence the fatigue crack growth and the fatigue limit of nanostructured bainitic steels. PMID:28773953

  2. A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays

    Science.gov (United States)

    Jang, Seung-Jae; Lee, Young-Gu; Lee, Kwang-Hyung; Kim, Tai-Hoon; Jun, Moon-Seog

    2011-01-01

    These days, with the emergence of the concept of ubiquitous computing, sensor networks that collect, analyze and process all the information through the sensors have become of huge interest. However, sensor network technology fundamentally has wireless communication infrastructure as its foundation and thus has security weakness and limitations such as low computing capacity, power supply limitations and price. In this paper, and considering the characteristics of the sensor network environment, we propose a group key agreement method using a keyset pre-distribution of two-dimension arrays that should minimize the exposure of key and personal information. The key collision problems are resolved by utilizing a polygonal shape’s center of gravity. The method shows that calculating a polygonal shape’s center of gravity only requires a very small amount of calculations from the users. The simple calculation not only increases the group key generation efficiency, but also enhances the sense of security by protecting information between nodes. PMID:22164072

  3. A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays

    Directory of Open Access Journals (Sweden)

    Moon-Seog Jun

    2011-08-01

    Full Text Available These days, with the emergence of the concept of ubiquitous computing, sensor networks that collect, analyze and process all the information through the sensors have become of huge interest. However, sensor network technology fundamentally has wireless communication infrastructure as its foundation and thus has security weakness and limitations such as low computing capacity, power supply limitations and price. In this paper, and considering the characteristics of the sensor network environment, we propose a group key agreement method using a keyset pre-distribution of two-dimension arrays that should minimize the exposure of key and personal information. The key collision problems are resolved by utilizing a polygonal shape’s center of gravity. The method shows that calculating a polygonal shape’s center of gravity only requires a very small amount of calculations from the users. The simple calculation not only increases the group key generation efficiency, but also enhances the sense of security by protecting information between nodes.

  4. A limited area model intercomparison on the 'Montserrat-2000' flash-flood event using statistical and deterministic methods

    Directory of Open Access Journals (Sweden)

    S. Mariani

    2005-01-01

    Full Text Available In the scope of the European project Hydroptimet, INTERREG IIIB-MEDOCC programme, limited area model (LAM intercomparison of intense events that produced many damages to people and territory is performed. As the comparison is limited to single case studies, the work is not meant to provide a measure of the different models' skill, but to identify the key model factors useful to give a good forecast on such a kind of meteorological phenomena. This work focuses on the Spanish flash-flood event, also known as 'Montserrat-2000' event. The study is performed using forecast data from seven operational LAMs, placed at partners' disposal via the Hydroptimet ftp site, and observed data from Catalonia rain gauge network. To improve the event analysis, satellite rainfall estimates have been also considered. For statistical evaluation of quantitative precipitation forecasts (QPFs, several non-parametric skill scores based on contingency tables have been used. Furthermore, for each model run it has been possible to identify Catalonia regions affected by misses and false alarms using contingency table elements. Moreover, the standard 'eyeball' analysis of forecast and observed precipitation fields has been supported by the use of a state-of-the-art diagnostic method, the contiguous rain area (CRA analysis. This method allows to quantify the spatial shift forecast error and to identify the error sources that affected each model forecasts. High-resolution modelling and domain size seem to have a key role for providing a skillful forecast. Further work is needed to support this statement, including verification using a wider observational data set.

  5. How to identify the key factors that affect driver perception of accident risk. A comparison between Italian and Spanish driver behavior.

    Science.gov (United States)

    de Oña, Juan; de Oña, Rocio; Eboli, Laura; Forciniti, Carmen; Mazzulla, Gabriella

    2014-12-01

    Road crashes can be caused by different factors, including infrastructure, vehicles, and human variables. Many research studies have focused solely on identifying the key factors that cause road crashes. From these studies, it emerged that human factors have the most relevant impact on accident severity. More specifically, accident severity depends on several factors related directly to the driver, i.e., driving experience, driver's socio-economic characteristics, and driving behavior and attitudes. In this paper, we investigate driver behaviors and attitudes while driving and specifically focus on different methods for identifying the factors that most affect the driver's perception of accident risk. To this end, we designed and conducted a survey in two different European contexts: the city of Cosenza, which is located in the south of Italy, and the city of Granada, which is located in the south of Spain. Samples of drivers were contacted for their opinions on certain aspects of driving rules and attitudes while driving, and different types of questions were addressed to the drivers to assess their judgments of these aspects. Consequently, different methods of data analysis were applied to determine the aspects that heavily influence driver perception of accident risk. An experiment based on the stated preferences (SP) was carried out with the drivers, and the SP data were analyzed using an ordered probit (OP) model. Interesting findings emerged from different analyses of the data and from the comparisons among the data collected in the two different territorial contexts. We found that both Italian and Spanish drivers consider driving in an altered psychophysical state and violating the overtaking rules to be the most risky behaviors. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. Lifelong Learning Key Competence Levels of Graduate Students

    Science.gov (United States)

    Adabas, Abdurrahman; Kaygin, Hüseyin

    2016-01-01

    The European Union defines lifelong learning as all activities aimed at improving an individual's knowledge, skills and competences individually, socially or vocationally throughout his/her life. In 2007, eight key competences necessary for lifelong learning were identified by the European Union Education and Culture Commission. These competences…

  7. Identifying Opportunities for Vertical Integration of Biochemistry and Clinical Medicine.

    Science.gov (United States)

    Wendelberger, Karen J.; Burke, Rebecca; Haas, Arthur L.; Harenwattananon, Marisa; Simpson, Deborah

    1998-01-01

    Objectives: Retention of basic science knowledge, as judged by National Board of Medical Examiners' (NBME) data, suffers due to lack of apparent relevance and isolation of instruction from clinical application, especially in biochemistry. However, the literature reveals no systematic process for identifying key biochemical concepts and associated clinical conditions. This study systematically identified difficult biochemical concepts and their common clinical conditions as a critical step towards enhancing relevance and retention of biochemistry.Methods: A multi-step/ multiple stakeholder process was used to: (1) identify important biochemistry concepts; (2) determine students' perceptions of concept difficulty; (3) assess biochemistry faculty, student, and clinical teaching scholars' perceived relevance of identified concepts; and (4) identify associated common clinical conditions for relevant and difficult concepts. Surveys and a modified Delphi process were used to gather data, subsequently analyzed using SPSS for Windows.Results: Sixteen key biochemical concepts were identified. Second year medical students rated 14/16 concepts as extremely difficult while fourth year students rated nine concepts as moderately to extremely difficult. On average, each teaching scholar generated common clinical conditions for 6.2 of the 16 concepts, yielding a set of seven critical concepts and associated clinical conditions.Conclusions: Key stakeholders in the instructional process struggle to identify biochemistry concepts that are critical, difficult to learn and associated with common clinical conditions. However, through a systematic process beginning with identification of concepts and associated clinical conditions, relevance of basic science instruction can be enhanced.

  8. Limitations and Extensions of the Lock-and-Key Principle: Differences between Gas State, Solution and Solid State Structures

    Directory of Open Access Journals (Sweden)

    Hans-Jörg Schneider

    2015-03-01

    Full Text Available The lock-and-key concept is discussed with respect to necessary extensions. Formation of supramolecular complexes depends not only, and often not even primarily on an optimal geometric fit between host and guest. Induced fit and allosteric interactions have long been known as important modifications. Different binding mechanisms, the medium used and pH effects can exert a major influence on the affinity. Stereoelectronic effects due to lone pair orientation can lead to variation of binding constants by orders of magnitude. Hydrophobic interactions due to high-energy water inside cavities modify the mechanical lock-and-key picture. That optimal affinities are observed if the cavity is only partially filled by the ligand can be in conflict with the lock-and-key principle. In crystals other forces than those between host and guest often dominate, leading to differences between solid state and solution structures. This is exemplified in particular with calixarene complexes, which by X-ray analysis more often than other hosts show guest molecules outside their cavity. In view of this the particular problems with the identification of weak interactions in crystals is discussed.

  9. A quantitative analysis of statistical power identifies obesity end points for improved in vivo preclinical study design.

    Science.gov (United States)

    Selimkhanov, J; Thompson, W C; Guo, J; Hall, K D; Musante, C J

    2017-08-01

    The design of well-powered in vivo preclinical studies is a key element in building the knowledge of disease physiology for the purpose of identifying and effectively testing potential antiobesity drug targets. However, as a result of the complexity of the obese phenotype, there is limited understanding of the variability within and between study animals of macroscopic end points such as food intake and body composition. This, combined with limitations inherent in the measurement of certain end points, presents challenges to study design that can have significant consequences for an antiobesity program. Here, we analyze a large, longitudinal study of mouse food intake and body composition during diet perturbation to quantify the variability and interaction of the key metabolic end points. To demonstrate how conclusions can change as a function of study size, we show that a simulated preclinical study properly powered for one end point may lead to false conclusions based on secondary end points. We then propose the guidelines for end point selection and study size estimation under different conditions to facilitate proper power calculation for a more successful in vivo study design.

  10. The Introduction of Key Skills in Schools: Core or Casualty?

    Science.gov (United States)

    Glover, Derek; Gleeson, Denis; Johnson, Mike; Spencer, Pat; Watson, Ray

    2000-01-01

    Study of the introduction of generic Key Skills in two local education authorities in Britain found limited implementation. Results suggested the need for strategic district- and school-level management, clear aims and objectives, ownership by school staff, and cross-curricular application. (SK)

  11. E-Commerce Performance. Shopping Cart Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Mihaela I. MUNTEAN

    2016-01-01

    Full Text Available In an e-commerce performance framework is important to identify the key performance indicators that measure success and together provide the greatest context into the business perfor-mance. Shopping carts are an essential part of ecommerce, a minimal set of key performance indicators being the subject of our debate. The theoretical approach is sustained by a case study, an e-shop implemented using PHP and MySQL, for simulating main business processes within the considered performance framework. Our approach opens a perspective for future research using additional indicators in order to properly evaluate the global performance of any e-shop.

  12. Key attributes of expert NRL referees.

    Science.gov (United States)

    Morris, Gavin; O'Connor, Donna

    2017-05-01

    Experiential knowledge of elite National Rugby League (NRL) referees was investigated to determine the key attributes contributing to expert officiating performance. Fourteen current first-grade NRL referees were asked to identify the key attributes they believed contributed to their expert refereeing performance. The modified Delphi method involved a 3-round process of an initial semi-structured interview followed by 2 questionnaires to reach consensus of opinion. The data revealed 25 attributes that were rated as most important that underpin expert NRL refereeing performance. Results illustrate the significance of the cognitive category, with the top 6 ranked attributes all cognitive skills. Of these, the referees ranked decision-making accuracy as the most important attribute, followed by reading the game, communication, game understanding, game management and knowledge of the rules. Player rapport, positioning and teamwork were the top ranked game skill attributes underpinning performance excellence. Expert referees also highlighted a number of psychological attributes (e.g., concentration, composure and mental toughness) that were significant to performance. There were only 2 physiological attributes (fitness, aerobic endurance) that were identified as significant to elite officiating performance. In summary, expert consensus was attained which successfully provided a hierarchy of the most significant attributes of expert NRL refereeing performance.

  13. Simple security proof of quantum key distribution based on complementarity

    International Nuclear Information System (INIS)

    Koashi, M

    2009-01-01

    We present an approach to the unconditional security of quantum key distribution protocols based on a complementarity argument. The approach is applicable to, but not limited to, every case that has been treated via the argument by Shor and Preskill based on entanglement distillation, with a benefit of decoupling of the error correction from the privacy amplification. It can also treat cases with uncharacterized apparatuses. We derive a secure key rate for the Bennett-Brassard-1984 protocol with an arbitrary source characterized only by a single parameter representing the basis dependence.

  14. Energy conservation in China: Key provincial sectors at two-digit level

    International Nuclear Information System (INIS)

    Liao, Hua; Du, Jian; Wei, Yi-Ming

    2013-01-01

    Highlights: ► We identify the keys for energy conversation across China’s 31 provinces × 65 sectors. ► The results are visualized in map and matrix tables, and easy for use. ► 39 Industrial sectors by province are classified into three categories for conservation. ► There is large energy wasting in the public management sector. ► There are both urban–rural gap and provincial inequality on electricity consumption. - Abstract: In March 2011, China’s central government set a new challenging target of reducing its energy intensity by 16% during 2011–2015, after it had achieved a reduction of 19.1% during 2006–2010. And this new target was assigned to provincial authorities in August 2011. However, China’s provincial energy-economic developments are unbalanced and different provinces have different key sectors for energy conservation. Most previous studies focused on provincial energy efficiency at the aggregate level, or the three-industry level (or one-digit level). However, whether for policy decision or academic research, it is necessary to further subdivide the sectors. In this paper, we use three indicators (Gini Coefficient, energy consumption share and energy intensity) to compare provincial energy conservation potentials at the two-digit sector level. To our knowledge, this paper is the first one to identify the keys for energy conversation across the 31 provinces × 65 sectors. And the results are shown in visualized maps and matrix tables to help identify the key province × sectors for energy conservation easier. This also helps the central and provincial governments to distinguish key sectors when they monitor the energy conservation progress

  15. Key Features of the Manufacturing Vision Development Process

    DEFF Research Database (Denmark)

    Dukovska-Popovska, Iskra; Riis, Jens Ove; Boer, Harry

    2005-01-01

    of action research. The methodology recommends wide participation of people from different hierarchical and functional positions, who engage in a relatively short, playful and creative process and come up with a vision (concept) for the future manufacturing system in the company. Based on three case studies......This paper discusses the key features of the process of Manufacturing Vision Development, a process that enables companies to develop their future manufacturing concept. The basis for the process is a generic five-phase methodology (Riis and Johansen 2003) developed as a result of ten years...... of companies going through the initial phases of the methodology, this research identified the key features of the Manufacturing Vision Development process. The paper elaborates the key features by defining them, discussing how and when they can appear, and how they influence the process....

  16. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  17. A Key Establishment Protocol for RFID User in IPTV Environment

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  18. Limited interface between physiotherapy primary care and people with severe mental illness: a qualitative study.

    Science.gov (United States)

    Lee, Samantha; Waters, Flavie; Briffa, Kathy; Fary, Robyn E

    2017-07-01

    How do mental health professionals perceive the role of physiotherapists in the care of people with severe and persistent mental illness, and what factors do they perceive as influencing access to physiotherapy services? How do people with severe and persistent mental illness understand the potential role of physiotherapy in their healthcare, and what factors do they perceive as influencing access to physiotherapy services? Qualitative study. Twenty-four mental health professionals and 35 people with severe and persistent mental illness. Interview schedules were developed to explore participants' understanding of physiotherapy, as well as barriers and enablers to service access. Focus groups and interviews were conducted for each group of participants. Transcripts were analysed using an inductive approach to derive key themes. Both the mental health professionals and the people with severe and persistent mental illness expressed a limited understanding of the role and relevance of physiotherapy for physical health in mental healthcare. Common barriers to service access were cost, transport and lack of motivation. Likewise, enablers of reduced cost, provision of transport and education about physiotherapy to improve their understanding were identified. The health system structure and perceived lack of mental health knowledge by physiotherapists influenced referrals from mental health professionals. Consequently, education in mental health for physiotherapists and integration of the service within mental health were identified as potential enablers to physiotherapy access. Limited understanding about physiotherapy and its relevance to physical health in mental healthcare among mental health professionals and people with severe and persistent mental illness was found to be a key factor influencing service access. Limited physiotherapy presence and advocacy within mental health were also highlighted. There is a need for greater understanding about physiotherapy among

  19. Nanshan Aluminum Reached Strategic Cooperation with CSR Corporation Limited

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    As a key supplier of aluminum profiles and aluminum plate,sheet and trip products for CSR Corporation Limited,Nanshan Aluminum will join hands with CSR Corporation Limited to reach strategic cooperation.On January 5,Nanshan Aluminum signed strategic cooperation agreement with CSR Sifang Locomotive&Rolling; Stock Co.,Ltd,both

  20. Integrating climate change adaptation in energy planning and decision-making - Key challenges and opportunities

    DEFF Research Database (Denmark)

    Olhoff, Anne; Olsen, Karen Holm

    2011-01-01

    management framework is used as the basis for identifying key challenges and opportunities to enhance the integration of climate change adaptation in energy planning and decision-making. Given its importance for raising awareness and for stimulating action by planners and decision-makers, emphasis is placed......Energy systems are significantly vulnerable to current climate variability and extreme events. As climate change becomes more pronounced, the risks and vulnerabilities will be exacerbated. To date, energy sector adaptation issues have received very limited attention. In this paper, a climate risk...... barriers to integration of climate risks and adaptive responses in energy planning and decision making. Both detailed assessments of the costs and benefits of integrating adaptation measures and rougher ‘order of magnitude’ estimates would enhance awareness raising and momentum for action....

  1. Fundamental limits of repeaterless quantum communications

    Science.gov (United States)

    Pirandola, Stefano; Laurenza, Riccardo; Ottaviani, Carlo; Banchi, Leonardo

    2017-01-01

    Quantum communications promises reliable transmission of quantum information, efficient distribution of entanglement and generation of completely secure keys. For all these tasks, we need to determine the optimal point-to-point rates that are achievable by two remote parties at the ends of a quantum channel, without restrictions on their local operations and classical communication, which can be unlimited and two-way. These two-way assisted capacities represent the ultimate rates that are reachable without quantum repeaters. Here, by constructing an upper bound based on the relative entropy of entanglement and devising a dimension-independent technique dubbed ‘teleportation stretching', we establish these capacities for many fundamental channels, namely bosonic lossy channels, quantum-limited amplifiers, dephasing and erasure channels in arbitrary dimension. In particular, we exactly determine the fundamental rate-loss tradeoff affecting any protocol of quantum key distribution. Our findings set the limits of point-to-point quantum communications and provide precise and general benchmarks for quantum repeaters. PMID:28443624

  2. Identifying and Ranking the Determinants of Tourism Performance

    DEFF Research Database (Denmark)

    Assaf, A.George; Josiassen, Alexander

    2012-01-01

    , their tourism industries, and tourism businesses seek to improve the performance of the tourism industry and its constituents by vigorously promoting themselves to international tourists, cutting costs, and identifying synergies in their tourism endeavors. In seeking to improve the tourism industry......, the determinants that affect tourism performance are of key interest to the stakeholders. A key obstacle toward improving performance is the multitude of determinants that can affect tourism performance. The literature has yet to provide concrete insights into the determinants of tourism performance...... and their relative importance. The present study addresses this important gap. We identify and rank the determinants of tourism performance. We also provide performance measures of international tourism destinations. The results are derived using the Data Envelopment Analysis (DEA) and bootstrap truncated regression...

  3. Key determinants of managing the marketing asset of global companies

    Directory of Open Access Journals (Sweden)

    Tatyana Tsygankova

    2016-12-01

    Full Text Available As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development. The article identified the optimal set of key elements of the system of marketing assets, which are the brand, customer loyalty, reputation, network cooperation, marketing strategy, internal marketing, marketing information system and marketing innovation. Due to correlation and regression analysis of the impact of each system elements on performance of global companies, the model of the "marketing asset octagon" was built as an integrative management tool. Also, as a result of construction of the said model, the authors identified the most profitable marketing assets, return on investment and development of competencies in the field of efficient management will bring the highest profit to the company. On the basis of summarizing the regional and branch features of managing the disparate elements of the marketing assets of global companies, the key regional and sectoral priorities of formation, development and improvement of existing concepts of the international marketing management were identified, particularly in terms of building an author’s integrative octagon model.

  4. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  5. KEY PERFORMANCE INDICATORS FOR HEALTHCARE RESEARCH ORGANIZATIONS BETWEEN 2011 AND 2015

    OpenAIRE

    ANISKEVICH A.S.; HALFIN R.A.

    2017-01-01

    In this work we identify 16 key indicators to evaluate the performance of healthcare research organizations. These indicators comprehensively characterize such aspects of performance as research output and relevance, human resource development, integration into the international scientific community, distribution of scientific knowledge, promotion of the prestige of science, and resource provision. Below, we review the existing classification of medical research institutions and their key fea...

  6. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.; Ferreira, Luciana C.; Sequeira, Ana M.M.; Meekan, Mark G.; Duarte, Carlos M.; Bailey, Helen; Bailleul, Fred; Bowen, W. Don; Caley, M. Julian; Costa, Daniel P.; Eguí luz, Victor M.; Fossette, Sabrina; Friedlaender, Ari S.; Gales, Nick; Gleiss, Adrian C.; Gunn, John; Harcourt, Rob; Hazen, Elliott L.; Heithaus, Michael R.; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L.; Lowe, Christopher G.; Madsen, Peter T.; Marsh, Helene; Phillips, Richard A.; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A.; Simpfendorfer, Colin A.; Sims, David W.; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N.; Wikelski, Martin; Womble, Jamie N.; Thums, Michele

    2016-01-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  7. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.

    2016-03-12

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  8. Almost-sure identifiability of multidimensional harmonic retrieval

    NARCIS (Netherlands)

    Jiang, T; Sidiropoulos, ND; ten Berge, JMF

    Two-dimensional (2-D) and, more generally, multidimensional harmonic retrieval is of interest in a variety of applications, including transmitter localization and joint time and frequency offset estimation in wireless communications. The associated identifiability problem is key in understanding the

  9. Identifying PHM market and network opportunities.

    Science.gov (United States)

    Grube, Mark E; Krishnaswamy, Anand; Poziemski, John; York, Robert W

    2015-11-01

    Two key processes for healthcare organizations seeking to assume a financially sustainable role in population health management (PHM), after laying the groundwork for the effort, are to identify potential PHM market opportunities and determine the scope of the PHM network. Key variables organizations should consider with respect to market opportunities include the patient population, the overall insurance/employer market, and available types of insurance products. Regarding the network's scope, organizations should consider both traditional strategic criteria for a viable network and at least five additional criteria: network essentiality and PHM care continuum, network adequacy, service distribution right-sizing, network growth strategy, and organizational agility.

  10. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  11. Predicting Key Events in the Popularity Evolution of Online Information.

    Science.gov (United States)

    Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  12. Predicting Key Events in the Popularity Evolution of Online Information.

    Directory of Open Access Journals (Sweden)

    Ying Hu

    Full Text Available The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  13. National Laboratory Planning: Developing Sustainable Biocontainment Laboratories in Limited Resource Areas.

    Science.gov (United States)

    Yeh, Kenneth B; Adams, Martin; Stamper, Paul D; Dasgupta, Debanjana; Hewson, Roger; Buck, Charles D; Richards, Allen L; Hay, John

    2016-01-01

    Strategic laboratory planning in limited resource areas is essential for addressing global health security issues. Establishing a national reference laboratory, especially one with BSL-3 or -4 biocontainment facilities, requires a heavy investment of resources, a multisectoral approach, and commitments from multiple stakeholders. We make the case for donor organizations and recipient partners to develop a comprehensive laboratory operations roadmap that addresses factors such as mission and roles, engaging national and political support, securing financial support, defining stakeholder involvement, fostering partnerships, and building trust. Successful development occurred with projects in African countries and in Azerbaijan, where strong leadership and a clear management framework have been key to success. A clearly identified and agreed management framework facilitate identifying the responsibility for developing laboratory capabilities and support services, including biosafety and biosecurity, quality assurance, equipment maintenance, supply chain establishment, staff certification and training, retention of human resources, and sustainable operating revenue. These capabilities and support services pose rate-limiting yet necessary challenges. Laboratory capabilities depend on mission and role, as determined by all stakeholders, and demonstrate the need for relevant metrics to monitor the success of the laboratory, including support for internal and external audits. Our analysis concludes that alternative frameworks for success exist for developing and implementing capabilities at regional and national levels in limited resource areas. Thus, achieving a balance for standardizing practices between local procedures and accepted international standards is a prerequisite for integrating new facilities into a country's existing public health infrastructure and into the overall international scientific community.

  14. Development of key indicators to quantify the health impacts of climate change on Canadians

    OpenAIRE

    Cheng, June J.; Berry, Peter

    2013-01-01

    Objectives This study aimed at developing a list of key human health indicators for quantifying the health impacts of climate change in Canada. Methods A literature review was conducted in OVID Medline to identify health morbidity and mortality indicators currently used to quantify climate change impacts. Public health frameworks and other studies of climate change indicators were reviewed to identify criteria with which to evaluate the list of proposed key indicators and a rating scale was d...

  15. Clinical risk management in hospitals: strategy, central coordination and dialogue as key enablers.

    Science.gov (United States)

    Briner, Matthias; Manser, Tanja; Kessler, Oliver

    2013-04-01

    The study aims to identify key enablers fostering clinical risk management (CRM) in hospitals to guide health care in this vital area of patient safety. A cross-sectional survey was conducted at the national level in 324 Swiss hospitals in 2007-2008 to assess the relationship between key elements and systematic CRM. Therefore, a comprehensive monitoring instrument for CRM was used for the first time. Organizational factors (e.g. strategy, coordination, resources) and structural conditions (e.g. hospital size) were tested as key elements. CRM was assessed by evaluating its maturity (i.e. the level of CRM development) by 12 theoretically derived indices joining together essential aspects of CRM at the hospital level and the service level. Chi-square measures were used to analyse the relationships between organizational factors or structural conditions and maturity of CRM. Participation in this voluntary survey was good, with CRM experts of 138 out of 324 hospitals responding (response rate 43%). Three key enablers for CRM were identified: implementing a function for central CRM coordination, assuring dialogue with and between the different hospital services, and developing strategic CRM objectives. This study offers, for the first time, an assessment of the maturity of hospitals' CRM and identifies key enablers related to CRM. This is a feasible first step in guiding hospitals to shape their CRM and presents a basis for future studies, for example, linking CRM to outcome data. © 2012 Blackwell Publishing Ltd.

  16. Academic Primer Series: Eight Key Papers about Education Theory.

    Science.gov (United States)

    Gottlieb, Michael; Boysen-Osborn, Megan; Chan, Teresa M; Krzyzaniak, Sara M; Pineda, Nicolas; Spector, Jordan; Sherbino, Jonathan

    2017-02-01

    Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A three-round, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice.

  17. Possibilities and limitations for sustainable bioenergy production systems

    International Nuclear Information System (INIS)

    Smeets, Edward Martinus Wilhelmus Utrecht University

    2008-05-01

    The main objective of this thesis is to investigate the possibilities and limitations of sustainable bioenergy production. To this end, the following research questions have been formulated: (1). What is the potential of different world regions to produce biomass for energy generation in the year 2050, taking account of biological and climatological limitations, the use of biomass to produce food, materials and traditional bioenergy, as well as the need to maintain existing forests and thus protect biodiversity?; (2) What are the main bottlenecks to formulating and implementing sustainability criteria for bioenergy production?; (3) To what extent does complying with sustainability criteria have impacts on the costs and potential of bioenergy production?; (4) To what extent do fertilizer- and manure-induced nitrous oxide (N2O) emissions due to energy crop production have an impact on the reduction of greenhouse gas (GHG) emissions when conventional transportation fuels are replaced by first-generation biofuels?; (5) In terms of economic and environmental performance, how does Europe's production, storage and transport of miscanthus and switchgrass in 2004 compare to that in 2030? Throughout this thesis, specific attention is paid to knowledge gaps and their potential impact on results, the aim being to identify priorities for future research and development. Another key element of our research is that we evaluate the possibilities and limitations of strategies that are designed to improve the performance of bioenergy production systems and that may be incorporated in bioenergy certification schemes and bioenergy promoting policies

  18. Identifying key controls on the behavior of an acidic-U(VI) plume in the Savannah River Site using reactive transport modeling.

    Science.gov (United States)

    Bea, Sergio A; Wainwright, Haruko; Spycher, Nicolas; Faybishenko, Boris; Hubbard, Susan S; Denham, Miles E

    2013-08-01

    Acidic low-level waste radioactive waste solutions were discharged to three unlined seepage basins at the F-Area of the Department of Energy (DOE) Savannah River Site (SRS), South Carolina, USA, from 1955 through 1989. Despite many years of active remediation, the groundwater remains acidic and contaminated with significant levels of U(VI) and other radionuclides. Monitored Natural Attenuation (MNA) is a desired closure strategy for the site, based on the premise that regional flow of clean background groundwater will eventually neutralize the groundwater acidity, immobilizing U(VI) through adsorption. An in situ treatment system is currently in place to accelerate this in the downgradient portion of the plume and similar measures could be taken upgradient if necessary. Understanding the long-term pH and U(VI) adsorption behavior at the site is critical to assess feasibility of MNA along with the in-situ remediation treatments. This paper presents a reactive transport (RT) model and uncertainty quantification (UQ) analyses to explore key controls on the U(VI)-plume evolution and long-term mobility at this site. Two-dimensional numerical RT simulations are run including the saturated and unsaturated (vadose) zones, U(VI) and H(+) adsorption (surface complexation) onto sediments, dissolution and precipitation of Al and Fe minerals, and key hydrodynamic processes are considered. UQ techniques are applied using a new open-source tool that is part of the developing ASCEM reactive transport modeling and analysis framework to: (1) identify the complex physical and geochemical processes that control the U(VI) plume migration in the pH range where the plume is highly mobile, (2) evaluate those physical and geochemical parameters that are most controlling, and (3) predict the future plume evolution constrained by historical, chemical and hydrological data. The RT simulation results show a good agreement with the observed historical pH and concentrations of U(VI), nitrates

  19. Key determinants of managing the marketing asset of global companies

    OpenAIRE

    Tatyana Tsygankova; Roman Ponomarenko

    2016-01-01

    As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development). The article identified the optimal set of key elements of the system of marketing assets, which are th...

  20. Mergeomics: a web server for identifying pathological pathways, networks, and key regulators via multidimensional data integration.

    Science.gov (United States)

    Arneson, Douglas; Bhattacharya, Anindya; Shu, Le; Mäkinen, Ville-Petteri; Yang, Xia

    2016-09-09

    Human diseases are commonly the result of multidimensional changes at molecular, cellular, and systemic levels. Recent advances in genomic technologies have enabled an outpour of omics datasets that capture these changes. However, separate analyses of these various data only provide fragmented understanding and do not capture the holistic view of disease mechanisms. To meet the urgent needs for tools that effectively integrate multiple types of omics data to derive biological insights, we have developed Mergeomics, a computational pipeline that integrates multidimensional disease association data with functional genomics and molecular networks to retrieve biological pathways, gene networks, and central regulators critical for disease development. To make the Mergeomics pipeline available to a wider research community, we have implemented an online, user-friendly web server ( http://mergeomics. idre.ucla.edu/ ). The web server features a modular implementation of the Mergeomics pipeline with detailed tutorials. Additionally, it provides curated genomic resources including tissue-specific expression quantitative trait loci, ENCODE functional annotations, biological pathways, and molecular networks, and offers interactive visualization of analytical results. Multiple computational tools including Marker Dependency Filtering (MDF), Marker Set Enrichment Analysis (MSEA), Meta-MSEA, and Weighted Key Driver Analysis (wKDA) can be used separately or in flexible combinations. User-defined summary-level genomic association datasets (e.g., genetic, transcriptomic, epigenomic) related to a particular disease or phenotype can be uploaded and computed real-time to yield biologically interpretable results, which can be viewed online and downloaded for later use. Our Mergeomics web server offers researchers flexible and user-friendly tools to facilitate integration of multidimensional data into holistic views of disease mechanisms in the form of tissue-specific key regulators

  1. 41 CFR Appendix A to Subpart C of... - 3-Key Points and Principles

    Science.gov (United States)

    2010-07-01

    ... Principles A Appendix A to Subpart C of Part 102 Public Contracts and Property Management Federal Property... 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be applied to situations not...

  2. A Constitutive Relationship between Fatigue Limit and Microstructure in Nanostructured Bainitic Steels

    Directory of Open Access Journals (Sweden)

    Inga Mueller

    2016-10-01

    Full Text Available The recently developed nanobainitic steels show high strength as well as high ductility. Although this combination seems to be promising for fatigue design, fatigue properties of nanostructured bainitic steels are often surprisingly low. To improve the fatigue behavior, an understanding of the correlation between the nanobainitic microstructure and the fatigue limit is fundamental. Therefore, our hypothesis to predict the fatigue limit was that the main function of the microstructure is not necessarily totally avoiding the initiation of a fatigue crack, but the microstructure has to increase the ability to decelerate or to stop a growing fatigue crack. Thus, the key to understanding the fatigue behavior of nanostructured bainite is to understand the role of the microstructural features that could act as barriers for growing fatigue cracks. To prove this hypothesis, we carried out fatigue tests, crack growth experiments, and correlated these results to the size of microstructural features gained from microstructural analysis by light optical microscope and EBSD-measurements. Finally, we were able to identify microstructural features that influence the fatigue crack growth and the fatigue limit of nanostructured bainitic steels.

  3. Preliminary disposal limits, plume interaction factors, and final disposal limits

    Energy Technology Data Exchange (ETDEWEB)

    Flach, G. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2018-01-11

    In the 2008 E-Area Performance Assessment (PA), each final disposal limit was constructed as the product of a preliminary disposal limit and a plume interaction factor. The following mathematical development demonstrates that performance objectives are generally expected to be satisfied with high confidence under practical PA scenarios using this method. However, radionuclides that experience significant decay between a disposal unit and the 100-meter boundary, such as H-3 and Sr-90, can challenge performance objectives, depending on the disposed-of waste composition, facility geometry, and the significance of the plume interaction factor. Pros and cons of analyzing single disposal units or multiple disposal units as a group in the preliminary disposal limits analysis are also identified.

  4. Implementation of continuous-variable quantum key distribution with discrete modulation

    Science.gov (United States)

    Hirano, Takuya; Ichikawa, Tsubasa; Matsubara, Takuto; Ono, Motoharu; Oguri, Yusuke; Namiki, Ryo; Kasai, Kenta; Matsumoto, Ryutaroh; Tsurumaru, Toyohiro

    2017-06-01

    We have developed a continuous-variable quantum key distribution (CV-QKD) system that employs discrete quadrature-amplitude modulation and homodyne detection of coherent states of light. We experimentally demonstrated automated secure key generation with a rate of 50 kbps when a quantum channel is a 10 km optical fibre. The CV-QKD system utilises a four-state and post-selection protocol and generates a secure key against the entangling cloner attack. We used a pulsed light source of 1550 nm wavelength with a repetition rate of 10 MHz. A commercially available balanced receiver is used to realise shot-noise-limited pulsed homodyne detection. We used a non-binary LDPC code for error correction (reverse reconciliation) and the Toeplitz matrix multiplication for privacy amplification. A graphical processing unit card is used to accelerate the software-based post-processing.

  5. Key Future Engineering Capabilities for Human Capital Retention

    Science.gov (United States)

    Sivich, Lorrie

    Projected record retirements of Baby Boomer generation engineers have been predicted to result in significant losses of mission-critical knowledge in space, national security, and future scientific ventures vital to high-technology corporations. No comprehensive review or analysis of engineering capabilities has been performed to identify threats related to the specific loss of mission-critical knowledge posed by the increasing retirement of tenured engineers. Archival data from a single diversified Fortune 500 aerospace manufacturing engineering company's engineering career database were analyzed to ascertain whether relationships linking future engineering capabilities, engineering disciplines, and years of engineering experience could be identified to define critical knowledge transfer models. Chi square, logistic, and linear regression analyses were used to map patterns of discipline-specific, mission-critical knowledge using archival data of engineers' perceptions of engineering capabilities, key developmental experiences, and knowledge learned from their engineering careers. The results from the study were used to document key engineering future capabilities. The results were then used to develop a proposed human capital retention plan to address specific key knowledge gaps of younger engineers as veteran engineers retire. The potential for social change from this study involves informing leaders of aerospace engineering corporations on how to build better quality mentoring or succession plans to fill the void of lost knowledge from retiring engineers. This plan can secure mission-critical knowledge for younger engineers for current and future product development and increased global competitiveness in the technology market.

  6. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    Science.gov (United States)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2016-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  7. A mental health needs assessment of children and adolescents in post-conflict Liberia: results from a quantitative key-informant survey

    Science.gov (United States)

    Borba, Christina P.C.; Ng, Lauren C.; Stevenson, Anne; Vesga-Lopez, Oriana; Harris, Benjamin L.; Parnarouskis, Lindsey; Gray, Deborah A.; Carney, Julia R.; Domínguez, Silvia; Wang, Edward K.S.; Boxill, Ryan; Song, Suzan J.; Henderson, David C.

    2016-01-01

    Between 1989 and 2004, Liberia experienced a devastating civil war that resulted in widespread trauma with almost no mental health infrastructure to help citizens cope. In 2009, the Liberian Ministry of Health and Social Welfare collaborated with researchers from Massachusetts General Hospital to conduct a rapid needs assessment survey in Liberia with local key informants (n = 171) to examine the impact of war and post-war events on emotional and behavioral problems of, functional limitations of, and appropriate treatment settings for Liberian youth aged 5–22. War exposure and post-conflict sexual violence, poverty, infectious disease and parental death negatively impacted youth mental health. Key informants perceived that youth displayed internalizing and externalizing symptoms and mental health-related functional impairment at home, school, work and in relationships. Medical clinics were identified as the most appropriate setting for mental health services. Youth in Liberia continue to endure the harsh social, economic and material conditions of everyday life in a protracted post-conflict state, and have significant mental health needs. Their observed functional impairment due to mental health issues further limited their access to protective factors such as education, employment and positive social relationships. Results from this study informed Liberia's first post-conflict mental health policy. PMID:26807147

  8. 41 CFR Appendix A to Subpart D of... - 3-Key Points and Principles

    Science.gov (United States)

    2010-07-01

    ... Principles A Appendix A to Subpart D of Part 102 Public Contracts and Property Management Federal Property... Subpart D of Part 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be applied...

  9. Network-Guided Key Gene Discovery for a Given Cellular Process

    DEFF Research Database (Denmark)

    He, Feng Q; Ollert, Markus

    2018-01-01

    Identification of key genes for a given physiological or pathological process is an essential but still very challenging task for the entire biomedical research community. Statistics-based approaches, such as genome-wide association study (GWAS)- or quantitative trait locus (QTL)-related analysis...... have already made enormous contributions to identifying key genes associated with a given disease or phenotype, the success of which is however very much dependent on a huge number of samples. Recent advances in network biology, especially network inference directly from genome-scale data...

  10. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  11. EZID: Long term identifiers made easy (Invited)

    Science.gov (United States)

    Starr, J.

    2013-12-01

    Scholarly research is producing ever increasing amounts of digital research data, and this data should be managed throughout the research life cycle both as part of good scientific practice, but also to comply with funder mandates, such as the 2013 OSTP Public Access Memo (http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp_public_access_memo_2013.pdf). By assigning unique and persistent identifiers to data objects, data managers can gain control and flexibility over what can be a daunting task. This is due to the fact that the objects can be moved to new locations without disruption to links, as long as the identifier target is maintained. EZID is a tool that makes assigning and maintaining unique, persistent identifiers easy. It was designed and built by California Digital Library (CDL) and has both a user interface and a RESTful API. EZID currently offers services for two globally unique, persistent identifier schemes: Digital Object Identifiers (DOIs) and Archival Resource Keys (ARKs). DOIs are identifiers originating from the publishing world and are in widespread use for journal articles. CDL is able to offer DOIs because of being a founding member of DataCite (http://www.datacite.org/), an international consortium established to provide easier access to scientific research data on the Internet. ARKs are identifiers originating from the library, archive and museum community. Like DOIs, they become persistent when the objects and identifier forwarding information is maintained. DOIs and ARKs have a key role in data management and, therefore, in data management plans. DOIs are the recommended identifier for use in data citation, and ARKs provide the maximum flexibility needed for data documentation and management throughout the early phases of a project. The two identifier schemes are able to be used together, and EZID is made to work with both. EZID clients, coming from education, research, government, and the private sector, are utilizing the

  12. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  13. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  14. A key design to prolong lifetime of wireless sensor network

    International Nuclear Information System (INIS)

    Qiu, Bo; Chen, XiQiu; Wu, Qi

    2016-01-01

    In order to solve the contradiction between the connectivity of the wireless sensor network and the key storage consumption, under the premise of reducing network storage consumption, the key pre-distribution management scheme with higher connectivity rate is proposed using the hexagonal network deployment information, which adopts the idea of the matrix space for the square deployment information strategy to reduce the burden of the network storage. Ability against the capture attack is improved obviously. The results show that contradiction between the network connectivity rate and the energy consumption has a better solution, and the proposed algorithm is suitable for the wireless sensor networks of energy limited.

  15. Key Biodiversity Areas in the Philippines: Priorities for Conservation

    Directory of Open Access Journals (Sweden)

    R.G.R. Ambal

    2012-08-01

    Full Text Available A process for identifying Key Biodiversity Areas (KBAs for the Philippines was undertaken in two phases. The 128 terrestrial and freshwater KBAs were identified in 2006 and the 123 marine KBAs were identified in 2009. A total of 228 KBAs resulted from the integration of the terrestrial, freshwater and marine KBAs. These KBAs represent the known habitat of 855 globally important species of plants, corals, molluscs, elasmobranchs, fishes, amphibians, reptiles, birds and mammals in the country. Inclusion of these KBAs in the country’s protected area system will be a significant step towards ensuring the conservation of the full scope of the country’s natural heritage.

  16. Assessment of Biotechnology Policies and International Trade in Key Markets for U.S. Agriculture

    OpenAIRE

    Marchant, Mary A.; Song, Baohui

    2005-01-01

    The United States leads the world in agricultural biotechnology research, adoption, commercialization, and exports. Our biotech commodities are highly dependent on international markets. Thus, any biotech policy changes by key importing countries may affect U.S. agricultural biotech product exports. This article identifies key markets for U.S. agricultural exports including biotech commodities and discusses current and proposed biotech policies in key markets for U.S. agricultural exports foc...

  17. Key components of financial-analysis education for clinical nurses.

    Science.gov (United States)

    Lim, Ji Young; Noh, Wonjung

    2015-09-01

    In this study, we identified key components of financial-analysis education for clinical nurses. We used a literature review, focus group discussions, and a content validity index survey to develop key components of financial-analysis education. First, a wide range of references were reviewed, and 55 financial-analysis education components were gathered. Second, two focus group discussions were performed; the participants were 11 nurses who had worked for more than 3 years in a hospital, and nine components were agreed upon. Third, 12 professionals, including professors, nurse executive, nurse managers, and an accountant, participated in the content validity index. Finally, six key components of financial-analysis education were selected. These key components were as follows: understanding the need for financial analysis, introduction to financial analysis, reading and implementing balance sheets, reading and implementing income statements, understanding the concepts of financial ratios, and interpretation and practice of financial ratio analysis. The results of this study will be used to develop an education program to increase financial-management competency among clinical nurses. © 2015 Wiley Publishing Asia Pty Ltd.

  18. The United States should forego a damage-limitation capability against China

    Science.gov (United States)

    Glaser, Charles L.

    2017-11-01

    Bottom Lines • THE KEY STRATEGIC NUCLEAR CHOICE. Whether to attempt to preserve its damage-limitation capability against China is the key strategic nuclear choice facing the United States. The answer is much less clear-cut than when the United States faced the Soviet Union during the Cold War. • FEASIBILITY OF DAMAGE LIMITATION. Although technology has advanced significantly over the past three decades, future military competition between the U.S. and Chinese forces will favor large-scale nuclear retaliation over significant damage limitation. • BENEFITS AND RISKS OF A DAMAGE-LIMITATION CAPABILITY. The benefits provided by a modest damage-limitation capability would be small, because the United States can meet its most important regional deterrent requirements without one. In comparison, the risks, which include an increased probability of accidental and unauthorized Chinese attacks, as well as strained U.S.—China relations, would be large. • FOREGO DAMAGE LIMITATION. These twin findings—the poor prospects for prevailing in the military competition, and the small benefits and likely overall decrease in U.S. security—call for a U.S. policy that foregoes efforts to preserve or enhance its damage-limitation capability.

  19. Stego Keys Performance on Feature Based Coding Method in Text Domain

    Directory of Open Access Journals (Sweden)

    Din Roshidi

    2017-01-01

    Full Text Available A main critical factor on embedding process in any text steganography method is a key used known as stego key. This factor will be influenced the success of the embedding process of text steganography method to hide a message from third party or any adversary. One of the important aspects on embedding process in text steganography method is the fitness performance of the stego key. Three parameters of the fitness performance of the stego key have been identified such as capacity ratio, embedded fitness ratio and saving space ratio. It is because a better as capacity ratio, embedded fitness ratio and saving space ratio offers of any stego key; a more message can be hidden. Therefore, main objective of this paper is to analyze three features coding based namely CALP, VERT and QUAD of stego keys in text steganography on their capacity ratio, embedded fitness ratio and saving space ratio. It is found that CALP method give a good effort performance compared to VERT and QUAD methods.

  20. Field Keys to Common Hawaiian Marine Animals and Plants.

    Science.gov (United States)

    Hawaii State Dept. of Education, Honolulu. Office of Instructional Services.

    Presented are keys for identifying common Hawaiian marine algae, beach plants, reef corals, sea urchins, tidepool fishes, and sea cucumbers. Nearly all species considered can be distinguished by characteristics visible to the naked eye. Line drawings illustrate most plants and animals included, and a list of suggested readings follows each…

  1. 'If she is a good woman …' and 'to be a real man …': gender, risk and access to HIV services among key populations in Tajikistan.

    Science.gov (United States)

    King, Elizabeth J; Maksymenko, Kateryna M; Almodovar-Diaz, Yadira; Johnson, Sarah

    2016-01-01

    The HIV epidemic continues to grow in Tajikistan, especially among people who inject drugs, sex workers, men who have sex with men and incarcerated populations. Despite their susceptibility to HIV, members of these groups do not always have access to HIV prevention, testing and treatment. The purpose of this study was to identify and understand the gender constraints in accessing HIV services for key populations in Tajikistan. Using focus-group discussions and key-informant interviews the assessment team collected information from members of key populations and those who work with them. Several themes emerged from the data, including: low levels of HIV knowledge, gender constraints to condom use and safer drug use, gender constraints limit HIV testing opportunities, gender-based violence, stigma and discrimination, and the lack of female spaces in the HIV response. The results of this study show that there are well-defined gender norms in Tajikistan, and these gender norms influence key populations' access to HIV services. Addressing these gender constraints may offer opportunities for more equitable access to HIV services in Tajikistan.

  2. Quantum key distribution over multicore fiber based on silicon photonics

    DEFF Research Database (Denmark)

    Ding, Yunhong; Bacco, Davide; Dalgaard, Kjeld

    on quantum physics. In order to exchange secure information between users, quantum key distribution (QKD), a branch of Quantum Communications (QCs), provides good prospects for ultimate security based on the laws of quantum mechanics [2–7]. Most of QKD systems are implemented in a point-to-point link using...... generations, to HD-entanglement distribution. Furthermore, MCFs are expected as a good candidate for overcoming the capacity limit of a current optical communication system, as example the record capacity of 661 Tbits/s was obtained last year with a 30-cores fiber [8]. Proof of concept experiment has already...... requirements in terms of key generation are needed. A solution may be represented by new technologies applied to quantum world. In particular multicore fiber (MCF) open a new scenario for quantum communications, from high-dimensional (HD) spatial entanglement generation, to HD QKD and multi-user key...

  3. Identifying plant traits: a key aspect for suitable species selection in ecological restoration of semiarid slopes

    Science.gov (United States)

    Bochet, Esther; García-Fayos, Patricio

    2017-04-01

    In the context of ecological restoration, one of the greatest challenges for practitioners and scientists is to select suitable species for revegetation purposes. In semiarid environments where restoration projects often fail, little attention has been paid so far to the contribution of plant traits to species success. The objective of this study was to (1) identify plant traits associated with species success on four roadside situations along an erosion-productivity gradient, and (2) to provide an ecological framework for selecting suitable species on the basis of their morphological and functional traits, applied to semiarid environments. We analyzed the association of 10 different plant traits with species success of 296 species surveyed on the four roadside situations in a semiarid region (Valencia, Spain). Plant traits included general plant traits (longevity, woodiness) and more specific root-, seed- and leaf-related traits (root type, sprouting ability, seed mucilage, seed mass, seed susceptibility to removal, specific leaf area and leaf dry matter content). All of them were selected according to the prevailing limiting ecogeomorphological processes acting along the erosion-productivity gradient. We observed strong shifts along the erosion-productivity gradient in the traits associated to species success. At the harshest end of the gradient, the most intensely eroded and driest one, species success was mainly associated to seed resistance to removal by runoff and to resistance to drought. At the opposite end of the gradient, the most productive one, species success was associated to a competitive-ruderal plant strategy (herbaceous successful species with high specific leaf area and low leaf dry matter content). Our study provides an ecologically-based approach for selecting suitable native species on the basis or their morphological and functional traits and supports a differential trait-based selection of species as regards roadslope type and aspect. In

  4. Key Components in eHealth Interventions Combining Self-Tracking and Persuasive eCoaching to Promote a Healthier Lifestyle: A Scoping Review.

    Science.gov (United States)

    Lentferink, Aniek J; Oldenhuis, Hilbrand Ke; de Groot, Martijn; Polstra, Louis; Velthuijsen, Hugo; van Gemert-Pijnen, Julia Ewc

    2017-08-01

    usability were not negatively affected when more effort was requested from participants to input data into the technology. The data extracted from the included publications provided limited ability to identify key components for adherence. However, one key component was identified for both usability and adherence, namely the provision of personalized content. This scoping review provides a first overview of the key components in automated healthy lifestyle interventions combining self-tracking and persuasive eCoaching that can be utilized during the development of such interventions. Future studies should focus on the identification of key components for effects on adherence, as adherence is a prerequisite for an intervention to be effective. ©Aniek J Lentferink, Hilbrand KE Oldenhuis, Martijn de Groot, Louis Polstra, Hugo Velthuijsen, Julia EWC van Gemert-Pijnen. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 01.08.2017.

  5. The Key Pieces of the Career Survival and Success Puzzle.

    Science.gov (United States)

    Simonetti, Jack L.

    1999-01-01

    Analysis of career-success factors identified by 5,000 managers yielded 10 key pieces: excellent performance record, communication skills, interpersonal skills, personality, skill currency, significant work experiences, power, ability to withstand pressure, ability to make difficult decisions, and having a mentor. (SK)

  6. A systems toxicology approach identifies Lyn as a key signaling phosphoprotein modulated by mercury in a B lymphocyte cell model

    Energy Technology Data Exchange (ETDEWEB)

    Caruso, Joseph A.; Stemmer, Paul M. [Institute of Environmental Health Sciences, Wayne State University, Detroit, MI (United States); Dombkowski, Alan [Department of Pediatrics, Wayne State University, Detroit, MI (United States); Caruthers, Nicholas J. [Institute of Environmental Health Sciences, Wayne State University, Detroit, MI (United States); Gill, Randall [Department of Immunology and Microbiology, Wayne State University, Detroit, MI (United States); Rosenspire, Allen J., E-mail: arosenspire@wayne.edu [Department of Immunology and Microbiology, Wayne State University, Detroit, MI (United States)

    2014-04-01

    Network and protein–protein interaction analyses of proteins undergoing Hg{sup 2+}-induced phosphorylation and dephosphorylation in Hg{sup 2+}-intoxicated mouse WEHI-231 B cells identified Lyn as the most interconnected node. Lyn is a Src family protein tyrosine kinase known to be intimately involved in the B cell receptor (BCR) signaling pathway. Under normal signaling conditions the tyrosine kinase activity of Lyn is controlled by phosphorylation, primarily of two well known canonical regulatory tyrosine sites, Y-397 and Y-508. However, Lyn has several tyrosine residues that have not yet been determined to play a major role under normal signaling conditions, but are potentially important sites for phosphorylation following mercury exposure. In order to determine how Hg{sup 2+} exposure modulates the phosphorylation of additional residues in Lyn, a targeted MS assay was developed. Initial mass spectrometric surveys of purified Lyn identified 7 phosphorylated tyrosine residues. A quantitative assay was developed from these results using the multiple reaction monitoring (MRM) strategy. WEHI-231 cells were treated with Hg{sup 2+}, pervanadate (a phosphatase inhibitor), or anti-Ig antibody (to stimulate the BCR). Results from these studies showed that the phosphoproteomic profile of Lyn after exposure of the WEHI-231 cells to a low concentration of Hg{sup 2+} closely resembled that of anti-Ig antibody stimulation, whereas exposure to higher concentrations of Hg{sup 2+} led to increases in the phosphorylation of Y-193/Y-194, Y-501 and Y-508 residues. These data indicate that mercury can disrupt a key regulatory signal transduction pathway in B cells and point to phospho-Lyn as a potential biomarker for mercury exposure. - Highlights: • Inorganic mercury (Hg{sup 2+}) induces changes in the WEHI-231 B cell phosphoproteome. • The B cell receptor (BCR) signaling pathway was the pathway most affected by Hg{sup 2+}. • The Src family phosphoprotein kinase Lyn was the

  7. Identifying Key Features of Effective Active Learning: The Effects of Writing and Peer Discussion

    Science.gov (United States)

    Pangle, Wiline M.; Wyatt, Kevin H.; Powell, Karli N.; Sherwood, Rachel E.

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. PMID:25185230

  8. Characterization of available light for seagrass and patch reef productivity in Sugarloaf Key, Lower Florida Keys

    Science.gov (United States)

    Toro-Farmer, Gerardo; Muller-Karger, Frank E.; Vega-Rodriguez, Maria; Melo, Nelson; Yates, Kimberly K.; Johns, Elizabeth; Cerdeira-Estrada, Sergio; Herwitz, Stan R.

    2016-01-01

    Light availability is an important factor driving primary productivity in benthic ecosystems, but in situ and remote sensing measurements of light quality are limited for coral reefs and seagrass beds. We evaluated the productivity responses of a patch reef and a seagrass site in the Lower Florida Keys to ambient light availability and spectral quality. In situ optical properties were characterized utilizing moored and water column bio-optical and hydrographic measurements. Net ecosystem productivity (NEP) was also estimated for these study sites using benthic productivity chambers. Our results show higher spectral light attenuation and absorption, and lower irradiance during low tide in the patch reef, tracking the influx of materials from shallower coastal areas. In contrast, the intrusion of clearer surface Atlantic Ocean water caused lower values of spectral attenuation and absorption, and higher irradiance in the patch reef during high tide. Storms during the studied period, with winds >10 m·s−1, caused higher spectral attenuation values. A spatial gradient of NEP was observed, from high productivity in the shallow seagrass area, to lower productivity in deeper patch reefs. The highest daytime NEP was observed in the seagrass, with values of almost 0.4 g·O2·m−2·h−1. Productivity at the patch reef area was lower in May than during October 2012 (mean = 0.137 and 0.177 g·O2·m−2·h−1, respectively). Higher photosynthetic active radiation (PAR) levels measured above water and lower light attenuation in the red region of the visible spectrum (~666 to ~699 nm) had a positive correlation with NEP. Our results indicate that changes in light availability and quality by suspended or resuspended particles limit benthic productivity in the Florida Keys.

  9. Characterization of Available Light for Seagrass and Patch Reef Productivity in Sugarloaf Key, Lower Florida Keys

    Directory of Open Access Journals (Sweden)

    Gerardo Toro-Farmer

    2016-01-01

    Full Text Available Light availability is an important factor driving primary productivity in benthic ecosystems, but in situ and remote sensing measurements of light quality are limited for coral reefs and seagrass beds. We evaluated the productivity responses of a patch reef and a seagrass site in the Lower Florida Keys to ambient light availability and spectral quality. In situ optical properties were characterized utilizing moored and water column bio-optical and hydrographic measurements. Net ecosystem productivity (NEP was also estimated for these study sites using benthic productivity chambers. Our results show higher spectral light attenuation and absorption, and lower irradiance during low tide in the patch reef, tracking the influx of materials from shallower coastal areas. In contrast, the intrusion of clearer surface Atlantic Ocean water caused lower values of spectral attenuation and absorption, and higher irradiance in the patch reef during high tide. Storms during the studied period, with winds >10 m·s−1, caused higher spectral attenuation values. A spatial gradient of NEP was observed, from high productivity in the shallow seagrass area, to lower productivity in deeper patch reefs. The highest daytime NEP was observed in the seagrass, with values of almost 0.4 g·O2·m−2·h−1. Productivity at the patch reef area was lower in May than during October 2012 (mean = 0.137 and 0.177 g·O2·m−2·h−1, respectively. Higher photosynthetic active radiation (PAR levels measured above water and lower light attenuation in the red region of the visible spectrum (~666 to ~699 nm had a positive correlation with NEP. Our results indicate that changes in light availability and quality by suspended or resuspended particles limit benthic productivity in the Florida Keys.

  10. A New Dimension of Health Care: Systematic Review of the Uses, Benefits, and Limitations of Social Media for Health Communication

    Science.gov (United States)

    Hazlett, Diane E; Harrison, Laura; Carroll, Jennifer K; Irwin, Anthea; Hoving, Ciska

    2013-01-01

    Background There is currently a lack of information about the uses, benefits, and limitations of social media for health communication among the general public, patients, and health professionals from primary research. Objective To review the current published literature to identify the uses, benefits, and limitations of social media for health communication among the general public, patients, and health professionals, and identify current gaps in the literature to provide recommendations for future health communication research. Methods This paper is a review using a systematic approach. A systematic search of the literature was conducted using nine electronic databases and manual searches to locate peer-reviewed studies published between January 2002 and February 2012. Results The search identified 98 original research studies that included the uses, benefits, and/or limitations of social media for health communication among the general public, patients, and health professionals. The methodological quality of the studies assessed using the Downs and Black instrument was low; this was mainly due to the fact that the vast majority of the studies in this review included limited methodologies and was mainly exploratory and descriptive in nature. Seven main uses of social media for health communication were identified, including focusing on increasing interactions with others, and facilitating, sharing, and obtaining health messages. The six key overarching benefits were identified as (1) increased interactions with others, (2) more available, shared, and tailored information, (3) increased accessibility and widening access to health information, (4) peer/social/emotional support, (5) public health surveillance, and (6) potential to influence health policy. Twelve limitations were identified, primarily consisting of quality concerns and lack of reliability, confidentiality, and privacy. Conclusions Social media brings a new dimension to health care as it offers a

  11. A new dimension of health care: systematic review of the uses, benefits, and limitations of social media for health communication.

    Science.gov (United States)

    Moorhead, S Anne; Hazlett, Diane E; Harrison, Laura; Carroll, Jennifer K; Irwin, Anthea; Hoving, Ciska

    2013-04-23

    There is currently a lack of information about the uses, benefits, and limitations of social media for health communication among the general public, patients, and health professionals from primary research. To review the current published literature to identify the uses, benefits, and limitations of social media for health communication among the general public, patients, and health professionals, and identify current gaps in the literature to provide recommendations for future health communication research. This paper is a review using a systematic approach. A systematic search of the literature was conducted using nine electronic databases and manual searches to locate peer-reviewed studies published between January 2002 and February 2012. The search identified 98 original research studies that included the uses, benefits, and/or limitations of social media for health communication among the general public, patients, and health professionals. The methodological quality of the studies assessed using the Downs and Black instrument was low; this was mainly due to the fact that the vast majority of the studies in this review included limited methodologies and was mainly exploratory and descriptive in nature. Seven main uses of social media for health communication were identified, including focusing on increasing interactions with others, and facilitating, sharing, and obtaining health messages. The six key overarching benefits were identified as (1) increased interactions with others, (2) more available, shared, and tailored information, (3) increased accessibility and widening access to health information, (4) peer/social/emotional support, (5) public health surveillance, and (6) potential to influence health policy. Twelve limitations were identified, primarily consisting of quality concerns and lack of reliability, confidentiality, and privacy. Social media brings a new dimension to health care as it offers a medium to be used by the public, patients, and health

  12. High speed and adaptable error correction for megabit/s rate quantum key distribution.

    Science.gov (United States)

    Dixon, A R; Sato, H

    2014-12-02

    Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90-94% of the ideal secure key rate over all fibre distances from 0-80 km.

  13. Integrated network analysis identifies fight-club nodes as a class of hubs encompassing key putative switch genes that induce major transcriptome reprogramming during grapevine development.

    Science.gov (United States)

    Palumbo, Maria Concetta; Zenoni, Sara; Fasoli, Marianna; Massonnet, Mélanie; Farina, Lorenzo; Castiglione, Filippo; Pezzotti, Mario; Paci, Paola

    2014-12-01

    We developed an approach that integrates different network-based methods to analyze the correlation network arising from large-scale gene expression data. By studying grapevine (Vitis vinifera) and tomato (Solanum lycopersicum) gene expression atlases and a grapevine berry transcriptomic data set during the transition from immature to mature growth, we identified a category named "fight-club hubs" characterized by a marked negative correlation with the expression profiles of neighboring genes in the network. A special subset named "switch genes" was identified, with the additional property of many significant negative correlations outside their own group in the network. Switch genes are involved in multiple processes and include transcription factors that may be considered master regulators of the previously reported transcriptome remodeling that marks the developmental shift from immature to mature growth. All switch genes, expressed at low levels in vegetative/green tissues, showed a significant increase in mature/woody organs, suggesting a potential regulatory role during the developmental transition. Finally, our analysis of tomato gene expression data sets showed that wild-type switch genes are downregulated in ripening-deficient mutants. The identification of known master regulators of tomato fruit maturation suggests our method is suitable for the detection of key regulators of organ development in different fleshy fruit crops. © 2014 American Society of Plant Biologists. All rights reserved.

  14. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  15. Identifying and Funding the Greatest Needs in School Facilities

    Science.gov (United States)

    Gorrell, Bob; Salamone, Frank

    2012-01-01

    How should public school facilities programs allocate limited resources to school facilities needs fairly, cost-effectively, and efficiently while taking into account facility condition, educational adequacy, and other priorities? New Mexico has developed a solution that overcomes key challenges that are common to school facilities programs across…

  16. Key Biodiversity Areas in the Indo-Burma Hotspot: Process, Progress and Future Directions

    Directory of Open Access Journals (Sweden)

    A.W. Tordoff

    2012-08-01

    Full Text Available Key Biodiversity Areas (KBAs provide geographic targets for the expansion of protected area coverage, and identify sites for urgent conservation action. Identification of KBAs in the Indo-Burma Hotspot was undertaken during 2003, for a region of analysis comprising Cambodia, Lao PDR, Myanmar (Burma, Thailand and Vietnam, plus parts of southern China. The starting point was information on 282 Important Bird Areas identified by BirdLife International and collaborators. These data were then overlaid with point locality data on globally threatened mammals, reptiles, amphibians, freshwater fish and plants, with additional KBAs identified as required. Through this process, a total of 438 KBAs were identified, covering 258,085km2 or 11.5 percent of the region of analysis. Only 58 percent of the KBAs are wholly or partly included within protected areas, suggesting that there may be a need for further expansion of protected area networks, particularly in Myanmar and Vietnam. The criteria for KBA identification are triggered by 812 species, of which 23 are believed only to occur at a single KBA globally. The KBAs have proven to be a useful conservation priority setting tool in Indo-Burma, helping to guide investments by various donors and application of environmental safeguard policies by international financial institutions. There are fewer examples of KBAs being used to guide expansion of protected area systems in Indo-Burma. In large part, this is because the period of rapid expansion of protected areas in most hotspot countries predated the KBA identification process, and political support for further significant expansion is currently limited.

  17. Using Long-Term Satellite Observations to Identify Sensitive Regimes and Active Regions of Aerosol Indirect Effects for Liquid Clouds Over Global Oceans

    Science.gov (United States)

    Zhao, Xuepeng; Liu, Yangang; Yu, Fangquan; Heidinger, Andrew K.

    2018-01-01

    Long-term (1981-2011) satellite climate data records of clouds and aerosols are used to investigate the aerosol-cloud interaction of marine water cloud from a climatology perspective. Our focus is on identifying the regimes and regions where the aerosol indirect effects (AIEs) are evident in long-term averages over the global oceans through analyzing the correlation features between aerosol loading and the key cloud variables including cloud droplet effective radius (CDER), cloud optical depth (COD), cloud water path (CWP), cloud top height (CTH), and cloud top temperature (CTT). An aerosol optical thickness (AOT) range of 0.13 change of long-term averaged CDER appears only in limited oceanic regions. The signature of aerosol invigoration of water clouds as revealed by the increase of cloud cover fraction (CCF) and CTH with increasing AOT at the middle/high latitudes of both hemispheres is identified for a pristine atmosphere (AOT polluted marine atmosphere (AOT > 0.3) in the tropical convergence zones. The regions where the second AIE is likely to manifest in the CCF change are limited to several oceanic areas with high CCF of the warm water clouds near the western coasts of continents. The second AIE signature as represented by the reduction of the precipitation efficiency with increasing AOT is more likely to be observed in the AOT regime of 0.08 < AOT < 0.4. The corresponding AIE active regions manifested themselves as the decline of the precipitation efficiency are mainly limited to the oceanic areas downwind of continental aerosols. The sensitive regime of the conventional AIE identified in this observational study is likely associated with the transitional regime from the aerosol-limited regime to the updraft-limited regime identified for aerosol-cloud interaction in cloud model simulations.

  18. A quantitative metric to identify critical elements within seafood supply networks.

    Directory of Open Access Journals (Sweden)

    Éva E Plagányi

    Full Text Available A theoretical basis is required for comparing key features and critical elements in wild fisheries and aquaculture supply chains under a changing climate. Here we develop a new quantitative metric that is analogous to indices used to analyse food-webs and identify key species. The Supply Chain Index (SCI identifies critical elements as those elements with large throughput rates, as well as greater connectivity. The sum of the scores for a supply chain provides a single metric that roughly captures both the resilience and connectedness of a supply chain. Standardised scores can facilitate cross-comparisons both under current conditions as well as under a changing climate. Identification of key elements along the supply chain may assist in informing adaptation strategies to reduce anticipated future risks posed by climate change. The SCI also provides information on the relative stability of different supply chains based on whether there is a fairly even spread in the individual scores of the top few key elements, compared with a more critical dependence on a few key individual supply chain elements. We use as a case study the Australian southern rock lobster Jasus edwardsii fishery, which is challenged by a number of climate change drivers such as impacts on recruitment and growth due to changes in large-scale and local oceanographic features. The SCI identifies airports, processors and Chinese consumers as the key elements in the lobster supply chain that merit attention to enhance stability and potentially enable growth. We also apply the index to an additional four real-world Australian commercial fishery and two aquaculture industry supply chains to highlight the utility of a systematic method for describing supply chains. Overall, our simple methodological approach to empirically-based supply chain research provides an objective method for comparing the resilience of supply chains and highlighting components that may be critical.

  19. A Quantitative Metric to Identify Critical Elements within Seafood Supply Networks

    Science.gov (United States)

    Plagányi, Éva E.; van Putten, Ingrid; Thébaud, Olivier; Hobday, Alistair J.; Innes, James; Lim-Camacho, Lilly; Norman-López, Ana; Bustamante, Rodrigo H.; Farmery, Anna; Fleming, Aysha; Frusher, Stewart; Green, Bridget; Hoshino, Eriko; Jennings, Sarah; Pecl, Gretta; Pascoe, Sean; Schrobback, Peggy; Thomas, Linda

    2014-01-01

    A theoretical basis is required for comparing key features and critical elements in wild fisheries and aquaculture supply chains under a changing climate. Here we develop a new quantitative metric that is analogous to indices used to analyse food-webs and identify key species. The Supply Chain Index (SCI) identifies critical elements as those elements with large throughput rates, as well as greater connectivity. The sum of the scores for a supply chain provides a single metric that roughly captures both the resilience and connectedness of a supply chain. Standardised scores can facilitate cross-comparisons both under current conditions as well as under a changing climate. Identification of key elements along the supply chain may assist in informing adaptation strategies to reduce anticipated future risks posed by climate change. The SCI also provides information on the relative stability of different supply chains based on whether there is a fairly even spread in the individual scores of the top few key elements, compared with a more critical dependence on a few key individual supply chain elements. We use as a case study the Australian southern rock lobster Jasus edwardsii fishery, which is challenged by a number of climate change drivers such as impacts on recruitment and growth due to changes in large-scale and local oceanographic features. The SCI identifies airports, processors and Chinese consumers as the key elements in the lobster supply chain that merit attention to enhance stability and potentially enable growth. We also apply the index to an additional four real-world Australian commercial fishery and two aquaculture industry supply chains to highlight the utility of a systematic method for describing supply chains. Overall, our simple methodological approach to empirically-based supply chain research provides an objective method for comparing the resilience of supply chains and highlighting components that may be critical. PMID:24633147

  20. A quantitative metric to identify critical elements within seafood supply networks.

    Science.gov (United States)

    Plagányi, Éva E; van Putten, Ingrid; Thébaud, Olivier; Hobday, Alistair J; Innes, James; Lim-Camacho, Lilly; Norman-López, Ana; Bustamante, Rodrigo H; Farmery, Anna; Fleming, Aysha; Frusher, Stewart; Green, Bridget; Hoshino, Eriko; Jennings, Sarah; Pecl, Gretta; Pascoe, Sean; Schrobback, Peggy; Thomas, Linda

    2014-01-01

    A theoretical basis is required for comparing key features and critical elements in wild fisheries and aquaculture supply chains under a changing climate. Here we develop a new quantitative metric that is analogous to indices used to analyse food-webs and identify key species. The Supply Chain Index (SCI) identifies critical elements as those elements with large throughput rates, as well as greater connectivity. The sum of the scores for a supply chain provides a single metric that roughly captures both the resilience and connectedness of a supply chain. Standardised scores can facilitate cross-comparisons both under current conditions as well as under a changing climate. Identification of key elements along the supply chain may assist in informing adaptation strategies to reduce anticipated future risks posed by climate change. The SCI also provides information on the relative stability of different supply chains based on whether there is a fairly even spread in the individual scores of the top few key elements, compared with a more critical dependence on a few key individual supply chain elements. We use as a case study the Australian southern rock lobster Jasus edwardsii fishery, which is challenged by a number of climate change drivers such as impacts on recruitment and growth due to changes in large-scale and local oceanographic features. The SCI identifies airports, processors and Chinese consumers as the key elements in the lobster supply chain that merit attention to enhance stability and potentially enable growth. We also apply the index to an additional four real-world Australian commercial fishery and two aquaculture industry supply chains to highlight the utility of a systematic method for describing supply chains. Overall, our simple methodological approach to empirically-based supply chain research provides an objective method for comparing the resilience of supply chains and highlighting components that may be critical.

  1. Identify and rank key factors influencing the adoption of cloud computing for a healthy Electronics

    Directory of Open Access Journals (Sweden)

    Javad Shukuhy

    2015-02-01

    Full Text Available Cloud computing as a new technology with Internet infrastructure and new approaches can be significant benefits in providing medical services electronically. Aplying this technology in E-Health requires consideration of various factors. The main objective of this study is to identify and rank the factors influencing the adoption of e-health cloud. Based on the Technology-Organization-Environment (TOE framework and Human-Organization-Technology fit (HOT-fit model, 16 sub-factors were identified in four major factors. With survey of 60 experts, academics and experts in health information technology and with the help of fuzzy analytic hierarchy process had ranked these sub-factors and factors. In the literature, considering newness this study, no internal or external study, have not alluded these number of criteria. The results show that when deciding to adopt cloud computing in E-Health, respectively, must be considered technological, human, organizational and environmental factors.

  2. Prey choice and habitat use drive sea otter pathogen exposure in a resource-limited coastal system

    Science.gov (United States)

    Johnson, Christine K.; Tinker, M. Tim; Estes, James A.; Conrad, Patricia A.; Staedler, Michelle M.; Miller, Melissa A.; Jessup, David A.; Mazet, Jonna A.K.

    2014-01-01

    The processes promoting disease in wild animal populations are highly complex, yet identifying these processes is critically important for conservation when disease is limiting a population. By combining field studies with epidemiologic tools, we evaluated the relationship between key factors impeding southern sea otter (Enhydra lutris nereis) population growth: disease and resource limitation. This threatened population has struggled to recover despite protection, so we followed radio-tagged sea otters and evaluated infection with 2 disease-causing protozoal pathogens, Toxoplasma gondii and Sarcocystis neurona, to reveal risks that increased the likelihood of pathogen exposure. We identified patterns of pathogen infection that are linked to individual animal behavior, prey choice, and habitat use. We detected a high-risk spatial cluster of S. neurona infections in otters with home ranges in southern Monterey Bay and a coastal segment near San Simeon and Cambria where otters had high levels of infection with T. gondii. We found that otters feeding on abalone, which is the preferred prey in a resource-abundant marine ecosystem, had a very low risk of infection with either pathogen, whereas otters consuming small marine snails were more likely to be infected with T. gondii. Individual dietary specialization in sea otters is an adaptive mechanism for coping with limited food resources along central coastal California. High levels of infection with protozoal pathogens may be an adverse consequence of dietary specialization in this threatened species, with both depleted resources and disease working synergistically to limit recovery.

  3. Transcriptome Analysis to Identify the Putative Biosynthesis and Transport Genes Associated with the Medicinal Components of Achyranthes bidentata Bl.

    Directory of Open Access Journals (Sweden)

    Jinting Li

    2016-12-01

    Full Text Available Achyranthes bidentata is a popular perennial medicine herb used for thousands of years in China to treat various diseases. Although this herb has multiple pharmaceutical purposes in China, no transcriptomic information has been reported for this species. In addition, the understanding of several key pathways and enzymes involved in the biosynthesis of oleanolic acid and ecdysterone, two pharmacologically active classes of metabolites and major chemical constituents of A. bidentata root extracts, is limited. The aim of the present study was to characterize the transcriptome profile of the roots and leaves of A. bidentata to uncover the biosynthetic and transport mechanisms of the active components. In this study, we identified 100,987 transcripts, with an average length of 973.64 base pairs. A total of 31,634 (31.33% unigenes were annotated, and 12,762 unigenes were mapped to 303 pathways according to the Kyoto Encyclopedia of Genes and Genomes (KEGG pathway database. Moreover, we identified a total of 260 oleanolic acid and ecdysterone genes encoding biosynthetic enzymes. Furthermore, the key enzymes involved in the oleanolic acid and ecdysterone synthesis pathways were analyzed using quantitative real-time polymerase chain reaction (qRT-PCR, revealing that the roots expressed these enzymes to a greater extent than the leaves. In addition, we identified 85 ATP-binding cassette (ABC transporters, some of which might be involved in the translocation of secondary metabolites.

  4. Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments.

  5. Key events and their effects on cycling behaviour in Dar-es-Salaam : abstract + powerpoint

    NARCIS (Netherlands)

    Nkurunziza, A.; Zuidgeest, M.H.P.; Brussel, M.J.G.; van Maarseveen, M.F.A.M.

    2012-01-01

    The paper explores key events and investigates their effects on cycling behaviour in the city of Dar-es-Salaam, Tanzania. The objective of the study is to identify specific key events during a person’s life course with a significant effect on change of travel behaviour towards cycling in relation to

  6. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  7. Development of key performance indicators for prehospital emergency care.

    Science.gov (United States)

    Murphy, Adrian; Wakai, Abel; Walsh, Cathal; Cummins, Fergal; O'Sullivan, Ronan

    2016-04-01

    Key performance indicators (KPIs) are used to monitor and evaluate critical areas of clinical and support functions that influence patient outcome. Traditional prehospital emergency care performance monitoring has focused solely on response time metrics. The landscape of emergency care delivery in Ireland is in the process of significant national reconfiguration. The development of KPIs is therefore considered one of the key priorities in prehospital research. The aim of this study was to develop a suite of KPIs for prehospital emergency care in Ireland. A systematic literature review of prehospital care performance measurement was undertaken followed by a three-round Delphi consensus process facilitated by a broad-based multidisciplinary group of panellists. The consensus process was conducted between June 2012 and October 2013. Each candidate indicator on the Delphi survey questionnaire was rated using a 5-point Likert-type rating scale. Agreement was defined as at least 70% of responders rating an indicator as 'agree' or 'strongly agree' on the rating scale. Data were analysed using descriptive statistics. Sensitivity of the ratings was examined for robustness by bootstrapping the original sample. Of the 78 citations identified by the systematic review, 5 relevant publications were used to select candidate indicators for the Delphi round 1 questionnaire. Response rates in Delphi rounds 1 and 2 were 89% and 83%, respectively. Following the consensus development conference, 101 KPIs reached consensus. Based on the Donabedian framework for quality-of-care indicators, 7 of the KPIs which reached agreement were structure KPIs, 74 were process KPIs and 20 were outcome KPIs. The highest ranked indicator was a process KPI ('Direct transport of ST-elevation myocardial infarction patients to a primary percutaneous intervention (PCI)-capable facility for ECG to PCI time performance measurement using scientifically valid and reliable KPIs. Employing a Delphi panel of key

  8. Key influences in the design and implementation of mental health information systems in Ghana and South Africa.

    Science.gov (United States)

    Ahuja, S; Mirzoev, T; Lund, C; Ofori-Atta, A; Skeen, S; Kufuor, A

    2016-01-01

    Strengthening of mental health information systems (MHIS) is essential to monitor and evaluate mental health services in low and middle-income countries. While research exists assessing wider health management information systems, there is limited published evidence exploring the design and implementation of MHIS in these settings. This paper aims to identify and assess the key factors affecting the design and implementation of MHIS, as perceived by the key stakeholders in Ghana and South Africa. We report findings from the Mental Health and Poverty Project, a 5-year research programme implemented within four African countries. The MHIS strengthening in South Africa and Ghana included two related components: intervention and research. The intervention component aimed to strengthen MHIS in the two countries, and the research component aimed to document interventions in each country, including the key influences. Data were collected using semi structured interviews with key stakeholders and reviews of key documents and secondary data from the improved MHIS. We analyzed the qualitative data using a framework approach. Key components of the MHIS intervention involved the introduction of a redesigned patient registration form, entry into computers for analysis every 2 months by clinical managerial staff, and utilization of data in hospital management meetings in three psychiatric hospitals in Ghana; and the introduction of a new set of mental health indicators and related forms and tally sheets at primary care clinics and district hospitals in five districts in the KwaZulu-Natal and Northern Cape provinces in South Africa. Overall, the key stakeholders perceived the MHIS strengthening as an effective intervention in both countries with an enhanced set of indicators in South Africa and introduction of a computerized system in Ghana. Influences on the design and implementation of MHIS interventions in Ghana and South Africa relate to resources, working approaches

  9. Marketing with limited budget

    OpenAIRE

    Smirnova, Daria

    2017-01-01

    The purpose of this research-based thesis was to get an idea how managers of two small resembling hotels of a specific region deal with marketing process with a limited budget. In addition, the aim of the thesis was to examine if hotel managers who were interviewed perceive marketing only in the way of ‘promotion’ rather than marketing research, marketing mix and marketing environment theories. It was also found out if hotel managers of those hotels consider marketing as a key to successful h...

  10. Identification of key residues for protein conformational transition using elastic network model.

    Science.gov (United States)

    Su, Ji Guo; Xu, Xian Jin; Li, Chun Hua; Chen, Wei Zu; Wang, Cun Xin

    2011-11-07

    Proteins usually undergo conformational transitions between structurally disparate states to fulfill their functions. The large-scale allosteric conformational transitions are believed to involve some key residues that mediate the conformational movements between different regions of the protein. In the present work, a thermodynamic method based on the elastic network model is proposed to predict the key residues involved in protein conformational transitions. In our method, the key functional sites are identified as the residues whose perturbations largely influence the free energy difference between the protein states before and after transition. Two proteins, nucleotide binding domain of the heat shock protein 70 and human/rat DNA polymerase β, are used as case studies to identify the critical residues responsible for their open-closed conformational transitions. The results show that the functionally important residues mainly locate at the following regions for these two proteins: (1) the bridging point at the interface between the subdomains that control the opening and closure of the binding cleft; (2) the hinge region between different subdomains, which mediates the cooperative motions between the corresponding subdomains; and (3) the substrate binding sites. The similarity in the positions of the key residues for these two proteins may indicate a common mechanism in their conformational transitions.

  11. Key populations and human rights in the context of HIV services rendition in Ghana.

    Science.gov (United States)

    Laar, Amos; DeBruin, Debra

    2017-08-02

    In line with its half century old penal code, Ghana currently criminalizes and penalizes behaviors of some key populations - populations deemed to be at higher risk of acquiring or transmitting Human Immunodeficiency Virus (HIV). Men who have sex with men (MSM), and sex workers (SWs) fit into this categorization. This paper provides an analysis of how enactment and implementation of rights-limiting laws not only limit rights, but also amplify risk and vulnerability to HIV in key and general populations. The paper derives from a project that assessed the ethics sensitivity of key documents guiding Ghana's response to its HIV epidemic. Assessment was guided by leading frameworks from public health ethics, and relevant articles from the international bill of rights. Ghana's response to her HIV epidemic does not adequately address the rights and needs of key populations. Even though the national response has achieved some public health successes, palpable efforts to address rights issues remain nascent. Ghana's guiding documents for HIV response include no advocacy for decriminalization, depenalization or harm reduction approaches for these key populations. The impact of rights-restricting codes on the nation's HIV epidemic is real: criminalization impedes key populations' access to HIV prevention and treatment services. Given that they are bridging populations, whatever affects the Ghanaian key populations directly, affects the general population indirectly. The right to the highest attainable standard of health, without qualification, is generally acknowledged as a fundamental human right. Unfortunately, this right currently eludes the Ghanaian SW and MSM. The paper endorses decriminalization as a means of promoting this right. In the face of opposition to decriminalization, the paper proposes specific harm reduction strategies as approaches to promote health and uplift the diminished rights of key populations. Thus the authors call on Ghana to remove impediments to

  12. The MycoKey 3.1 DVD. Included in Knudsen, H. & Vesterholt, J. (eds.). Funga Nordica

    DEFF Research Database (Denmark)

    2008-01-01

    . It is, of course, also possible to do a direct search on a name in MycoKey in order to find a genus or a particular species. MycoKey gives access to more than 4,000 illustrations of fungi and more than 17,000 links to references. From within the genera you can also open the Funga Nordica keys in a a pdf-viwer......MycoKey enables the user to identify fungal genera (fruitbody forming Basidiomycota and discomycetes) by means of a digital, synoptical key. This key offers a very different way of choosing between genera than the traditional analytical key and the the two approaches complete each other nicely...

  13. Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    I-Hsien Lin

    2010-08-01

    Full Text Available Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.

  14. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  15. Practical private database queries based on a quantum-key-distribution protocol

    International Nuclear Information System (INIS)

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-01-01

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  16. Emergence of nutrient limitation in tropical dry forests: hypotheses from simulation models

    Science.gov (United States)

    Medvigy, D.; Waring, B. G.; Xu, X.; Trierweiler, A.; Werden, L. K.; Wang, G.; Zhu, Q.; Powers, J. S.

    2017-12-01

    It is unclear to what extent tropical dry forest productivity may be limited by nutrients. Direct assessment of nutrient limitation through fertilization experiments has been rare, and paradigms pertaining to other ecosystems may not extend to tropical dry forests. For example, because dry tropical forests have a lower water supply than moist tropical forests, dry forests can have lower decomposition rates, higher soil carbon and nitrogen concentrations, and a more open nitrogen cycle than moist forests. We used a mechanistic, numerical model to generate hypotheses about nutrient limitation in tropical dry forests. The model dynamically couples ED2 (vegetation dynamics), MEND (biogeochemistry), and N-COM (plant-microbe competition for nutrients). Here, the MEND-component of the model has been extended to include nitrogen (N) and phosphorus (P) cycles. We focus on simulation of sixteen 25m x 25m plots in Costa Rica where a fertilization experiment has been underway since 2015. Baseline simulations are characterized by both nitrogen and phosphorus limitation of vegetation. Fertilization with N and P increased vegetation biomass, with N fertilization having a somewhat stronger effect. Nutrient limitation was also sensitive to climate and was more pronounced during drought periods. Overflow respiration was identified as a key process that mitigated nutrient limitation. These results suggest that, despite often having richer soils than tropical moist forests, tropical dry forests can also become nutrient-limited. If the climate becomes drier in the next century, as is expected for Central America, drier soils may decrease microbial activity and exacerbate nutrient limitation. The importance of overflow respiration underscores the need for appropriate treatment of microbial dynamics in ecosystem models. Ongoing and new nutrient fertilization experiments will present opportunities for testing whether, and how, nutrient limitation may indeed be emerging in tropical dry

  17. Predicting suicidal ideation in primary care: An approach to identify easily assessable key variables.

    Science.gov (United States)

    Jordan, Pascal; Shedden-Mora, Meike C; Löwe, Bernd

    To obtain predictors of suicidal ideation, which can also be used for an indirect assessment of suicidal ideation (SI). To create a classifier for SI based on variables of the Patient Health Questionnaire (PHQ) and sociodemographic variables, and to obtain an upper bound on the best possible performance of a predictor based on those variables. From a consecutive sample of 9025 primary care patients, 6805 eligible patients (60% female; mean age = 51.5 years) participated. Advanced methods of machine learning were used to derive the prediction equation. Various classifiers were applied and the area under the curve (AUC) was computed as a performance measure. Classifiers based on methods of machine learning outperformed ordinary regression methods and achieved AUCs around 0.87. The key variables in the prediction equation comprised four items - namely feelings of depression/hopelessness, low self-esteem, worrying, and severe sleep disturbances. The generalized anxiety disorder scale (GAD-7) and the somatic symptom subscale (PHQ-15) did not enhance prediction substantially. In predicting suicidal ideation researchers should refrain from using ordinary regression tools. The relevant information is primarily captured by the depression subscale and should be incorporated in a nonlinear model. For clinical practice, a classification tree using only four items of the whole PHQ may be advocated. Copyright © 2018 Elsevier Inc. All rights reserved.

  18. Positioning and deciding : key factors for talent development in soccer

    NARCIS (Netherlands)

    Kannekens, R.; Elferink-Gemser, M. T.; Visscher, C.

    2011-01-01

    Talent identification and development implicate recognizing youth players who will be successful in the future and guiding them to the top. A major determinant of this success is tactical skills. To identify possible key factors that help in predicting success over time, this study assesses the

  19. Key Elements of a Successful Drive toward Marketing Strategy Making

    Science.gov (United States)

    Cann, Cynthia W.; George, Marie A.

    2003-01-01

    A conceptual model is presented that depicts the relationship between an internal marketing function and an organization's readiness to learn. Learning and marketing orientations are identified as components to marketing strategy making. Key organizational functions, including communication and decision-making, are utilized in a framework for…

  20. Evaluating predictive models for solar energy growth in the US states and identifying the key drivers

    Science.gov (United States)

    Chakraborty, Joheen; Banerji, Sugata

    2018-03-01

    Driven by a desire to control climate change and reduce the dependence on fossil fuels, governments around the world are increasing the adoption of renewable energy sources. However, among the US states, we observe a wide disparity in renewable penetration. In this study, we have identified and cleaned over a dozen datasets representing solar energy penetration in each US state, and the potentially relevant socioeconomic and other factors that may be driving the growth in solar. We have applied a number of predictive modeling approaches - including machine learning and regression - on these datasets over a 17-year period and evaluated the relative performance of the models. Our goals were: (1) identify the most important factors that are driving the growth in solar, (2) choose the most effective predictive modeling technique for solar growth, and (3) develop a model for predicting next year’s solar growth using this year’s data. We obtained very promising results with random forests (about 90% efficacy) and varying degrees of success with support vector machines and regression techniques (linear, polynomial, ridge). We also identified states with solar growth slower than expected and representing a potential for stronger growth in future.

  1. Sulfur Denitrosylation by an Engineered Trx-like DsbG Enzyme Identifies Nucleophilic Cysteine Hydrogen Bonds as Key Functional Determinant.

    Science.gov (United States)

    Lafaye, Céline; Van Molle, Inge; Tamu Dufe, Veronica; Wahni, Khadija; Boudier, Ariane; Leroy, Pierre; Collet, Jean-François; Messens, Joris

    2016-07-15

    Exposure of bacteria to NO results in the nitrosylation of cysteine thiols in proteins and low molecular weight thiols such as GSH. The cells possess enzymatic systems that catalyze the denitrosylation of these modified sulfurs. An important player in these systems is thioredoxin (Trx), a ubiquitous, cytoplasmic oxidoreductase that can denitrosylate proteins in vivo and S-nitrosoglutathione (GSNO) in vitro However, a periplasmic or extracellular denitrosylase has not been identified, raising the question of how extracytoplasmic proteins are repaired after nitrosative damage. In this study, we tested whether DsbG and DsbC, two Trx family proteins that function in reducing pathways in the Escherichia coli periplasm, also possess denitrosylating activity. Both DsbG and DsbC are poorly reactive toward GSNO. Moreover, DsbG is unable to denitrosylate its specific substrate protein, YbiS. Remarkably, by borrowing the CGPC active site of E. coli Trx-1 in combination with a T200M point mutation, we transformed DsbG into an enzyme highly reactive toward GSNO and YbiS. The pKa of the nucleophilic cysteine, as well as the redox and thermodynamic properties of the engineered DsbG are dramatically changed and become similar to those of E. coli Trx-1. X-ray structural insights suggest that this results from a loss of two direct hydrogen bonds to the nucleophilic cysteine sulfur in the DsbG mutant. Our results highlight the plasticity of the Trx structural fold and reveal that the subtle change of the number of hydrogen bonds in the active site of Trx-like proteins is the key factor that thermodynamically controls reactivity toward nitrosylated compounds. © 2016 by The American Society for Biochemistry and Molecular Biology, Inc.

  2. Key Concept Identification: A Comprehensive Analysis of Frequency and Topical Graph-Based Approaches

    Directory of Open Access Journals (Sweden)

    Muhammad Aman

    2018-05-01

    Full Text Available Automatic key concept extraction from text is the main challenging task in information extraction, information retrieval and digital libraries, ontology learning, and text analysis. The statistical frequency and topical graph-based ranking are the two kinds of potentially powerful and leading unsupervised approaches in this area, devised to address the problem. To utilize the potential of these approaches and improve key concept identification, a comprehensive performance analysis of these approaches on datasets from different domains is needed. The objective of the study presented in this paper is to perform a comprehensive empirical analysis of selected frequency and topical graph-based algorithms for key concept extraction on three different datasets, to identify the major sources of error in these approaches. For experimental analysis, we have selected TF-IDF, KP-Miner and TopicRank. Three major sources of error, i.e., frequency errors, syntactical errors and semantical errors, and the factors that contribute to these errors are identified. Analysis of the results reveals that performance of the selected approaches is significantly degraded by these errors. These findings can help us develop an intelligent solution for key concept extraction in the future.

  3. Key enabling technologies (Kets) observatory. Second report December 2015

    OpenAIRE

    Velde, Els van de; Pieterjan, Debergh; Wydra, Sven; Som, Oliver; Heide, Marcel de

    2015-01-01

    Key Enabling Technologies (KETs) provide the basis for innovation in a wide range of products and processes across all industrial sectors (emerging and traditional) and are essential to solve Europe’s major societal challenges. Six KETs have been identified as important for Europe’s future competitiveness: Advanced Manufacturing Technology, Advanced Materials, Nanotechnology, Micro- and Nanoelectronics, Industrial Biotechnology, and Photonics.

  4. The polyadenylation factor subunit CLEAVAGE AND POLYADENYLATION SPECIFICITY FACTOR30: A key factor of programmed cell death and a regulator of immunity in arabidopsis

    KAUST Repository

    Bruggeman, Quentin

    2014-04-04

    Programmed cell death (PCD) is essential for several aspects of plant life, including development and stress responses. Indeed, incompatible plant-pathogen interactions are well known to induce the hypersensitive response, a localized cell death. Mutational analyses have identified several key PCD components, and we recently identified the mips1 mutant of Arabidopsis (Arabidopsis thaliana), which is deficient for the key enzyme catalyzing the limiting step of myoinositol synthesis. One of the most striking features of mips1 is the light-dependent formation of lesions on leaves due to salicylic acid (SA)-dependent PCD, revealing roles for myoinositol or inositol derivatives in the regulation of PCD. Here, we identified a regulator of plant PCD by screening for mutants that display transcriptomic profiles opposing that of the mips1 mutant. Our screen identified the oxt6 mutant, which has been described previously as being tolerant to oxidative stress. In the oxt6 mutant, a transfer DNA is inserted in the CLEAVAGE AND POLYADENYLATION SPECIFICITY FACTOR30 (CPSF30) gene, which encodes a polyadenylation factor subunit homolog. We show that CPSF30 is required for lesion formation in mips1 via SA-dependent signaling, that the prodeath function of CPSF30 is not mediated by changes in the glutathione status, and that CPSF30 activity is required for Pseudomonas syringae resistance. We also show that the oxt6 mutation suppresses cell death in other lesion-mimic mutants, including lesion-simulating disease1, mitogen-activated protein kinase4, constitutive expressor of pathogenesis-related genes5, and catalase2, suggesting that CPSF30 and, thus, the control of messenger RNA 3′ end processing, through the regulation of SA production, is a key component of plant immune responses. © 2014 American Society of Plant Biologists. All rights reserved.

  5. Undercooling Limits and Thermophysical Properties in Glass Forming Alloys

    Science.gov (United States)

    Rhim, Won-Kyu; Ohsaka, Kenichi; Spjut, R. Erik

    1999-01-01

    The primary objective of this program is to produce deeply undercooled metallic liquids and to identify factors that limit undercooling and glass formation. The main research objectives are: (1) Investigating undercooling limits in glass-forming alloys and identifying factors that affect undercooling; (2) Measuring thermophysical properties and investigating the validity of the classical nucleation theory and other existing theories in the extreme undercooled states; and (3) To investigate the limits of electrostatic levitation technology in the ground base and to identify thermophysical parameters that might require reduced-g environment.

  6. Building capacity in Australian interprofessional health education: perspectives from key health and higher education stakeholders.

    Science.gov (United States)

    Matthews, Lynda R; Pockett, Rosalie B; Nisbet, Gillian; Thistlethwaite, Jill E; Dunston, Roger; Lee, Alison; White, Jill F

    2011-05-01

    A substantial literature engaging with the directions and experiences of stakeholders involved in interprofessional health education exists at the international level, yet almost nothing has been published that documents and analyses the Australian experience. Accordingly, this study aimed to scope the experiences of key stakeholders in health and higher education in relation to the development of interprofessional practice capabilities in health graduates in Australia. Twenty-seven semi-structured interviews and two focus groups of key stakeholders involved in the development and delivery of interprofessional health education in Australian higher education were undertaken. Interview data were coded to identify categories that were organised into key themes, according to principles of thematic analysis. Three themes were identified: the need for common ground between health and higher education, constraints and enablers in current practice, and the need for research to establish an evidence base. Five directions for national development were also identified. The study identified a range of interconnected changes that will be required to successfully mainstream interprofessional education within Australia, in particular, the importance of addressing issues of culture change and the need for a nationally coordinated and research informed approach. These findings reiterate those found in the international literature.

  7. Ten key short-term sectoral benchmarks to limit warming to 1.5º C

    NARCIS (Netherlands)

    Kuramochi, Takeshi; Hoehne, N.E.; Schaeffer, M.; Cantzler, Jasmin; Hare, William; Deng, Yvonne; Sterl, Sebastian; Hagemann, Markus; Rocha, Marcia; Yanguas-Parra, Paola Andrea; Mir, Goher-Ur-Rehman; Wong, Lindee; El-Laboudy, Tarik; Wouters, Karlien; Deryng, Delphine; Blok, Kornelis

    2018-01-01

    This article identifies and quantifies the 10 most important benchmarks for climate action to be taken by 2020–2025 to keep the window open for a 1.5°C-consistent GHG emission pathway. We conducted a comprehensive review of existing emissions scenarios, scanned all sectors and the respective

  8. Ten key short-term sectoral benchmarks to limit warming to 1.5°C

    NARCIS (Netherlands)

    Kuramochi, Takeshi; Höhne, Niklas; Schaeffer, Michiel; Cantzler, Jasmin; Hare, Bill; Deng, Yvonne; Sterl, Sebastian; Hagemann, Markus; Rocha, Marcia; Yanguas-Parra, Paola Andrea; Mir, Goher Ur Rehman; Wong, Lindee; El-Laboudy, Tarik; Wouters, Karlien; Deryng, Delphine; Blok, Kornelis

    2018-01-01

    This article identifies and quantifies the 10 most important benchmarks for climate action to be taken by 2020–2025 to keep the window open for a 1.5°C-consistent GHG emission pathway. We conducted a comprehensive review of existing emissions scenarios, scanned all sectors and the respective

  9. The applicability of LCA to evaluate the key environmental challenges in food supply chains

    DEFF Research Database (Denmark)

    Aronsson, Anna K.S.; Landquist, Birgit; Esturo, Aintzane

    2014-01-01

    System analysis was performed to gain an overview of key environmental challenges and pinpoint hotspots causing environmental impacts in three European food supply chains. An overview was obtained based on a review on LCA studies for beef, dairy, orange juice and aquaculture food supply chains....... Similarities of the main environmental impacts were identified to rationalize and justify the selection of key performance indicators chosen for a simplified web based LCA tool developed within the EC funded project SENSE (FP7). Life Cycle Assessment methodology covered many of the key challenges identified...... but will not be sufficient to address all environmental impacts generated from the food supply chains. Especially for aquaculture impacts that are not taken into account with LCA are i.e. nutrient and organic matter releases, impacts associated with feed provision, diseases introduction, escapes, and changed usage...

  10. Using Upland Rice Root Traits to Identify N Use Efficient Genotypes for Limited Soil Nutrient Conditions

    Energy Technology Data Exchange (ETDEWEB)

    Traore, K.; Traore, O. [INERA / Station de Farakoba, Bobo-Dioulasso (Burkina Faso); Bado, V. B. [Africa Rice Center (AfricaRice), Saint Louis (Senegal)

    2013-11-15

    Crop production in the Sahelian countries of Africa is limited by many factors. The most important are low potential yields of local varieties, low inherent soil fertility and low applications of external inputs (organic and mineral fertilizers). A field experiment was conducted from 2007 to 2008 with the objective to develop and validate screening protocols for plant traits that enhance N acquisition and utilization in upland rice grown in low N soils of two hundred (200) upland rice (Oryza sativa L.) genotypes from WAB, NERICA, CNA, CNAX, IRAT and IR lines. An experiment in small pots was carried out in a greenhouse of Farakoba research center. The pots were filled with a sandy soil and upland rice genotypes were grown during three weeks, harvested and studied for their root characteristics (seminal root length, adventitious root number, lateral root length and number and roots hair density). The small pot method was reliable for root trait characterisation at the seedling stage. A large variability among genotypes was exhibited for the root characteristics. The variability was larger within the NERICA and WAB lines compared to the other lines. The length of the seminal roots varied from 10 to 40 cm, the lateral root number ranged between 3 and 15 and the number of adventitious roots varied between 2 and 7. The selected root traits can be used to identify high nutrients and water use efficient genotypes. (author)

  11. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  12. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  13. Key events and their effects on cycling behaviour in Dar-es-Salaam : abstract + powerpoint

    OpenAIRE

    Nkurunziza, A.; Zuidgeest, M.H.P.; Brussel, M.J.G.; van Maarseveen, M.F.A.M.

    2012-01-01

    The paper explores key events and investigates their effects on cycling behaviour in the city of Dar-es-Salaam, Tanzania. The objective of the study is to identify specific key events during a person’s life course with a significant effect on change of travel behaviour towards cycling in relation to stage of change. Stage of change is a key construct of the transtheoretical model of behaviour change that defines behavioural readiness (intentions and actions) into six distinct categories (i.e....

  14. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  15. Using instructional logs to identify quality in educational settings.

    Science.gov (United States)

    Rowan, Brian; Jacob, Robin; Correnti, Richard

    2009-01-01

    When attempting to identify educational settings that are most effective in improving student achievement, classroom process (that is, the way in which a teacher interacts with his or her students) is a key feature of interest. Unfortunately, high-quality assessment of the student-teacher interaction occurs all too infrequently, despite the critical role that understanding and measuring such processes can play in school improvement. This article discusses the strengths and weaknesses of two common approaches to studying these processes-direct classroom observation and annual surveys of teachers-and then describes the ways in which instructional logs can be used to overcome some of the limitations of these two approaches when gathering data on curriculum content and coverage. Classroom observations are expensive, require extensive training of raters to ensure consistency in the observations, and because of their expense generally cannot be conducted frequently enough to enable the researcher to generalize observational findings to the entire school year or illuminate the patterns of instructional change that occur across the school year. Annual surveys are less expensive but often suffer from self-report bias and the bias that occurs when teachers are asked to retrospectively report on their activities over the course of a single year. Instructional logs offer a valid, reliable, and relatively cost-effective alternative for collecting detailed information about classroom practice and can overcome some of the limitations of both observations and annual surveys.

  16. VLSI IMPLEMENTATION OF NOVEL ROUND KEYS GENERATION SCHEME FOR CRYPTOGRAPHY APPLICATIONS BY ERROR CONTROL ALGORITHM

    Directory of Open Access Journals (Sweden)

    B. SENTHILKUMAR

    2015-05-01

    Full Text Available A novel implementation of code based cryptography (Cryptocoding technique for multi-layer key distribution scheme is presented. VLSI chip is designed for storing information on generation of round keys. New algorithm is developed for reduced key size with optimal performance. Error Control Algorithm is employed for both generation of round keys and diffusion of non-linearity among them. Two new functions for bit inversion and its reversal are developed for cryptocoding. Probability of retrieving original key from any other round keys is reduced by diffusing nonlinear selective bit inversions on round keys. Randomized selective bit inversions are done on equal length of key bits by Round Constant Feedback Shift Register within the error correction limits of chosen code. Complexity of retrieving the original key from any other round keys is increased by optimal hardware usage. Proposed design is simulated and synthesized using VHDL coding for Spartan3E FPGA and results are shown. Comparative analysis is done between 128 bit Advanced Encryption Standard round keys and proposed round keys for showing security strength of proposed algorithm. This paper concludes that chip based multi-layer key distribution of proposed algorithm is an enhanced solution to the existing threats on cryptography algorithms.

  17. Usability of geographic information -- factors identified from qualitative analysis of task-focused user interviews.

    Science.gov (United States)

    Harding, Jenny

    2013-11-01

    Understanding user needs for geographic information and the factors which influence the usability of such information in diverse user contexts is an essential part of user centred development of information products. There is relatively little existing research focused on the design and usability of information products in general. This paper presents a research approach based on semi structured interviews with people working with geographic information on a day to day basis, to establish a reference base of qualitative data on user needs for geographic information with respect to context of use. From this reference data nine key categories of geographic information usability are identified and discussed in the context of limited existing research concerned with geographic information usability. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  18. Identifying Key Proteins in Hg Methylation Pathways of Desulfovibrio by Global Proteomics, Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Summers, Anne O. [Univ. of Georgia, Athens, GA (United States). Dept. of Microbiology; Miller, Susan M. [Univ. of California, San Francisco, CA (United States). Dept. of Pharmaceutical Chemistry; Wall, Judy [Univ. of Missouri, Columbia, MO (United States). Dept. of Biochemistry; Lipton, Mary [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-06-18

    Elemental mercury, Hg(0) is a contaminant at many DOE sites, especially at Oak Ridge National Laboratory (ORNL) where the spread of spilled Hg and its effects on microbial populations have been monitored for decades. To explore the microbial interactions with Hg, we have devised a global proteomic approach capable of directly detecting Hg-adducts of proteins. This technique developed in the facultative anaerobe, Escherichia coli, allows us to identify the proteins most vulnerable to acute exposure to organomercurials phenyl- and ethyl-mercury (as surrogates for the highly neurotoxic methyl-Hg) (Polacco, et al, 2011). We have found >300 such proteins in all metabolic functional groups and cellular compartments; most are highly conserved and can serve as markers for acute Hg exposure (Zink, et al. 2016, in preparation). We have also discovered that acute Hg exposure severely disrupts thiol, iron and redox homeostases, and electrolyte balance (LaVoie, et al., 2015) Thus, we proposed to bring these techniques to bear on the central problem of identifying the cellular proteins involved in bacterial uptake and methylation of mercury and its release from the cell.

  19. Tombusvirus-yeast interactions identify conserved cell-intrinsic viral restriction factors

    Directory of Open Access Journals (Sweden)

    Zsuzsanna eSasvari

    2014-08-01

    Full Text Available To combat viral infections, plants possess innate and adaptive immune pathways, such as RNA silencing, R gene and recessive gene-mediated resistance mechanisms. However, it is likely that additional cell-intrinsic restriction factors (CIRF are also involved in limiting plant virus replication. This review discusses novel CIRFs with antiviral functions, many of them RNA-binding proteins or affecting the RNA binding activities of viral replication proteins. The CIRFs against tombusviruses have been identified in yeast (Saccharomyces cerevisiae, which is developed as an advanced model organism. Grouping of the identified CIRFs based on their known cellular functions and subcellular localization in yeast reveals that TBSV replication is limited by a wide variety of host gene functions. Yeast proteins with the highest connectivity in the network map include the well-characterized Xrn1p 5’-3’ exoribonuclease, Act1p actin protein and Cse4p centromere protein. The protein network map also reveals an important interplay between the pro-viral Hsp70 cellular chaperone and the antiviral co-chaperones, and possibly key roles for the ribosomal or ribosome-associated factors. We discuss the antiviral functions of selected CIRFs, such as the RNA binding nucleolin, ribonucleases, WW-domain proteins, single- and multi-domain cyclophilins, TPR-domain co-chaperones and cellular ion pumps. These restriction factors frequently target the RNA-binding region in the viral replication proteins, thus interfering with the recruitment of the viral RNA for replication and the assembly of the membrane-bound viral replicase. Although many of the characterized CIRFs act directly against TBSV, we propose that the TPR-domain co-chaperones function as guardians of the cellular Hsp70 chaperone system, which is subverted efficiently by TBSV for viral replicase assembly in the absence of the TPR-domain co-chaperones.

  20. Possibilities and Expectations for mHealth in the Pacific Islands: Insights From Key Informants.

    Science.gov (United States)

    Umali, Elaine; McCool, Judith; Whittaker, Robyn

    2016-01-20

    The increase in mobile phone use across the globe is creating mounting interest for its application in addressing health system constraints. Although still limited, there is growing evidence of success in using mobile phones for health (mHealth) in low- and middle- income countries. The promise of mHealth to address key health system issues presents a huge potential for the Pacific Island countries where mobile use has radically increased. Current projections indicate an improved information and communications technology (ICT) environment to support greater access to mobile and digital devices in the Pacific region. The objective of the study was to explore key stakeholder perspectives on the potential for mHealth in the Pacific region. A series of in-depth interviews were conducted either face-to-face, via Skype or by email, with a series of key informants from the Pacific Rim region. Interviews were audio-recorded and later transcribed for detailed thematic analysis. We found widespread support for the potential to use mobile phones as a mechanism to facilitate improved health service delivery in the region. Essential elements for the successful development and implementation of mHealth were identified by these stakeholders. These included: developing an understanding of the local context and the problems that may be usefully addressed by the addition of mHealth to existing strategies and services; consideration of local infrastructure, capability, policy, mobile literacy and engagement; learning from others, particularly other low- and middle-income countries (LMICs); the importance of building supportive environments and of evaluation to provide evidence of impact and total cost. The rapid growth of mobile phone use in the region presents a unique juxtaposition of opportunity and promise. Though the region lags behind other LMICs in the adoption of mHealth technologies, this offers the convenience of learning from past mHealth interventions and applying these

  1. Diversity of key players in the microbial ecosystems of the human body.

    Science.gov (United States)

    Jordán, Ferenc; Lauria, Mario; Scotti, Marco; Nguyen, Thanh-Phuong; Praveen, Paurush; Morine, Melissa; Priami, Corrado

    2015-10-30

    Coexisting bacteria form various microbial communities in human body parts. In these ecosystems they interact in various ways and the properties of the interaction network can be related to the stability and functional diversity of the local bacterial community. In this study, we analyze the interaction network among bacterial OTUs in 11 locations of the human body. These belong to two major groups. One is the digestive system and the other is the female genital tract. In each local ecosystem we determine the key species, both the ones being in key positions in the interaction network and the ones that dominate by frequency. Beyond identifying the key players and discussing their biological relevance, we also quantify and compare the properties of the 11 networks. The interaction networks of the female genital system and the digestive system show totally different architecture. Both the topological properties and the identity of the key groups differ. Key groups represent four phyla of prokaryotes. Some groups appear in key positions in several locations, while others are assigned only to a single body part. The key groups of the digestive and the genital tracts are totally different.

  2. Poetics of the Key Scenes of V. Pelevin’s Literary Historiosophy

    Directory of Open Access Journals (Sweden)

    Tatyana E. Sorokina

    2017-03-01

    Full Text Available The article studies the poetics of the key scenes of the artistic philosophy of history of Victor Pelevin. There is an attempt to identify the features of his rational creative manner. Firstly, in the novels and stories of the writer there is modernity, transformed into grotesque images «of our days». Secondly, dynamism of fable text formation is in the context of philosophical reflection and breakthroughs that allow the reader to feel attached to the «wisdom», without leaving the area of the plot that can be disclosed within mass culture. Thirdly, the component of the philosophical text does not require the reader’s own intellectual effort; humor, irony and sarcasm eliminate vector of didactic narrative complexity of the book. Fourthly, the frequent use of profanity, limit of the freedom of the narrator and the characters from the classic morality reinforce grotesque sound of works and stimulate the reader to go through a certain surge of marginality, however, not going beyond the act of reading. And fifthly, it is accomplished the introduction to Buddhist culture, which is «preached» by means of historical realities of modern Russia. The paradox of Pelevin’s poetics: the impossibility of history, but it is impossible not to talk about it. What it is not substantially constant appears in the dialogue of the novel. The ambiguity of chronotope, the duality of time and space, ironic attitude to the character – the basis of poetics is not only in the novel «Chapaev and Emptiness», which raises the question of the existence of history as a fact of consciousness, the reality existing outside our mind, but also the «Sacred Book of the Werewolf» and «Тhe Empire V». The key image – the image of the emptiness. Consequently, the poetics of the key scenes of artistic historiosophy of Pelevin is considered on the material of novels «Chapaev and Emptiness», «The Sacred Book of the Werewolf» and «The Empire V».

  3. High performance reconciliation for continuous-variable quantum key distribution with LDPC code

    Science.gov (United States)

    Lin, Dakai; Huang, Duan; Huang, Peng; Peng, Jinye; Zeng, Guihua

    2015-03-01

    Reconciliation is a significant procedure in a continuous-variable quantum key distribution (CV-QKD) system. It is employed to extract secure secret key from the resulted string through quantum channel between two users. However, the efficiency and the speed of previous reconciliation algorithms are low. These problems limit the secure communication distance and the secure key rate of CV-QKD systems. In this paper, we proposed a high-speed reconciliation algorithm through employing a well-structured decoding scheme based on low density parity-check (LDPC) code. The complexity of the proposed algorithm is reduced obviously. By using a graphics processing unit (GPU) device, our method may reach a reconciliation speed of 25 Mb/s for a CV-QKD system, which is currently the highest level and paves the way to high-speed CV-QKD.

  4. GHG emission scenarios in Asia and the world: The key technologies for significant reduction

    International Nuclear Information System (INIS)

    Akashi, Osamu; Hijioka, Yasuaki; Masui, Toshihiko; Hanaoka, Tatsuya; Kainuma, Mikiko

    2012-01-01

    In this paper, we explore GHG emission scenarios up to 2050 in Asia and the world as part of the Asian Modeling Exercise and assess technology options for meeting a 2.6 W/m 2 radiative forcing target using AIM/Enduse[Global] and AIM/Impact[Policy]. Global GHG emissions in 2050 are required to be reduced by 72% relative to a reference scenario, which corresponds to a 57% reduction from the 2005 level, in order to meet the above target. Energy intensity improvement contributes a lot to curbing CO 2 emission in the short-term. Meanwhile, carbon intensity reduction and CO 2 capture play a large role for further emission reduction in the mid to long-term. The top five key technologies in terms of reduction amount are CCS, solar power generation, wind power generation, biomass power generation and biofuel, which, in total, account for about 60% of global GHG emissions reduction in 2050. We implement additional model runs, each of which enforced limited availability of one of the key technology. The result shows that the 2.6 W/m 2 target up to 2050 is achievable even if availability of any one of the key technologies is limited to half the level achieved in the default simulation. However, if the use of CCS or biomass is limited, the cumulative GHG abatement cost until 2050 increases considerably. Therefore CCS and biomass have a vital role in curbing costs to achieve significant emission reductions. - Highlights: ► We explore GHG emission scenarios up to 2050 in Asia and the world. ► Significant GHG emission reduction is required to limit radiative forcing at low level. ► We assess technology options for achieving significant GHG emission reduction. ► CCS, solar power, wind power, and biomass are the key technologies for reduction. ► Especially, CCS and biomass play a vital role in curbing costs to achieve significant emission reductions.

  5. Rubella vaccination in India: identifying broad consequences of vaccine introduction and key knowledge gaps.

    Science.gov (United States)

    Winter, A K; Pramanik, S; Lessler, J; Ferrari, M; Grenfell, B T; Metcalf, C J E

    2018-01-01

    Rubella virus infection typically presents as a mild illness in children; however, infection during pregnancy may cause the birth of an infant with congenital rubella syndrome (CRS). As of February 2017, India began introducing rubella-containing vaccine (RCV) into the public-sector childhood vaccination programme. Low-level RCV coverage among children over several years can result in an increase in CRS incidence by increasing the average age of infection without sufficiently reducing rubella incidence. We evaluated the impact of RCV introduction on CRS incidence across India's heterogeneous demographic and epidemiological contexts. We used a deterministic age-structured model that reflects Indian states' rural and urban area-specific demography and vaccination coverage levels to simulate rubella dynamics and estimate CRS incidence with and without RCV introduction to the public sector. Our analysis suggests that current low-level private-sector vaccination has already slightly increased the burden of CRS in India. We additionally found that the effect of public-sector RCV introduction depends on the basic reproductive number, R 0, of rubella. If R 0 is five, a value empirically estimated from an array of settings, CRS incidence post-RCV introduction will likely decrease. However, if R 0 is seven or nine, some states may experience short-term or annual increases in CRS, even if a long-term total reduction in cases (30 years) is expected. Investment in population-based serological surveys and India's fever/rash surveillance system will be key to monitoring the success of the vaccination programme.

  6. KEY FACTORS IN MARKETING FOCUSED SERVICES BUSINESSES

    Directory of Open Access Journals (Sweden)

    Doris Yohanna Martínez Castrillón

    2016-07-01

    Full Text Available This article aims to identify the key success factors in the marketing area and describe them as managerial allies for companies that wish to position themselves in the market under a good sustainable performance , for it has been consulted theoretical references of Marketing as a management partner with collection and integration of data. Methodologically, it is located within the type of descriptive research field, with a design of transactional non-experimental, with an intentional non-probabilistic stratified sample of four reporting units. The findings established fifteen (15 points of influence called "key success factors (FCE in the area of marketing, and managerial allies of service companies in the security, surveillance and protection sector in industrial, commercial and residential sectors. Finally, it is intended that the actions of marketing service companies should focus to the welfare of both the organization, such as users, both in the environment, and economic, social and technological, characterized by ethics, sustainable development and transparency to respond appropriately.

  7. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  8. The Protein Identifier Cross-Referencing (PICR service: reconciling protein identifiers across multiple source databases

    Directory of Open Access Journals (Sweden)

    Leinonen Rasko

    2007-10-01

    Full Text Available Abstract Background Each major protein database uses its own conventions when assigning protein identifiers. Resolving the various, potentially unstable, identifiers that refer to identical proteins is a major challenge. This is a common problem when attempting to unify datasets that have been annotated with proteins from multiple data sources or querying data providers with one flavour of protein identifiers when the source database uses another. Partial solutions for protein identifier mapping exist but they are limited to specific species or techniques and to a very small number of databases. As a result, we have not found a solution that is generic enough and broad enough in mapping scope to suit our needs. Results We have created the Protein Identifier Cross-Reference (PICR service, a web application that provides interactive and programmatic (SOAP and REST access to a mapping algorithm that uses the UniProt Archive (UniParc as a data warehouse to offer protein cross-references based on 100% sequence identity to proteins from over 70 distinct source databases loaded into UniParc. Mappings can be limited by source database, taxonomic ID and activity status in the source database. Users can copy/paste or upload files containing protein identifiers or sequences in FASTA format to obtain mappings using the interactive interface. Search results can be viewed in simple or detailed HTML tables or downloaded as comma-separated values (CSV or Microsoft Excel (XLS files suitable for use in a local database or a spreadsheet. Alternatively, a SOAP interface is available to integrate PICR functionality in other applications, as is a lightweight REST interface. Conclusion We offer a publicly available service that can interactively map protein identifiers and protein sequences to the majority of commonly used protein databases. Programmatic access is available through a standards-compliant SOAP interface or a lightweight REST interface. The PICR

  9. Integrated Network Analysis Identifies Fight-Club Nodes as a Class of Hubs Encompassing Key Putative Switch Genes That Induce Major Transcriptome Reprogramming during Grapevine Development[W][OPEN

    Science.gov (United States)

    Palumbo, Maria Concetta; Zenoni, Sara; Fasoli, Marianna; Massonnet, Mélanie; Farina, Lorenzo; Castiglione, Filippo; Pezzotti, Mario; Paci, Paola

    2014-01-01

    We developed an approach that integrates different network-based methods to analyze the correlation network arising from large-scale gene expression data. By studying grapevine (Vitis vinifera) and tomato (Solanum lycopersicum) gene expression atlases and a grapevine berry transcriptomic data set during the transition from immature to mature growth, we identified a category named “fight-club hubs” characterized by a marked negative correlation with the expression profiles of neighboring genes in the network. A special subset named “switch genes” was identified, with the additional property of many significant negative correlations outside their own group in the network. Switch genes are involved in multiple processes and include transcription factors that may be considered master regulators of the previously reported transcriptome remodeling that marks the developmental shift from immature to mature growth. All switch genes, expressed at low levels in vegetative/green tissues, showed a significant increase in mature/woody organs, suggesting a potential regulatory role during the developmental transition. Finally, our analysis of tomato gene expression data sets showed that wild-type switch genes are downregulated in ripening-deficient mutants. The identification of known master regulators of tomato fruit maturation suggests our method is suitable for the detection of key regulators of organ development in different fleshy fruit crops. PMID:25490918

  10. Identification of key oil refining technologies for China National Petroleum Co. (CNPC)

    International Nuclear Information System (INIS)

    Liu Haiyan; Yu Jianning; Xu Jian; Fan Yu; Bao Xiaojun

    2007-01-01

    This paper summarizes the results from the project 'Vision of the Key Petroleum Refining Technologies for China National Petroleum Co. (CNPC) in the Early 21st Century' undertaken by the Department of R and D Administration, CNPC, and its affiliate key laboratory, The Key Laboratory of Catalysis operated by China University of Petroleum, Beijing. The objective of the project was to identify the challenges and opportunities of CNPC's petroleum refining business given increasing economy globalization and stricter environmental regulations. Using the modified Delphi method, four key technologies for CNPC's oil refining industry were identified. They are: integrated fluid catalytic cracking (FCC), hydroprocessing, residue hydrocracking, and high-grade lubricant production. The most significant technology will be the integrated FCC technology that can economically increase the yield of light fractions as well as upgrade transportation fuels. In China, FCC units produce about 80% and 30% commercial gasoline and diesel, respectively. To ensure compliance with future environmental legislation, hydroprocessing technologies, including those related to petroleum product hydrorefining and distillate hydrocracking, should be developed. By combining residue hydrocracking and FCC technologies, poorer quality residua can be processed. Supplying high-grade lube oils is one of the main tasks for CNPC's oil refining industry. Development of hydrodewaxing technologies to manufacture API group II/III base oil is the main direction for CNPC's lubricant production business

  11. A Large-Scale RNAi Screen Identifies SGK1 as a Key Survival Kinase for GBM Stem Cells.

    Science.gov (United States)

    Kulkarni, Shreya; Goel-Bhattacharya, Surbhi; Sengupta, Sejuti; Cochran, Brent H

    2018-01-01

    Glioblastoma multiforme (GBM) is the most common type of primary malignant brain cancer and has a very poor prognosis. A subpopulation of cells known as GBM stem-like cells (GBM-SC) have the capacity to initiate and sustain tumor growth and possess molecular characteristics similar to the parental tumor. GBM-SCs are known to be enriched in hypoxic niches and may contribute to therapeutic resistance. Therefore, to identify genetic determinants important for the proliferation and survival of GBM stem cells, an unbiased pooled shRNA screen of 10,000 genes was conducted under normoxic as well as hypoxic conditions. A number of essential genes were identified that are required for GBM-SC growth, under either or both oxygen conditions, in two different GBM-SC lines. Interestingly, only about a third of the essential genes were common to both cell lines. The oxygen environment significantly impacts the cellular genetic dependencies as 30% of the genes required under hypoxia were not required under normoxic conditions. In addition to identifying essential genes already implicated in GBM such as CDK4, KIF11 , and RAN , the screen also identified new genes that have not been previously implicated in GBM stem cell biology. The importance of the serum and glucocorticoid-regulated kinase 1 (SGK1) for cellular survival was validated in multiple patient-derived GBM stem cell lines using shRNA, CRISPR, and pharmacologic inhibitors. However, SGK1 depletion and inhibition has little effect on traditional serum grown glioma lines and on differentiated GBM-SCs indicating its specific importance in GBM stem cell survival. Implications: This study identifies genes required for the growth and survival of GBM stem cells under both normoxic and hypoxic conditions and finds SGK1 as a novel potential drug target for GBM. Mol Cancer Res; 16(1); 103-14. ©2017 AACR . ©2017 American Association for Cancer Research.

  12. Community Engagement for Identifying Cancer Education Needs in Puerto Rico.

    Science.gov (United States)

    Jiménez, Julio; Ramos, Axel; Ramos-Rivera, Francisco E; Gwede, Clement; Quinn, Gwendolyn P; Vadaparampil, Susan; Brandon, Thomas; Simmons, Vani; Castro, Eida

    2018-02-01

    Cancer is the leading cause of death in Puerto Rico, suggesting a need for improved strategies, programs, and resources devoted to cancer prevention. Enhanced prevention needs in Puerto Rico were initially identified in pilot studies conducted by the Ponce School of Medicine (PSM) in collaboration with the H. Lee Moffitt Cancer Center (MCC). In the current study, we used community engagement to identify specific needs in cancer prevention and education and strategies to create culturally attuned, effective cancer prevention education programs. A total of 37 participants attended a community forum and were assigned to one of three discussion groups: patients/survivors (n = 14); family/caregivers (n = 11); or healthcare providers (n = 12). Most participants were women (73 %), over 35 years of age, and a majority were married (58 %) and had a university education (81 %). The sessions were recorded and transcribed and analyzed for key themes. Participants wanted improved awareness of cancer prevention in Puerto Rico and believed cancer prevention education should start early, ideally in elementary school. Participants also stressed the importance of creating partnerships with private and government agencies to coordinate educational efforts. Suggested strategies included outreach to communities with limited resources, incorporating the testimony of cancer survivors, and utilizing social media to disseminate cancer prevention information.

  13. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    Science.gov (United States)

    2015-11-12

    polarization control and the CV state and the LO state are separated at a polarizing beam splitter . The CV state is delayed relative to the LO state, and... splitter or loss imperfections. We have identified a number of risks associated with implementing this design . The two most critical risks are: • The...Contractor Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY

  14. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  15. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  16. Delivering key signals to the machine: seeking the electric signal that muscles emanate

    International Nuclear Information System (INIS)

    Hashim, A Y Bani; Maslan, M N; Izamshah, R; Mohamad, I S

    2014-01-01

    Due to the limitation of electric power generation in the human body, present human-machine interfaces have not been successful because of the nature of standard electronics circuit designs, which do not consider the specifications of signals that resulted from the skin. In general, the outcomes and applications of human-machine interfaces are limited to custom-designed subsystems, such as neuroprosthesis. We seek to model the bio dynamical of sub skin into equivalent mathematical definitions, descriptions, and theorems. Within the human skin, there are networks of nerves that permit the skin to function as a multi dimension transducer. We investigate the nature of structural skin. Apart from multiple networks of nerves, there are other segments within the skin such as minute muscles. We identify the segments that are active when there is an electromyography activity. When the nervous system is firing signals, the muscle is being stimulated. We evaluate the phenomena of biodynamic of the muscles that is concerned with the electromyography activity of the nervous system. In effect, we design a relationship between the human somatosensory and synthetic systems sensory as the union of a complete set of the new domain of the functional system. This classifies electromyogram waveforms linked to intent thought of an operator. The system will become the basis for delivering key signals to machine such that the machine is under operator's intent, hence slavery

  17. Embracing the quantum limit in silicon computing.

    Science.gov (United States)

    Morton, John J L; McCamey, Dane R; Eriksson, Mark A; Lyon, Stephen A

    2011-11-16

    Quantum computers hold the promise of massive performance enhancements across a range of applications, from cryptography and databases to revolutionary scientific simulation tools. Such computers would make use of the same quantum mechanical phenomena that pose limitations on the continued shrinking of conventional information processing devices. Many of the key requirements for quantum computing differ markedly from those of conventional computers. However, silicon, which plays a central part in conventional information processing, has many properties that make it a superb platform around which to build a quantum computer. © 2011 Macmillan Publishers Limited. All rights reserved

  18. Random multiple key streams for encryption with added CBC mode of operation

    Directory of Open Access Journals (Sweden)

    P. Penchalaiah

    2016-09-01

    For the first time, in this paper, we present a construction method to generate multiple random keys from a core-key with highest possible immunity to crack. We are with a particular emphasis on novel technique to secure user data, we have designed a secure and cost effective new cryptosystem called Rbits (Random bits cypher. In different directions we identify that Rbits having highest immunity to crack and presenting various analysis tests in support from this viewpoint and the analyzed results are reported.

  19. A QUICK KEY TO THE SUBFAMILIES AND GENERA OF ANTS OF THE SAVANNAH RIVER SITE

    Energy Technology Data Exchange (ETDEWEB)

    Martin, D

    2007-09-04

    This taxonomic key was devised to support development of a Rapid Bioassessment Protocol using ants at the Savannah River Site. The emphasis is on 'rapid' and, because the available keys contained a very large number of genera not known to occur at the Savannah River Site, we found that the available keys were unwieldy. Because these keys contained many more genera than we would ever encounter and because this larger number of genera required more couplets in the key and often required examination of characters that are difficult to assess without higher magnifications (60X or higher), more time was required to process samples. In developing this set of keys I emphasized character states that are easier for nonspecialists to recognize. I recognize that the character sets used may lead to some errors but I believe that the error rate will be small and, for the purpose of rapid bioassessment, this error rate will be acceptable provided that overall sample sizes are adequate. Oliver and Beattie (1996a, 1996b) found that for rapid assessment of biodiversity the same results were found when identifications were done to morphospecies by people with minimal expertise as when the same data sets were identified by subject matter experts. Basset et al. (2004) concluded that it was not as important to correctly identify all species as it was to be sure that the study included as many functional groups as possible. If your study requires high levels of accuracy, it is highly recommended that, when you key out a specimen and have any doubts concerning the identification, you should refer to keys in Bolton (1994) or to the other keys used to develop this area specific taxonomic key.

  20. Knowledge, skills, and abilities for key radiation protection positions at DOE facilities

    International Nuclear Information System (INIS)

    1997-01-01

    This document provides detailed qualification criteria for contractor key radiation protection personnel. Although federal key radiation protection positions are also identified, qualification standards for federal positions are provided in DOE O 360.1 and the DOE Technical Qualifications Program. Appendices B and D provide detailed listings for knowledge, skills, and abilities for contractor and DOE federal key radiation protection positions. This information may be used in developing position descriptions and individual development plans. Information provided in Appendix C may be useful in developing performance measures and assessing an individual's performance in his or her specific position. Additionally, Federal personnel may use this information to augment their Office/facility qualification standards under the Technical Qualifications Program

  1. A Recommended Set of Key Arctic Indicators

    Science.gov (United States)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  2. Strategic environmental assessment and monitoring: Arctic key gaps and bridging pathways

    International Nuclear Information System (INIS)

    Azcárate, Juan; Balfors, Berit; Bring, Arvid; Destouni, Georgia

    2013-01-01

    The Arctic region undergoes rapid and unprecedented environmental change. Environmental assessment and monitoring is needed to understand and decide how to mitigate and/or adapt to the changes and their impacts on society and ecosystems. This letter analyzes the application of strategic environmental assessment (SEA) and the monitoring, based on environmental observations, that should be part of SEA, elucidates main gaps in both, and proposes an overarching SEA framework to systematically link and improve both with focus on the rapidly changing Arctic region. Shortcomings in the monitoring of environmental change are concretized by examples of main gaps in the observations of Arctic hydroclimatic changes. For relevant identification and efficient reduction of such gaps and remaining uncertainties under typical conditions of limited monitoring resources, the proposed overarching framework for SEA application includes components for explicit gap/uncertainty handling and monitoring, systematically integrated within all steps of the SEA process. The framework further links to adaptive governance, which should explicitly consider key knowledge and information gaps that are identified through and must be handled in the SEA process, and accordingly (re)formulate and promote necessary new or modified monitoring objectives for bridging these gaps. (letter)

  3. LIMITING FACTORS FOR THE DEVELOPMENT OF THE SERBIAN HOSPITALITY INDUSTRY

    Directory of Open Access Journals (Sweden)

    Nikolina Kosar

    2016-12-01

    Full Text Available Heterogeneity and complexity determine multidisciplinary approach to the hospitality research. Identification and analysis of limited hospitality development factors imply very complex scientific approach. Case study methodology is applied on Republic of Serbia, which is transition country and candidate for EU accession. Research results identified key factors which had impact on lag, stagnation and contemporary level of hospitality development. Firstly, way of executed privatization process of hospitality companies in Serbia i.e. only ownership transformation, as part of business transformation, was done (organizational, management, technological, financial and human resources parts of business transformation didn’t implement. Secondly, non-acceptable terms and conditions of credit lines for financing privatization and future business of privatized hospitality companies. Furthermore, buyers of privatized hospitality companies didn’t prepared adequate projections of cash flow and sources of financing (owned and borrowed. Finally, technological development and human resources were result of the first mentioned limited factor. In order to improve business in hospitality industry in transition economies, all stakeholders should be involved. State should improve business environment. Educational institutions should create applicable programs on market. Investors should be ready to invest in technological and human resource development. Banks should implement the best financing practice from headquarters in EU.

  4. Key principles for adapting South African settlement patterns to climate change

    CSIR Research Space (South Africa)

    Van Wyk, Llewellyn

    2017-06-01

    Full Text Available The aim of the paper is to identify key principles for adapting SA settlement patterns to climate change. Section 1 reviews the range of climate-related impacts likely to affect SA settlements using climate change models and scenarios as a context...

  5. Seeking convergence on the key concepts in "no net loss" policy

    DEFF Research Database (Denmark)

    Bull, Joseph William; Gordon, Ascelin; Watson, James E.M.

    2016-01-01

    . The recommendations made in this article, on improving clarity and supporting convergence on key no net loss (NNL) concepts, should help eliminate ambiguity in policy documentation. This is crucial if policymakers are to design robust policies that are (i) transparent, (ii) translatable into practice in a consistent......Biodiversity conservation policies incorporating a no net loss (NNL) principle are being implemented in many countries. However, there are linguistic and conceptual inconsistencies in the use of terms underlying these NNL policies. We identify inconsistencies that emerge in the usage of eight key......, reduce ambiguity and improve clarity in communication and policy documentation. However, we also warn of the challenges in achieving convergence, especially given the linguistic inconsistencies in several of these key concepts among countries in which NNL policies are employed. Policy implications...

  6. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  7. Pricing in health care organizations. A key component of the marketing mix.

    Science.gov (United States)

    Marlowe, D

    1989-01-01

    Pricing is one of the key components of a successful marketing mix. Pricing objectives, strategies, and tactics cannot stand alone, however. To be effective, price must work in harmony with other marketing and management activities. Despite its importance, use of pricing as a management tool is limited in health care compared to other industries. Many factors contribute to this situation, including the structure of the health-care exchange process, limited consumer knowledge, and a limited ability to measure costs. I will provide an overview of pricing information, both within and outside health care. Specifically, we will explore the definition of pricing, nonmonetary pricing, price elasticity, classical pricing theory, and the role of pricing in a health-care setting.

  8. Identifying key features of effective active learning: the effects of writing and peer discussion.

    Science.gov (United States)

    Linton, Debra L; Pangle, Wiline M; Wyatt, Kevin H; Powell, Karli N; Sherwood, Rachel E

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. © 2014 D. L. Linton et al. CBE—Life Sciences Education © 2014 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  9. Current Status of the LOFAR EoR Key Science Project

    Science.gov (United States)

    Koopmans, L. V. E.; LOFAR EoR KSP Team

    2018-05-01

    A short status update on the LOFAR Epoch of Reionization (EoR) Key Science Project (KSP) is given, regarding data acquisition, data processing and analysis, and current power-spectrum limits on the redshifted 21-cm signal of neutral hydrogen at redshifts z = 8 - 10. With caution, we present a preliminary astrophysical analysis of ~60 hr of processed LOFAR data and their resulting power spectrum, showing that potentially already interesting limits on X-ray heating during the Cosmic Dawn can already be gained. This is by no means the final analysis of this sub-set of data, but illustrates the future potential when all nearly 3000 hr of data in hand on two EoR windows will have been processed.

  10. Geotechnics - the key to ground water protection

    DEFF Research Database (Denmark)

    Baumann, Jens; Foged, Niels; Jørgensen, Peter

    2000-01-01

    During the past 5 to 10 years research into ground water protection has proved that fractures in clay till may increase the hydraulic conductivity and herby the vulnerability of the ground water considerably. However, research has not identified a non-expensive and efficient method to map...... the fracture conditions of the various clay tills. Tests performed at the Danish Geotechnical Institute with large undisturbed columns of clay till show that there is a relation between the strength of the clay till and the hydraulic conductivity. Geotechnical methods may therefore be the key to determine...

  11. Citizen science participation in research in the environmental sciences: key factors related to projects' success and longevity.

    Science.gov (United States)

    Cunha, Davi G F; Marques, Jonatas F; Resende, Juliana C DE; Falco, Patrícia B DE; Souza, Chrislaine M DE; Loiselle, Steven A

    2017-01-01

    The potential impacts of citizen science initiatives are increasing across the globe, albeit in an imbalanced manner. In general, there is a strong element of trial and error in most projects, and the comparison of best practices and project structure between different initiatives remains difficult. In Brazil, the participation of volunteers in environmental research is limited. Identifying the factors related to citizen science projects' success and longevity within a global perspective can contribute for consolidating such practices in the country. In this study, we explore past and present projects, including a case study in Brazil, to identify the spatial and temporal trends of citizen science programs as well as their best practices and challenges. We performed a bibliographic search using Google Scholar and considered results from 2005-2014. Although these results are subjective due to the Google Scholar's algorithm and ranking criteria, we highlighted factors to compare projects across geographical and disciplinary areas and identified key matches between project proponents and participants, project goals and local priorities, participant profiles and engagement, scientific methods and funding. This approach is a useful starting point for future citizen science projects, allowing for a systematic analysis of potential inconsistencies and shortcomings in this emerging field.

  12. Key Health Information Technologies and Related Issues for Iran: A Qualitative Study.

    Science.gov (United States)

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh

    2018-01-01

    Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making.

  13. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    International Nuclear Information System (INIS)

    Molotkov, S. N.

    2008-01-01

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (η ∼ 20%) and dark count probability (p dark ∼ 10 -7 )

  14. Nonmarket economic user values of the Florida Keys/Key West

    Science.gov (United States)

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  15. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  16. Key scattering mechanisms limiting the lateral transport in a modulation-doped polar heterojunction

    Energy Technology Data Exchange (ETDEWEB)

    Tien, Nguyen Thanh, E-mail: nttien@ctu.edu.vn; Thao, Pham Thi Bich [College of Natural Sciences, Can Tho University, 3-2 Road, Can Tho City (Viet Nam); Thao, Dinh Nhu [Center for Theoretical and Computational Physics, College of Education, Hue University, 34 Le Loi Street, Hue City (Viet Nam); Quang, Doan Nhat [Institute of Physics, Vietnamese Academy of Science and Technology, 10 Dao Tan Street, Hanoi (Viet Nam)

    2016-06-07

    We present a study of the lateral transport of a two-dimensional electron gas (2DEG) in a modulation-doped polar heterojunction (HJ). In contrast to previous studies, we assume that the Coulomb correlation among ionized impurities and among charged dislocations in the HJ is so strong that the 2DEG low-temperature mobility is not limited by impurity and dislocation scattering. The mobility, however, is specified by alloy disorder scattering and combined roughness scattering, which is the total effect induced by both the potential barrier and polarization roughness. The obtained results show that the alloy disorder and combined roughness scattering strongly depend on the alloy content and on the near-interface electron distribution. Our theory is capable of explaining the bell-shaped dependence of the lateral mobility on alloy content observed in AlGaN/GaN and on 2DEG density observed in AlN/GaN, which have not previously been explained.

  17. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    DEFF Research Database (Denmark)

    Bacco, Davide; Christensen, Jesper Bjerge; Usuga Castaneda, Mario A.

    2016-01-01

    10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak......Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last...... coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable....

  18. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    Science.gov (United States)

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-12-01

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.

  19. Exploring key determinants of virtual worlds business success based on users' experience and perception

    OpenAIRE

    Xu , Xiaobo (Bob)

    2010-01-01

    Given the growth and popularity of virtual worlds, companies have a strong interest in presenting themselves successfully in virtual worlds. We designed an experimental study to identify the key determinants of virtual worlds business success based on users’ experience and perception. The preliminary results indicate that Starbucks, McDonalds, and Paris are the 3 most favorite sites. Furthermore, 5 key determinants (entertainment, functionality, interactivity, reality, and s...

  20. Medication incident reporting in residential aged care facilities: Limitations and risks to residents’ safety

    Directory of Open Access Journals (Sweden)

    Tariq Amina

    2012-11-01

    Full Text Available Abstract Background Medication incident reporting (MIR is a key safety critical care process in residential aged care facilities (RACFs. Retrospective studies of medication incident reports in aged care have identified the inability of existing MIR processes to generate information that can be used to enhance residents’ safety. However, there is little existing research that investigates the limitations of the existing information exchange process that underpins MIR, despite the considerable resources that RACFs’ devote to the MIR process. The aim of this study was to undertake an in-depth exploration of the information exchange process involved in MIR and identify factors that inhibit the collection of meaningful information in RACFs. Methods The study was undertaken in three RACFs (part of a large non-profit organisation in NSW, Australia. A total of 23 semi-structured interviews and 62 hours of observation sessions were conducted between May to July 2011. The qualitative data was iteratively analysed using a grounded theory approach. Results The findings highlight significant gaps in the design of the MIR artefacts as well as information exchange issues in MIR process execution. Study results emphasized the need to: a design MIR artefacts that facilitate identification of the root causes of medication incidents, b integrate the MIR process within existing information systems to overcome key gaps in information exchange execution, and c support exchange of information that can facilitate a multi-disciplinary approach to medication incident management in RACFs. Conclusions This study highlights the advantages of viewing MIR process holistically rather than as segregated tasks, as a means to identify gaps in information exchange that need to be addressed in practice to improve safety critical processes.

  1. Medication incident reporting in residential aged care facilities: Limitations and risks to residents’ safety

    Science.gov (United States)

    2012-01-01

    Background Medication incident reporting (MIR) is a key safety critical care process in residential aged care facilities (RACFs). Retrospective studies of medication incident reports in aged care have identified the inability of existing MIR processes to generate information that can be used to enhance residents’ safety. However, there is little existing research that investigates the limitations of the existing information exchange process that underpins MIR, despite the considerable resources that RACFs’ devote to the MIR process. The aim of this study was to undertake an in-depth exploration of the information exchange process involved in MIR and identify factors that inhibit the collection of meaningful information in RACFs. Methods The study was undertaken in three RACFs (part of a large non-profit organisation) in NSW, Australia. A total of 23 semi-structured interviews and 62 hours of observation sessions were conducted between May to July 2011. The qualitative data was iteratively analysed using a grounded theory approach. Results The findings highlight significant gaps in the design of the MIR artefacts as well as information exchange issues in MIR process execution. Study results emphasized the need to: a) design MIR artefacts that facilitate identification of the root causes of medication incidents, b) integrate the MIR process within existing information systems to overcome key gaps in information exchange execution, and c) support exchange of information that can facilitate a multi-disciplinary approach to medication incident management in RACFs. Conclusions This study highlights the advantages of viewing MIR process holistically rather than as segregated tasks, as a means to identify gaps in information exchange that need to be addressed in practice to improve safety critical processes. PMID:23122411

  2. Who presents past the gestational age limit for first trimester abortion in the public sector in Mexico City?

    Science.gov (United States)

    Saavedra-Avendano, Biani; Schiavon, Raffaela; Sanhueza, Patricio; Rios-Polanco, Ranulfo; Garcia-Martinez, Laura; Darney, Blair G.

    2018-01-01

    Objective To identify socio-demographic factors associated with presenting for abortion services past the gestational age (GA) limit (12 weeks), and thus not receiving services, in Mexico City’s public sector first trimester abortion program. Methods We used clinical data from four high volume sites in the Interrupción Legal de Embarazo (ILE) program, 2007–2015. We used descriptive statistics to quantify the proportion of women who did not receive an abortion due to presenting past the gestational age limit. We used multivariable logistic regression to identify associations between women’s characteristics and presenting past the GA limit and calculated predicted probabilities of late presentation for key characteristics. Results Our sample included 52,391 women, 8.10% (n = 4,246) of whom did not receive abortion services due to presenting past the GA limit. Adolescents (12–17) made up 8.69% of the total sample and 13.40% of those presenting past the GA limit (p = 40 years’ old respectively). Women living in Mexico City and with higher levels of education had lower odds of presenting past the GA limit, and there was an educational gradient across all age groups. In the multivariable predicted probability models, adolescents at every level of education have significantly higher probabilities of not receiving an abortion due to presenting past the gestational age limit compared with adults (among women with a primary education: 11.75% adolescents vs. 9.02–4.26% across adult age groups). Conclusions Our results suggest that continued efforts are needed to educate women, especially younger and less educated women, about early pregnancy recognition. In addition, all women need information about the availability of first trimester legal abortion to ensure timely access to abortion services. PMID:29414987

  3. Who presents past the gestational age limit for first trimester abortion in the public sector in Mexico City?

    Directory of Open Access Journals (Sweden)

    Biani Saavedra-Avendano

    Full Text Available To identify socio-demographic factors associated with presenting for abortion services past the gestational age (GA limit (12 weeks, and thus not receiving services, in Mexico City's public sector first trimester abortion program.We used clinical data from four high volume sites in the Interrupción Legal de Embarazo (ILE program, 2007-2015. We used descriptive statistics to quantify the proportion of women who did not receive an abortion due to presenting past the gestational age limit. We used multivariable logistic regression to identify associations between women's characteristics and presenting past the GA limit and calculated predicted probabilities of late presentation for key characteristics.Our sample included 52,391 women, 8.10% (n = 4,246 of whom did not receive abortion services due to presenting past the GA limit. Adolescents (12-17 made up 8.69% of the total sample and 13.40% of those presenting past the GA limit (p = 40 years' old respectively. Women living in Mexico City and with higher levels of education had lower odds of presenting past the GA limit, and there was an educational gradient across all age groups. In the multivariable predicted probability models, adolescents at every level of education have significantly higher probabilities of not receiving an abortion due to presenting past the gestational age limit compared with adults (among women with a primary education: 11.75% adolescents vs. 9.02-4.26% across adult age groups.Our results suggest that continued efforts are needed to educate women, especially younger and less educated women, about early pregnancy recognition. In addition, all women need information about the availability of first trimester legal abortion to ensure timely access to abortion services.

  4. Public/private partners. Key factors in creating a strategic alliance for community health.

    Science.gov (United States)

    Nelson, J C; Rashid, H; Galvin, V G; Essien, J D; Levine, L M

    1999-04-01

    The rapidly evolving American health system creates economic and societal incentives for public and private health organizations to collaborate. Despite the apparent benefits of collaboration, there is a paucity of information available to help local agencies develop partnerships. This study, itself a collaboration between a school of public health (SPH) and a Georgia health district, was undertaken to identify critical factors necessary to successfully initiate and sustain a public/private community health collaboration. Professional staff at the SPH conducted 26 standardized interviews involving participants from Cobb and Douglas counties Boards of Health; Promina Northwest (now known as Wellstar), a not-for-profit health system; and community stakeholders. Content analysis of each interview question was performed and comparisons were made both within each group and across groups. Trends were identified in the following key areas: vision of health care for Cobb and Douglas counties, forces driving collaboration, strengths of each organization, critical negotiating issues, and potential community gain resulting from the partnership. A shared vision between potential collaborators facilitates communication regarding strategies to achieve common goals. A previous history of working together in limited capacities allowed the partners to develop trust and respect for one another prior to entering negotiations. These factors, when taken in conjunction with each organization's strong leadership and knowledge of the community, build a strong foundation for a successful partnership.

  5. Evidentiary requirements to identify potentially acceptable sites (PAS) in crystalline rock

    International Nuclear Information System (INIS)

    Comella, P.A.; Smith, B.H.

    1985-01-01

    This report contains information on the evidentiary requirements to identify potentially acceptable sites in crystalline rock for waste disposal. Topics addressed include: chronology, key regulatory assumptions, statutory framework for identifying potentially acceptable sites, application of 10 disqualifiers, consideration of favorable and potentially adverse conditions, a composite favorability analysis, and a proposed outline for PAS identification decision document

  6. LIMITS AND POSSIBILITIES OF THE TERRITORIAL DEVELOPMENT POLICY: AN ANALYSIS FROM THE TERRITORY CITIZENSHIP CENTRAL OF RS

    Directory of Open Access Journals (Sweden)

    Tatiana Aparecida Balem

    2016-09-01

    Full Text Available The Citizenship Territories Program, created in 2008 to replace the Rural Areas Program 2003, stands out as the Brazilian territorial development policy. This work aims, from the analysis of the Central Territory Citizenship of Rio Grande do Sul, to identify if the limits and possibilities of implementation of this territory are from public policy or from particularities of the region itself. Were outlined four keys for analytical analysis, which seek to discuss how policy has been implemented and how the notion of territorial development has been appropriated by society. In addition, we seek to present the main limitations for the development of territorial politics. Even if the territory proves an important forum for discussion and mobilization in the region, yet is insufficient to account for the territorial development, since the actions and policies of development for the circumscribed space not fully converge.

  7. KEY COMPARISON: Key comparison CCQM-K60: Total selenium and selenomethionine in selenised wheat flour

    Science.gov (United States)

    Goenaga Infante, Heidi; Sargent, Mike

    2010-01-01

    Key comparison CCQM-K60 was performed to assess the analytical capabilities of national metrology institutes (NMIs) to accurately quantitate the mass fraction of selenomethionine (SeMet) and total selenium (at low mg kg-1 levels) in selenised wheat flour. It was organized by the Inorganic Analysis Working Group (IAWG) of the Comité Consultatif pour la Quantité de Matière (CCQM) as a follow-up key comparison to the previous pilot study CCQM-P86 on selenised yeast tablets. LGC Limited (Teddington, UK) and the Institute for National Measurement Standards, National Research Council Canada (NRCC, Ottawa, Canada) acted as the coordinating laboratories. CCQM-K60 was organized in parallel with a pilot study (CCQM-P86.1) involving not only NMIs but also expert laboratories worldwide, thus enabling them to assess their capabilities, discover problems and learn how to modify analytical procedures accordingly. Nine results for total Se and four results for SeMet were reported by the participant NMIs. Methods used for sample preparation were microwave assisted acid digestion for total Se and multiple-step enzymatic hydrolysis and hydrolysis with methanesulfonic acid for SeMet. For total Se, detection techniques included inductively coupled plasma mass spectrometry (ICP-MS) with external calibration, standard additions or isotope dilution analysis (IDMS); instrumental neutron activation analysis (INAA); and graphite furnace atomic absorption spectrometry (GFAAS) with external calibration. For determination of SeMet in the wheat flour sample, the four NMIs relied upon measurements using species-specific IDMS (using 76Se-enriched SeMet) with HPLC-ICP-MS. Eight of the nine participating NMIs reported results for total Se within 3.5% deviation from the key comparison reference value (KCRV). For SeMet, the four participating NMIs reported results within 3.2% deviation from the KCRV. This shows that the performance of the majority of the CCQM-K60 participants was very good

  8. Pushing the limits of NAA. Accuracy, uncertainty and detection limits

    International Nuclear Information System (INIS)

    Greenberg, R.R.

    2008-01-01

    This paper describes some highlights from the author's efforts to improve neutron activation analysis (NAA) detection limits through development and optimization of radiochemical separations, as well as to improve the overall accuracy of NAA measurements by identifying, quantifying and reducing measurement biases and uncertainties. Efforts to demonstrate the metrological basis of NAA, and to establish it as a 'Primary Method of Measurement' will be discussed. (author)

  9. Bacteria and Archaea in acidic environments and a key to morphological identification

    Science.gov (United States)

    Robbins, E.I.

    2000-01-01

    Natural and anthropogenic acidic environments are dominated by bacteria and Archaea. As many as 86 genera or species have been identified or isolated from pH morphological characteristics, habitat information and a key for light microscope identification for the non-microbiologist.

  10. KDiamend: a package for detecting key drivers in a molecular ecological network of disease.

    Science.gov (United States)

    Lyu, Mengxuan; Chen, Jiaxing; Jiang, Yiqi; Dong, Wei; Fang, Zhou; Li, Shuaicheng

    2018-04-11

    Microbial abundance profiles are applied widely to understand diseases from the aspect of microbial communities. By investigating the abundance associations of species or genes, we can construct molecular ecological networks (MENs). The MENs are often constructed by calculating the Pearson correlation coefficient (PCC) between genes. In this work, we also applied multimodal mutual information (MMI) to construct MENs. The members which drive the concerned MENs are referred to as key drivers. We proposed a novel method to detect the key drivers. First, we partitioned the MEN into subnetworks. Then we identified the most pertinent subnetworks to the disease by measuring the correlation between the abundance pattern and the delegated phenotype-the variable representing the disease phenotypes. Last, for each identified subnetwork, we detected the key driver by PageRank. We developed a package named KDiamend and applied it to the gut and oral microbial data to detect key drivers for Type 2 diabetes (T2D) and Rheumatoid Arthritis (RA). We detected six T2D-relevant subnetworks and three key drivers of them are related to the carbohydrate metabolic process. In addition, we detected nine subnetworks related to RA, a disease caused by compromised immune systems. The extracted subnetworks include InterPro matches (IPRs) concerned with immunoglobulin, Sporulation, biofilm, Flaviviruses, bacteriophage, etc., while the development of biofilms is regarded as one of the drivers of persistent infections. KDiamend is feasible to detect key drivers and offers insights to uncover the development of diseases. The package is freely available at http://www.deepomics.org/pipelines/3DCD6955FEF2E64A/ .

  11. Collaboration is key: The actual experience of disciplines working together in child care.

    Science.gov (United States)

    Garvis, Susanne; Kirkby, Jane; McMahon, Keryn; Meyer, Colleen

    2016-03-01

    Promoting young children's academic and developmental outcomes can no longer be achieved by the single efforts of one profession, but requires professionals to work together in inter-professional teams to understand the complexity of young children's lives. Collaboration in early childhood programs involves health professionals, educators, and other professionals sharing information, validating each other's roles, and providing input around which strategies promote positive outcomes for all children. There are, however, limited studies available within early childhood education on inter-disciplinary relationships between nurses and teachers. This paper helps to fill this void by exploring the relationship of an early childhood teacher and maternal and child health nurse working alongside one another in an Australian kindergarten. Through a narrative approach, a number of characteristics of the relationship were identified as key elements to a productive relationship. Findings are important for health professionals working with early childhood educators. By understanding the complexity within and between disciplines, professionals can work effectively to support young children and their families. © 2015 Wiley Publishing Asia Pty Ltd.

  12. Independent assessment is key to financial well-being.

    Science.gov (United States)

    Karling, J; Pyper, T

    1999-02-01

    Both traditional group practices and IPAs have felt the impact of changes brought about by managed care. Group practices need to ensure that their financial reporting and cost-accounting methods capture information that is key to decision making. An independent assessment of financial procedures helps identify any outstanding issues and maintain financial well-being. This assessment should be conducted at least quarterly so that potential problems can be resolved, income opportunities explored, and cost-saving measures adopted in a timely manner.

  13. HVDC: A key solution in future transmission systems

    Energy Technology Data Exchange (ETDEWEB)

    Heyman, Olof H.; Weimers, Lars; Bohl, Mie-Lotte

    2010-09-15

    With the transition of power grids, based on sustainable generation, HVDC is a key technology with new applications. This includes connection of remote wind parks and strengthening of existing AC grids. In addition, traditional applications, such as bulk hydropower transfer and interconnections between regions, play a major role in our transition to sustainable generation and the associated grids. The technology for regional grids with a limited number of nodes is already in place and commercial projects are commissioned. For extensive grids, development and verification are ongoing in parallel to industry standards being discussed in groups such as ENTSO-E and CIGRE.

  14. The limits on trypanosomatid morphological diversity.

    Directory of Open Access Journals (Sweden)

    Richard John Wheeler

    Full Text Available Cell shape is one, often overlooked, way in which protozoan parasites have adapted to a variety of host and vector environments and directional transmissions between these environments. Consequently, different parasite life cycle stages have characteristic morphologies. Trypanosomatid parasites are an excellent example of this in which large morphological variations between species and life cycle stage occur, despite sharing well-conserved cytoskeletal and membranous structures. Here, using previously published reports in the literature of the morphology of 248 isolates of trypanosomatid species from different hosts, we perform a meta-analysis of the occurrence and limits on morphological diversity of different classes of trypanosomatid morphology (trypomastigote, promastigote, etc. in the vertebrate bloodstream and invertebrate gut environments. We identified several limits on cell body length, cell body width and flagellum length diversity which can be interpreted as biomechanical limits on the capacity of the cell to attain particular dimensions. These limits differed for morphologies with and without a laterally attached flagellum which we suggest represent two morphological superclasses, the 'juxtaform' and 'liberform' superclasses. Further limits were identified consistent with a selective pressure from the mechanical properties of the vertebrate bloodstream environment; trypanosomatid size showed limits relative to host erythrocyte dimensions. This is the first comprehensive analysis of the limits of morphological diversity in any protozoan parasite, revealing the morphogenetic constraints and extrinsic selection pressures associated with the full diversity of trypanosomatid morphology.

  15. Development of key indicators to quantify the health impacts of climate change on Canadians.

    Science.gov (United States)

    Cheng, June J; Berry, Peter

    2013-10-01

    This study aimed at developing a list of key human health indicators for quantifying the health impacts of climate change in Canada. A literature review was conducted in OVID Medline to identify health morbidity and mortality indicators currently used to quantify climate change impacts. Public health frameworks and other studies of climate change indicators were reviewed to identify criteria with which to evaluate the list of proposed key indicators and a rating scale was developed. Total scores for each indicator were calculated based on the rating scale. A total of 77 health indicators were identified from the literature. After evaluation using the chosen criteria, 8 indicators were identified as the best for use. They include excess daily all-cause mortality due to heat, premature deaths due to air pollution (ozone and particulate matter 2.5), preventable deaths from climate change, disability-adjusted life years lost from climate change, daily all-cause mortality, daily non-accidental mortality, West Nile Disease incidence, and Lyme borreliosis incidence. There is need for further data and research related to health effect quantification in the area of climate change.

  16. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  17. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  18. Reactor Pressure Vessel P-T Limit Curve Round Robin

    Energy Technology Data Exchange (ETDEWEB)

    Jang, C.H.; Moon, H.R.; Jeong, I.S. [Korea Electric Power Research Institute, Taejon (Korea)

    2002-07-01

    This report is the summary of the analysis results for the P-T Limit Curve construction which have been subjected to the round robin analysis. The purpose of the round robin is to compare the procedure and method used in various organizations to construct P-T limit curve to prevent brittle fracture of reactor pressure vessel of nuclear power plants. Each Participant used its own approach to construct the P-T limit curve and submitted the results, By analyzing the results, the reference procedure for the P-T limit curve could be established. This report include the results of the comparison of the procedure and method used by the participants, and sensitivity study of the key parameters. (author) 23 refs, 88 figs, 17 tabs.

  19. The Limits of Exercise Physiology: From Performance to Health.

    Science.gov (United States)

    Gabriel, Brendan M; Zierath, Juleen R

    2017-05-02

    Many of the established positive health benefits of exercise have been documented by historical discoveries in the field of exercise physiology. These investigations often assess limits: the limits of performance, or the limits of exercise-induced health benefits. Indeed, several key findings have been informed by studying highly trained athletes, in addition to healthy or unhealthy people. Recent progress has been made in regard to skeletal muscle metabolism and personalized exercise regimes. In this perspective, we review some of the historical milestones of exercise physiology, discuss how these inform contemporary knowledge, and speculate on future questions. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Research on key techniques in portable XRF analyzers

    International Nuclear Information System (INIS)

    Li Guodong; Jia Wenyi; Zhou Rongsheng; Tang Hong

    1999-01-01

    Focused on the problems of low sensitivity, poor detection limits, small number of determined elements and poor ability of matrix effect correction of the current field-portable X-ray fluorescence (XRF) analyzers, research work on key units of excitation source, detector, measurement circuit and microcomputerization is carried out. A miniature, low power X-ray tube excitation source is developed. A low dissipative 1024 channel analyzer, fitting to high resolution detectors, is prepared. Microcomputerization based on a notebook computer is realized. On the basis, a field, highly sensitive XRF system is constituted. With this system, multielements can be determined with the detection limits of less than 20 μg/g for the elements with medium or lower atomic numbers, one order of magnitude or more lower than those of the current portable XRF analyzers. The capabilities for matrix effect correction and data processing are enhanced. This system gets rid of radionuclide sources, making its use and carry safe and convenient

  1. Central-line-associated bloodstream infections in a resource-limited ...

    African Journals Online (AJOL)

    ... that reported from resource-limited settings, but exceeds that of high-income countries. Prolonged NICU stay and central-line insertion in the operating theatre were important risk factors for CLABSI development. Intensified neonatal staff training regarding CLABSI maintenance bundle elements and hand hygiene are key ...

  2. Key acceptability attributes of orodispersible films.

    Science.gov (United States)

    Scarpa, Mariagiovanna; Paudel, Amrit; Kloprogge, Frank; Hsiao, Wen Kai; Bresciani, Massimo; Gaisford, Simon; Orlu, Mine

    2018-04-01

    The features rendering orodispersible films (ODFs) patient-centric formulations are widely discussed in the scientific literature. However there is a lack of research studies exploring ODF characteristics with a potential impact on end-user acceptability. The aim of this study was to identify the key ODF characteristics affecting end-user acceptability by developing in vitro test methods for the prediction of ODFs acceptability and correlate these formulation characteristics with the data obtained from a human panel study. Four drug-free single-polymer films were prepared by solvent casting. Solutions of poly(vinyl) alcohol (PVOH) 39 KDa (P1), PVOH 197 KDa (P2), carboxymethylcellulose (CMC) 395 KDa (C1), and CMC 725 KDa (C2) were prepared. Texture analysis and Dynamic Mechanical Analysis (DMA) were used to assess film tack. Petri dish and drop methods were used to assess disintegration time. A human panel of 24 healthy young adults was employed to identify end-user acceptability criteria of the four study film samples. Texture analysis data of ODF tack were not found to be in agreement with the in vivo perceived stickiness in the mouth. However, measurement of the area under the adhesive force curve obtained by DMA correlated with in vivo perceived stickiness data for all samples. The disintegration times obtained by drop method were more comparable to human panel data than the petri dish method. Hence DMA and drop methods proved to be promising methodologies for the prediction of the end-user acceptability. The type and molecular weight of the film-forming polymer had a strong influence on stickiness perception, whereas only polymeric molecular weight influenced perceived disintegration time. The human panel study showed that Participant Reported Outcomes (PROs) for the perceived stickiness in the mouth and disintegration time of test films received significantly different scores between samples, and thus were identified as the key attributes with the

  3. Mining key elements for severe convection prediction based on CNN

    Science.gov (United States)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with

  4. Preserving Privacy by De-identifying Facial Images

    National Research Council Canada - National Science Library

    Newton, Elaine; Sweeney, Latanya; Malin, Bradley

    2003-01-01

    .... A trivial solution to de-identifying faces involves blacking out each face. This thwarts any possible face recognition, but because all facial details are obscured, the result is of limited use...

  5. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  6. Strategies for Supporting Physician-Scientists in Faculty Roles: A Narrative Review With Key Informant Consultations.

    Science.gov (United States)

    Lingard, Lorelei; Zhang, Peter; Strong, Michael; Steele, Margaret; Yoo, John; Lewis, James

    2017-10-01

    Physician-scientists are a population in decline globally. Solutions to reverse this decline often have focused on the training pipeline. Less attention has been paid to reducing attrition post training, when physician-scientists take up faculty roles. However, this period is a known time of vulnerability because of the pressures of clinical duties and the long timeline to securing independent research funding. This narrative review explored existing knowledge regarding how best to support physician-scientists for success in their faculty roles. The authors searched the Medline, Embase, ERIC, and Cochrane Library databases for articles published from 2000 to 2016 on this topic and interviewed key informants in 2015 to solicit their input on the review results. The authors reviewed 78 articles and interviewed 16 key informants. From the literature, they developed a framework of organizational (facilitate mentorship, foster community, value the physician-scientist role, minimize financial barriers) and individual (develop professional and research skills) strategies for supporting physician-scientists. They also outlined key knowledge gaps representing topics either rarely or never addressed in the reviewed articles (percent research time, structural hypocrisy, objective assessment, group metrics, professional identity). The key informants confirmed the identified strategies and discussed how the gaps were particularly important and impactful. This framework offers a basis for assessing an organization's existing support strategies, identifying outstanding needs, and developing targeted programming. The identified gaps require attention, as they threaten to undermine the benefits of existing support strategies.

  7. Identifying motivational factors within a multinational company

    Directory of Open Access Journals (Sweden)

    Daniela Bradutanu

    2011-08-01

    Full Text Available The aim of the study is to identify the main motivational factors within a multinational company. The first objective is to identify work functions, formulated on Abraham Maslow’s pyramid, following the identification of the key characteristics that motivate an employee at the work place and last, but not least, the type of motivation that employees focus, intrinsic or extrinsic. The research method targeted a questionnaire based survey, including various company employees and an interview with the manager. The results confirmed that in Romania, employees put great emphasis on extrinsic motivation, a certain income and job security being primary. These results have implications for managers that in order to effectively motivate staff, first, must know their needs and expectations. To identify the main needs and motivational factors we had as a starting point Maslow's pyramid.

  8. Identifying barriers to chronic disease reporting in Chicago Public Schools: a mixed-methods approach.

    Science.gov (United States)

    Rivkina, Victoria; Tapke, David E; Cardenas, Lilliana D; Harvey-Gintoft, Blair; Whyte, Stephanie A; Gupta, Ruchi S

    2014-12-06

    Chronic disease among school-aged children is a public health concern, particularly for asthma and food allergy. In Chicago Public Schools (CPS), rates of asthma and food allergy among students are underreported. The aim of this study was to determine the barriers to chronic disease reporting as experienced by CPS parents and school nurses. A mixed-methods approach included focus groups and key informant interviews with parents and school nurses, and a cross-sectional survey was completed by parents. Qualitative data analysis was performed and survey data were analyzed to determine the significant demographic and knowledge variables associated with successfully completing the reporting process. The three main barriers identified were 1) a lack of parental process knowledge; 2) limited communication from schools; and 3) insufficient availability of school nurses. Parents were significantly more likely to successfully complete the reporting process if they knew about special accommodations for chronic diseases, understood the need for physician verification, and/or knew the school nurse. These findings suggest that increasing parental knowledge of the reporting process will allow schools to better identify and manage their students' chronic conditions. A parent-focused intervention informed by these results has been completed.

  9. RNA sequencing of Populus x canadensis roots identifies key molecular mechanisms underlying physiological adaption to excess zinc.

    Directory of Open Access Journals (Sweden)

    Andrea Ariani

    Full Text Available Populus x canadensis clone I-214 exhibits a general indicator phenotype in response to excess Zn, and a higher metal uptake in roots than in shoots with a reduced translocation to aerial parts under hydroponic conditions. This physiological adaptation seems mainly regulated by roots, although the molecular mechanisms that underlie these processes are still poorly understood. Here, differential expression analysis using RNA-sequencing technology was used to identify the molecular mechanisms involved in the response to excess Zn in root. In order to maximize specificity of detection of differentially expressed (DE genes, we consider the intersection of genes identified by three distinct statistical approaches (61 up- and 19 down-regulated and validate them by RT-qPCR, yielding an agreement of 93% between the two experimental techniques. Gene Ontology (GO terms related to oxidation-reduction processes, transport and cellular iron ion homeostasis were enriched among DE genes, highlighting the importance of metal homeostasis in adaptation to excess Zn by P. x canadensis clone I-214. We identified the up-regulation of two Populus metal transporters (ZIP2 and NRAMP1 probably involved in metal uptake, and the down-regulation of a NAS4 gene involved in metal translocation. We identified also four Fe-homeostasis transcription factors (two bHLH38 genes, FIT and BTS that were differentially expressed, probably for reducing Zn-induced Fe-deficiency. In particular, we suggest that the down-regulation of FIT transcription factor could be a mechanism to cope with Zn-induced Fe-deficiency in Populus. These results provide insight into the molecular mechanisms involved in adaption to excess Zn in Populus spp., but could also constitute a starting point for the identification and characterization of molecular markers or biotechnological targets for possible improvement of phytoremediation performances of poplar trees.

  10. Authenticated Diffie-Hellman Key Agreement Scheme that Protects Client Anonymity and Achieves Half-Forward Secrecy

    Directory of Open Access Journals (Sweden)

    Hung-Yu Chien

    2015-01-01

    Full Text Available Authenticated Diffie-Hellman key agreement (D-H key is the de facto building block for establishing secure session keys in many security systems. Regarding the computations of authenticated D-H key agreement, the operation of modular exponentiation is the most expensive computation, which incurs a heavy loading on those clients where either their computational capacities or their batteries are limited and precious. As client’s privacy is a big concern in several e-commerce applications, it is desirable to extend authenticated D-H key agreement to protect client’s identity privacy. This paper proposes a new problem: the modified elliptic curves computational Diffie-Hellman problem (MECDHP and proves that the MECDHP is as hard as the conventional elliptic curves computational Diffie-Hellman problem (ECDHP. Based on the MECDHP, we propose an authenticated D-H key agreement scheme which greatly improves client computational efficiency and protects client’s anonymity from outsiders. This new scheme is attractive to those applications where the clients need identity protection and lightweight computation.

  11. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  12. Key principles for a national clinical decision support knowledge sharing framework: synthesis of insights from leading subject matter experts.

    Science.gov (United States)

    Kawamoto, Kensaku; Hongsermeier, Tonya; Wright, Adam; Lewis, Janet; Bell, Douglas S; Middleton, Blackford

    2013-01-01

    To identify key principles for establishing a national clinical decision support (CDS) knowledge sharing framework. As part of an initiative by the US Office of the National Coordinator for Health IT (ONC) to establish a framework for national CDS knowledge sharing, key stakeholders were identified. Stakeholders' viewpoints were obtained through surveys and in-depth interviews, and findings and relevant insights were summarized. Based on these insights, key principles were formulated for establishing a national CDS knowledge sharing framework. Nineteen key stakeholders were recruited, including six executives from electronic health record system vendors, seven executives from knowledge content producers, three executives from healthcare provider organizations, and three additional experts in clinical informatics. Based on these stakeholders' insights, five key principles were identified for effectively sharing CDS knowledge nationally. These principles are (1) prioritize and support the creation and maintenance of a national CDS knowledge sharing framework; (2) facilitate the development of high-value content and tooling, preferably in an open-source manner; (3) accelerate the development or licensing of required, pragmatic standards; (4) acknowledge and address medicolegal liability concerns; and (5) establish a self-sustaining business model. Based on the principles identified, a roadmap for national CDS knowledge sharing was developed through the ONC's Advancing CDS initiative. The study findings may serve as a useful guide for ongoing activities by the ONC and others to establish a national framework for sharing CDS knowledge and improving clinical care.

  13. Engagement in the HIV Care Continuum among Key Populations in Tijuana, Mexico.

    Science.gov (United States)

    Smith, Laramie R; Patterson, Thomas L; Magis-Rodriguez, Carlos; Ojeda, Victoria D; Burgos, Jose Luis; Rojas, Sarah A; Zúñiga, María Luisa; Strathdee, Steffanie A

    2016-05-01

    In Tijuana, Mexico, HIV is concentrated in sub-epidemics of key populations: persons who inject drugs (PWID), sex workers (SW), and men who have sex with men (MSM). To date, data on engagement in the HIV care continuum among these key populations, particularly in resource-constrained settings, are sparse. We pooled available epidemiological data from six studies (N = 3368) to examine HIV testing and treatment uptake in these key populations; finding an overall HIV prevalence of 5.7 %. Of the 191 identified HIV-positive persons, only 11.5 % knew their HIV-positive status and 3.7 % were on ART. Observed differences between these HIV-positive key populations suggest PWID (vs. non-PWID) were least likely to have previously tested or initiate HIV care. MSM (vs. non-MSM) were more likely to have previously tested but not more likely to know their HIV-positive status. Of persons aware of their HIV-positive status, SW (vs. non-SW) were more likely to initiate HIV care. Findings suggest engagement of key populations in HIV treatment is far below estimates observed for similarly resource-constrained generalized epidemics in sub-Saharan Africa. These data provide one of the first empirical-snapshots highlighting the extent of HIV treatment disparities in key populations.

  14. Community Advisory Boards Guiding Engaged Research Efforts within a Clinical Translational Sciences Award: Key Contextual Factors Explored.

    Science.gov (United States)

    Halladay, Jacqueline R; Donahue, Katrina E; Sleath, Betsy; Reuland, Dan; Black, Adina; Mitchell, C Madeline; Breland, Carol E; Coyne-Beasley, Tamera; Mottus, Kathleen; Watson, Sable Noelle; Lewis, Virginia; Wynn, Mysha; Corbie-Smith, Giselle

    2017-01-01

    Engaging stakeholders in research carries the promise of enhancing the research relevance, transparency, and speed of getting findings into practice. By describing the context and functional aspects of stakeholder groups, like those working as community advisory boards (CABs), others can learn from these experiences and operationalize their own CABs. Our objective is to describe our experiences with diverse CABs affiliated with our community engagement group within our institution's Clinical Translational Sciences Award (CTSA). We identify key contextual elements that are important to administering CABs. A group of investigators, staff, and community members engaged in a 6-month collaboration to describe their experiences of working with six research CABs. We identified the key contextual domains that illustrate how CABS are developed and sustained. Two lead authors, with experience with CABs and identifying contextual domains in other work, led a team of 13 through the process. Additionally, we devised a list of key tips to consider when devising CABs. The final domains include (1) aligned missions among stakeholders (2) resources/support, (3) defined operational processes/shared power, (4) well-described member roles, and (5) understanding and mitigating challenges. The tips are a set of actions that support the domains. Identifying key contextual domains was relatively easy, despite differences in the respective CAB's condition of focus, overall mission, or patient demographics represented. By contextualizing these five domains, other research and community partners can take an informed approach to move forward with CAB planning and engaged research.

  15. Calculation of the detection limits for radionuclides identified in gamma-ray spectra based on post-processing peak analysis results.

    Science.gov (United States)

    Korun, M; Vodenik, B; Zorko, B

    2018-03-01

    A new method for calculating the detection limits of gamma-ray spectrometry measurements is presented. The method is applicable for gamma-ray emitters, irrespective of the influences of the peaked background, the origin of the background and the overlap with other peaks. It offers the opportunity for multi-gamma-ray emitters to calculate the common detection limit, corresponding to more peaks. The detection limit is calculated by approximating the dependence of the uncertainty in the indication on its value with a second-order polynomial. In this approach the relation between the input quantities and the detection limit are described by an explicit expression and can be easy investigated. The detection limit is calculated from the data usually provided by the reports of peak-analyzing programs: the peak areas and their uncertainties. As a result, the need to use individual channel contents for calculating the detection limit is bypassed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. How cannabis causes paranoia: using the intravenous administration of ∆9-tetrahydrocannabinol (THC) to identify key cognitive mechanisms leading to paranoia.

    Science.gov (United States)

    Freeman, Daniel; Dunn, Graham; Murray, Robin M; Evans, Nicole; Lister, Rachel; Antley, Angus; Slater, Mel; Godlewska, Beata; Cornish, Robert; Williams, Jonathan; Di Simplicio, Martina; Igoumenou, Artemis; Brenneisen, Rudolf; Tunbridge, Elizabeth M; Harrison, Paul J; Harmer, Catherine J; Cowen, Philip; Morrison, Paul D

    2015-03-01

    Paranoia is receiving increasing attention in its own right, since it is a central experience of psychotic disorders and a marker of the health of a society. Paranoia is associated with use of the most commonly taken illicit drug, cannabis. The objective was to determine whether the principal psychoactive ingredient of cannabis-∆(9)-tetrahydrocannabinol (THC)-causes paranoia and to use the drug as a probe to identify key cognitive mechanisms underlying paranoia. A randomized, placebo-controlled, between-groups test of the effects of intravenous THC was conducted. A total of 121 individuals with paranoid ideation were randomized to receive placebo, THC, or THC preceded by a cognitive awareness condition. Paranoia was assessed extensively via a real social situation, an immersive virtual reality experiment, and standard self-report and interviewer measures. Putative causal factors were assessed. Principal components analysis was used to create a composite paranoia score and composite causal variables to be tested in a mediation analysis. THC significantly increased paranoia, negative affect (anxiety, worry, depression, negative thoughts about the self), and a range of anomalous experiences, and reduced working memory capacity. The increase in negative affect and in anomalous experiences fully accounted for the increase in paranoia. Working memory changes did not lead to paranoia. Making participants aware of the effects of THC had little impact. In this largest study of intravenous THC, it was definitively demonstrated that the drug triggers paranoid thoughts in vulnerable individuals. The most likely mechanism of action causing paranoia was the generation of negative affect and anomalous experiences. © The Author 2014. Published by Oxford University Press on behalf of the Maryland Psychiatric Research Center.

  17. Identifying key topics for a description of sexual behavior among Danish adolescents: A qualitative study

    DEFF Research Database (Denmark)

    Jørgensen, Marianne Johansson; Maindal, Helle Terkildsen; Olesen, Frede

    . Results: Four major categories of risk behavior were identified: Alcohol consumption is associated with “no condom use”, Nights on the town and meetings in foreign counties or at festivals are associated with one night stands and often lead to unsafe sex, Low self-esteem increases the risk of pushing one...... one Danish Folk High School, but with different social and educational backgrounds. The interview guide was developed from literature reviews and hypotheses based on years of experience with sexually transmitted infections. Data were transcribed verbatim and analyzed using qualitative description...

  18. A social capital framework for palliative care: supporting health and well-being for people with life-limiting illness and their carers through social relations and networks.

    Science.gov (United States)

    Lewis, Joanne M; DiGiacomo, Michelle; Luckett, Tim; Davidson, Patricia M; Currow, David C

    2013-01-01

    Social relations and networks are vital for sustaining and enhancing end-of-life care. The social capital concept supports a framework to understand the association between social relations and well-being; yet, to date, there has been very limited investigation of social capital in the palliative care literature. A framework for understanding social contexts in end-of-life care is necessary. To summarize the literature on social capital, well-being, and quality of life for key outcomes to inform a model of social capital in palliative care. The electronic databases MEDLINE (1997 to March 2011), Embase (1997 to March 2011), CINAHL (1997 to March 2011), and PsycINFO (1997 to March 2011) were searched using key/MeSH search terms of "social capital," "palliative care," and "well-being" and/or "quality of life." The literature was reviewed to identify key concepts to develop and inform a palliative care social capital framework. A total of 93 articles were included in the literature review, with only two articles identifying discourse on social capital and palliative care. Four key areas integrating the social capital outcomes informed a framework for palliative care. The social capital concept provides a structure for understanding how the organization and meaning of social contexts can potentially enhance or hinder end-of-life care. Research that identifies specificity in application of social capital concepts is fundamental to issues of access to services, sustaining levels of care, quality of life, and well-being. The importance of "bridged" social capital relations and networks for improved resource acquisition and information flow was identified in the literature and outlined within the palliative care social capital framework. Differential access to social capital by disadvantaged groups provides further impetus to engage a model of social capital for palliative care. Copyright © 2013 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights

  19. [Key to chironomid pupal exuviae (Diptera: Chironomidae) of tropical high Andean streams].

    Science.gov (United States)

    Pratt, Narcís; González-Trujillo, Juan David; Ospina-Torres, Rodulfo

    2014-12-01

    The Chironomidae is a cosmopolitan family of Nematoceran flies with more than 20,000 species described. However the diversity of genera and species of the family in the Andean region beyond the 2,000 m.a.s.l are scarcely known. We conducted faunal surveys and biomonitoring research in different streams of Colombia, Ecuador and Peru from May 2005 to October 2011. Based on specimens collections, a taxonomic key was developed to identify pupae and pupal exuviae of 46 genera of midges (Diptera, Chironomidae) collected from streams at high altitude areas on the Andean tropical mountains. We included illustrations and brief taxonomic descriptions for all genera, of which several ones have not yet been formally described; in this latter case we used the nomenclature of Roback & Coffman (1983). For two genera, Cricotopus and Genus 1, keys to the most com- mon morphospecies were provided. Results showed that in this area the chironomid assemblages are dominated by the members of the subfamily Orthocladiinae (22 genera) followed by the Chironominae (13). Six genera of Tanypodinae were identified, while only three and two genera were present from subfamilies Podonominae and Diamesinae. This key may be very useful for both studies about drift in streams, and for biomonitoring purposes.

  20. Key Challenges and Opportunities Associated with the Use of In Vitro Models to Detect Human DILI: Integrated Risk Assessment and Mitigation Plans

    Directory of Open Access Journals (Sweden)

    Franck A. Atienzar

    2016-01-01

    Full Text Available Drug-induced liver injury (DILI is a major cause of late-stage clinical drug attrition, market withdrawal, black-box warnings, and acute liver failure. Consequently, it has been an area of focus for toxicologists and clinicians for several decades. In spite of considerable efforts, limited improvements in DILI prediction have been made and efforts to improve existing preclinical models or develop new test systems remain a high priority. While prediction of intrinsic DILI has improved, identifying compounds with a risk for idiosyncratic DILI (iDILI remains extremely challenging because of the lack of a clear mechanistic understanding and the multifactorial pathogenesis of idiosyncratic drug reactions. Well-defined clinical diagnostic criteria and risk factors are also missing. This paper summarizes key data interpretation challenges, practical considerations, model limitations, and the need for an integrated risk assessment. As demonstrated through selected initiatives to address other types of toxicities, opportunities exist however for improvement, especially through better concerted efforts at harmonization of current, emerging and novel in vitro systems or through the establishment of strategies for implementation of preclinical DILI models across the pharmaceutical industry. Perspectives on the incorporation of newer technologies and the value of precompetitive consortia to identify useful practices are also discussed.

  1. A QUICK KEY TO THE SUBFAMILIES AND GENERA OF ANTS OF THE SAVANNAH RIVER SITE, AIKEN, SC

    Energy Technology Data Exchange (ETDEWEB)

    Martin, D

    2006-10-04

    This taxonomic key was devised to support development of a Rapid Bioassessment Protocol using ants at the Savannah River Site. The emphasis is on ''rapid'' and, because the available keys contained a large number of genera not known to occur at the Savannah River Site, we found that the available keys were unwieldy. Because these keys contained more genera than we would likely encounter and because this larger number of genera required both more couplets in the key and often required examination of characters that are difficult to assess without higher magnifications (60X or higher) more time was required to process samples. In developing this set of keys I recognize that the character sets used may lead to some errors but I believe that the error rate will be small and, for the purpose of rapid bioassessment, this error rate will be acceptable provided that overall sample sizes are adequate. Oliver and Beattie (1996a, 1996b) found that for rapid assessment of biodiversity the same results were found when identifications were done to morphospecies by people with minimal expertise as when the same data sets were identified by subject matter experts. Basset et al. (2004) concluded that it was not as important to correctly identify all species as it was to be sure that the study included as many functional groups as possible. If your study requires high levels of accuracy, it is highly recommended that when you key out a specimen and have any doubts concerning the identification, you should refer to keys in Bolton (1994) or to the other keys used to develop this area specific taxonomic key.

  2. Key issues in human resource planning for home support workers in Canada.

    Science.gov (United States)

    Keefe, Janice M; Knight, Lucy; Martin-Matthews, Anne; Légaré, Jacques

    2011-01-01

    This paper is a synthesis of research on recruitment and retention challenges for home support workers (HSWs) in Canada. Home support workers (HSWs) provide needed support with personal care and daily activities to older persons living in the community. Literature (peer reviewed, government, and non-government documents) published in the past decade was collected from systematic data base searches between January and September 2009, and yielded over 100 references relevant to home care human resources for older Canadians. Four key human resource issues affecting HSWs were identified: compensation, education and training, quality assurance, and working conditions. To increase the workforce and retain skilled employees, employers can tailor their marketing strategies to specific groups, make improvements in work environment, and learn about what workers value and what attracts them to home support work. Understanding these HR issues for HSWs will improve recruitment and retention strategies for this workforce by helping agencies to target their limited resources. Given the projected increase in demand for these workers, preparations need to begin now and consider long-term strategies involving multiple policy areas, such as health and social care, employment, education, and immigration.

  3. Drug quality in South Africa: perceptions of key players involved in medicines distribution.

    Science.gov (United States)

    Patel, Aarti; Norris, Pauline; Gauld, Robin; Rades, Thomas

    2009-01-01

    Substandard medicines contribute to poor public health and affect development, especially in the developing world. However knowledge of how manufacturers, distributors and providers understand the concept of drug quality and what strategies they adopt to ensure drug quality is limited, particularly in the developing world. The purpose of this paper is to explore pharmaceutical manufacturers', distributors' and providers' perceptions of drug quality in South Africa and how they ensure the quality of drugs during the distribution process. The approach taken was qualitative data collection through key informant interviews using a semi-structured interview guide. Transcripts were analysed thematically in Johannesburg, Pretoria and Durban, South Africa. Participants were recruited purposefully from a South African pharmaceutical manufacturer, SA subsidiaries of international manufacturers, national distribution companies, national wholesaler, public and private sector pharmacists, and a dispensing doctor. In total, ten interviews were conducted. Participants described drug quality in terms of the product and the processes involved in manufacturing and handling the product. Participants identified purchasing registered medicines from licensed suppliers, use of standard operating procedures, and audits between manufacturer and distributor and/or provider as key strategies employed to protect medicine quality. Effective communication amongst all stakeholders, especially in terms of providing feedback regarding complaints about medicine quality, appears as a potential area of concern, which would benefit from further research. The paper hightlights that ensuring medicine quality should be a shared responsibility amongst all involved in the distribution process to prevent medicines moving from one distribution system (public) into another (private).

  4. Identification of the key factors for success in the hotel sector

    Directory of Open Access Journals (Sweden)

    Fernando Campa-Planas

    2018-02-01

    Design/methodology: A review of the literature has been carried out, which has provided references related to the hotel sector and different factors that impact it. The knowledge provided by the scientific community through the articles and texts consulted are reflected in this document and allow us to determine the existence of the key factors for success.  Contributions/results: Considering the importance of the hotel sector in the Spanish economy, this study identifies the key factors in the different hotel establishments. However, the materialization of these factors provides and shows us which financial aspects, management systems and other more global aspects, such as longevity or location, enable the company to be successful in the hotel sector.  Originality/value: Based on the literature reviewed, a list of key factors for success in the hotel sector was composed. This also revealed a lack of similar studies on this topic.

  5. Thermochemistry: the key to minerals separation from biomass for fuel use in high performance systems

    Energy Technology Data Exchange (ETDEWEB)

    Overend, R P [National Renewable Energy Laboratory, Golden, CO (United States)

    1997-12-31

    Biomass use in high efficiency thermal electricity generation is limited not by the properties of the organic component of biomass, but by the behavior of the associated mineral matter at high temperatures. On a moisture and ash free basis biomass, which has an average formula of CH{sub 1.4}O{sub 0.6}N{sub 0.1}, has a relatively low heating value of 18.6 GJ/t. However, this would not limit its use in high efficiency combustion systems because adequate high temperatures could be reached to achieve high carnot cycle efficiencies. These high temperatures cannot be reached because of the fouling and slagging propensities of the minerals in biomass. The mineral composition is a function of soils and the growth habit of the biomass, however, the most important element is potassium, which either alone or in combinating with silica forms the basis of fouling and slagging behaviors. Growing plants selectively concentrate potassium in their cells, which along with nitrogen and phosphorus are the key macronutrients for plant growth. Annual plants tend to have very high potassium contents, although wood biomass exclusive of the living cambial layer (i.e. minus the bark, small branches, and leaves) has minimal potassium content and other nutrients. Under combustion conditions the potassium is mobilized, especially in the presence of chlorine, at relative low temperatures and fouls heat transfer surfaces and corrodes high performance metals used, for example, in the high temperature sections of burners and gas turbines. Recent work has demonstrated the phenomenology of ash fouling, mainly by the potassium component of biomass, as well as identifying the key species such as KOH, KCl, and sulphates that are involved in potassium transport at temperatures <800 deg C. Techniques that separate the mineral matter from the fuel components (carbon and hydrogen) at low temperatures reduce or limit the alkali metal transport phenomena and result in very high efficiency combustion

  6. Thermochemistry: the key to minerals separation from biomass for fuel use in high performance systems

    Energy Technology Data Exchange (ETDEWEB)

    Overend, R.P. [National Renewable Energy Laboratory, Golden, CO (United States)

    1996-12-31

    Biomass use in high efficiency thermal electricity generation is limited not by the properties of the organic component of biomass, but by the behavior of the associated mineral matter at high temperatures. On a moisture and ash free basis biomass, which has an average formula of CH{sub 1.4}O{sub 0.6}N{sub 0.1}, has a relatively low heating value of 18.6 GJ/t. However, this would not limit its use in high efficiency combustion systems because adequate high temperatures could be reached to achieve high carnot cycle efficiencies. These high temperatures cannot be reached because of the fouling and slagging propensities of the minerals in biomass. The mineral composition is a function of soils and the growth habit of the biomass, however, the most important element is potassium, which either alone or in combinating with silica forms the basis of fouling and slagging behaviors. Growing plants selectively concentrate potassium in their cells, which along with nitrogen and phosphorus are the key macronutrients for plant growth. Annual plants tend to have very high potassium contents, although wood biomass exclusive of the living cambial layer (i.e. minus the bark, small branches, and leaves) has minimal potassium content and other nutrients. Under combustion conditions the potassium is mobilized, especially in the presence of chlorine, at relative low temperatures and fouls heat transfer surfaces and corrodes high performance metals used, for example, in the high temperature sections of burners and gas turbines. Recent work has demonstrated the phenomenology of ash fouling, mainly by the potassium component of biomass, as well as identifying the key species such as KOH, KCl, and sulphates that are involved in potassium transport at temperatures <800 deg C. Techniques that separate the mineral matter from the fuel components (carbon and hydrogen) at low temperatures reduce or limit the alkali metal transport phenomena and result in very high efficiency combustion

  7. Elucidating Key Motifs Required for Arp2/3-Dependent and Independent Actin Nucleation by Las17/WASP

    Science.gov (United States)

    Urbanek, Agnieszka N.; Smaczynska-de Rooij, Iwona I.

    2016-01-01

    Actin nucleation is the key rate limiting step in the process of actin polymerization, and tight regulation of this process is critical to ensure actin filaments form only at specific times and at defined regions of the cell. Arp2/3 is a well-characterised protein complex that can promote nucleation of new filaments, though its activity requires additional nucleation promotion factors (NPFs). The best recognized of these factors are the WASP family of proteins that contain binding motifs for both monomeric actin and for Arp2/3. Previously we demonstrated that the yeast WASP homologue, Las17, in addition to activating Arp2/3 can also nucleate actin filaments de novo, independently of Arp2/3. This activity is dependent on its polyproline rich region. Through biochemical and in vivo analysis we have now identified key motifs within the polyproline region that are required for nucleation and elongation of actin filaments, and have addressed the role of the WH2 domain in the context of actin nucleation without Arp2/3. We have also demonstrated that full length Las17 is able to bind liposomes giving rise to the possibility of direct linkage of nascent actin filaments to specific membrane sites to which Las17 has been recruited. Overall, we propose that Las17 functions as the key initiator of de novo actin filament formation at endocytic sites by nucleating, elongating and tethering nascent filaments which then serve as a platform for Arp2/3 recruitment and function. PMID:27637067

  8. Limitations on blanket performance

    International Nuclear Information System (INIS)

    Malang, S.

    1999-01-01

    The limitations on the performance of breeding blankets in a fusion power plant are evaluated. The breeding blankets will be key components of a plant and their limitations with regard to power density, thermal efficiency and lifetime could determine to a large degree the attractiveness of a power plant. The performance of two rather well known blanket concepts under development in the frame of the European Blanket Programme is assessed and their limitations are compared with more advanced (and more speculative) concepts. An important issue is the question of which material (structure, breeder, multiplier, coatings) will limit the performance and what improvement would be possible with a 'better' structural material. This evaluation is based on the premise that the performance of the power plant will be limited by the blankets (including first wall) and not by other components, e.g. divertors, or the plasma itself. However, the justness of this premise remains to be seen. It is shown that the different blanket concepts cover a large range of allowable power densities and achievable thermal efficiencies, and it is concluded that there is a high incentive to go for better performance in spite of possibly higher blanket cost. However, such high performance blankets are usually based on materials and technologies not yet developed and there is a rather high risk that the development could fail. Therefore, it is explained that a part of the development effort should be devoted to concepts where the materials and technologies are more or less in hand in order to ensure that blankets for a DEMO reactor can be developed and tested in a given time frame. (orig.)

  9. Key indicators for the monitoring and evaluation of control programmes of human African trypanosomiasis due to Trypanosoma brucei gambiense.

    Science.gov (United States)

    Bouchet, B; Legros, D; Lee, E

    1998-06-01

    Very little research has been devoted to the design of epidemiological tools for the monitoring and evaluation of National Human African Trypanosomiasis (HAT) Control Programmes and daily management decisions are made in the absence of accurate knowledge of the situation. This paper identifies key indicators necessary to make decisions in the field and constantly adjust control activities to changing situations. Examples are derived from the Médecins Sans Frontières (MSF) HAT Control Programme in Adjumani, Uganda. Based on the principles of quality assurance, the focus is placed on process indicators. A conceptual framework derived from a system view/planning cycle perspective is also described for the construction of indicators. Finally, some specific challenging aspects of the epidemiology of HAT are presented and the limitations of the interpretation of the indicators discussed.

  10. Spotter's Guide for Identifying and Reporting Severe Local Storms.

    Science.gov (United States)

    National Oceanic and Atmospheric Administration (DOC), Rockville, MD.

    This guide is designed to assist personnel working in the National Weather Service's Severe Local Storm Spotter Networks in identifying and reporting severe local storms. Provided are pictures of cloud types for severe storms including tornadoes, hail, thunder, lightning, heavy rains, and waterspouts. Instructions for key indications to watch for…

  11. The changing model of big pharma: impact of key trends.

    Science.gov (United States)

    Gautam, Ajay; Pan, Xiaogang

    2016-03-01

    Recent years have seen exciting breakthroughs in biomedical sciences that are producing truly novel therapeutics for unmet patient needs. However, the pharmaceutical industry is also facing significant barriers in the form of pricing and reimbursement, continued patent expirations and challenging market dynamics. In this article, we have analyzed data from the 1995-2015 period, on key aspects such as revenue distribution, research units, portfolio mix and emerging markets to identify four key trends that help to understand the change in strategic focus, realignment of R&D footprint, the shift from primary care toward specialty drugs and biologics and the growth of emerging markets as major revenue drivers for big pharma. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  12. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  13. Identifying Key Factors Relevant for Base Camp Siting

    Science.gov (United States)

    2017-12-01

    centers. 3.2.6.3 Religious and historical sites Respecting sacred sites helps build rapport with the host nation. 3.2.6.4 Local infrastructure...churches, mosques, national libraries, hospitals, cemeteries, historical ruins, religious sites, cultural areas, and other protected sites...controlled and protected wells. • Electricity: town engineer • Academic: government and religious leaders • Trash: private business (local

  14. Identifying depression among adolescents using three key questions

    DEFF Research Database (Denmark)

    Haugen, Wenche; Haavet, Ole Rikard; Sirpal, Manjit Kaur

    2016-01-01

    Depression rammer mange voksne mennesker. Dette studie, som er omtalt i BMJ, viser, at et spørgeskema med blot tre spørgsmål ret præcist kan identificere voksne med depression. Undersøgelsen viser også, at de samme spørgsmål med fordel kan stilles verbalt ved diagnosticering af depression hos unge...... mennesker. Studiet ledsages af en redaktionel kommentar, der understreger betydningen af diagnosticering af depression hos mennesker. Mange unge har kun sjældent kontakt med deres praktiserende læge. Derfor kan mange gå i lang tid med depression, uden at det bliver opdaget og behandlet. De tre enkle...... spørgsmål, der kredser om interesse (eller mangel på interesse) for daglige aktiviteter og følelser som nedtrykthed eller håbløshed, kan være et godt pejlemærke for evt. depression hos unge, som ellers let kan blive overset....

  15. A qualitative study of tobacco interventions for LGBTQ+ youth and young adults: overarching themes and key learnings.

    Science.gov (United States)

    Bruce Baskerville, N; Wong, Katy; Shuh, Alanna; Abramowicz, Aneta; Dash, Darly; Esmail, Aamer; Kennedy, Ryan

    2018-01-18

    Smoking prevalence is very high among lesbian, gay, bisexual, transgendered and queer (LGBTQ+) youth and young adults (YYA) compared to non-LGBTQ+ YYA. A knowledge gap exists on culturally appropriate and effective prevention and cessation efforts for members of this diverse community, as limited interventions have been developed with and for this population, and there are very few studies determining the impact of these interventions. This study identifies the most salient elements of LGBTQ+ cessation and prevention interventions from the perspective of LGBTQ+ YYA. Three descriptions of interventions tailored for LGBTQ+ YYA (group cessation counselling, social marketing, and a mobile phone app with social media incorporated), were shared with LGBTQ+ YYA via 24 focus groups with 204 participants in Toronto and Ottawa, Canada. Open-ended questions focused on their feelings, likes and dislikes, and concerns about the culturally modified intervention descriptions. Framework analysis was used to identify overarching themes across all three intervention descriptions. The data revealed eight overarching themes across all three intervention descriptions. Smoking cessation and prevention interventions should have the following key attributes: 1) be LGBTQ+ - specific; 2) be accessible in terms of location, time, availability, and cost; 3) be inclusive, relatable, and highlight diversity; 4) incorporate LGBTQ+ peer support and counselling services; 5) integrate other activities beyond smoking; 6) be positive, motivational, uplifting, and empowering; 7) provide concrete coping mechanisms; and 8) integrate rewards and incentives. LGBTQ+ YYA focus group participants expressed a desire for an intervention that can incorporate these key elements. The mobile phone app and social media campaign were noted as potential interventions that could include all the essential elements.

  16. Identification of the key ecological factors influencing vegetation degradation in semi-arid agro-pastoral ecotone considering spatial scales

    Science.gov (United States)

    Peng, Yu; Wang, Qinghui; Fan, Min

    2017-11-01

    When assessing re-vegetation project performance and optimizing land management, identification of the key ecological factors inducing vegetation degradation has crucial implications. Rainfall, temperature, elevation, slope, aspect, land use type, and human disturbance are ecological factors affecting the status of vegetation index. However, at different spatial scales, the key factors may vary. Using Helin County, Inner-Mongolia, China as the study site and combining remote sensing image interpretation, field surveying, and mathematical methods, this study assesses key ecological factors affecting vegetation degradation under different spatial scales in a semi-arid agro-pastoral ecotone. It indicates that the key factors are different at various spatial scales. Elevation, rainfall, and temperature are identified as crucial for all spatial extents. Elevation, rainfall and human disturbance are key factors for small-scale quadrats of 300 m × 300 m and 600 m × 600 m, temperature and land use type are key factors for a medium-scale quadrat of 1 km × 1 km, and rainfall, temperature, and land use are key factors for large-scale quadrats of 2 km × 2 km and 5 km × 5 km. For this region, human disturbance is not the key factor for vegetation degradation across spatial scales. It is necessary to consider spatial scale for the identification of key factors determining vegetation characteristics. The eco-restoration programs at various spatial scales should identify key influencing factors according their scales so as to take effective measurements. The new understanding obtained in this study may help to explore the forces which driving vegetation degradation in the degraded regions in the world.

  17. Identifying key soil cyanobacteria easy to isolate and culture for arid soil restoration

    Science.gov (United States)

    Roncero-Ramos, Beatriz; Ángeles Muñoz-Martín, M.; Chamizo, Sonia; Román, Raúl; Rodriguez-Caballero, Emilio; Mateo, Pilar; Cantón, Yolanda

    2017-04-01

    Drylands represent an important fraction of the Earth land's surface. Low cover of vascular plants characterizes these regions, and the large open areas among plants are often colonized by cyanobacteria, mosses, lichens, algae, bryophytes, bacteria and fungi, known as biocrusts. Because these communities are on or within the soil surface, they contribute to improve physicochemical properties of the uppermost soil layers and have important effects on soil fertility and stability, so they could play an important role on soil restoration. Cyanobacteria appear to be a cross component of biocrusts and they have been demonstrated to enhance water availability, soil fertility (fixing atmospheric C and N), and soil aggregation (thanks to their filamentous morphology and the exopolysaccharides they excrete), and significantly reduce water and wind erosion. Besides, they are able to tolerate high temperatures and UV radiation. All these features convert cyanobacteria in pioneer organisms capable of colonizing degraded soils and may be crucial in facilitating the succession of more developed organisms such as vascular plants. Therefore, the use of native cyanobacteria, already adapted to site environmental conditions, could guarantee a successful restoration approach of degraded soils. However, previous to their application for soil restoration, the most representative species inhabiting these soils should be identified. The objective of this study was to identify (morphologically and genetically) and isolate representative native cyanobacteria species from arid soils in SE Spain, characterized for being easily isolated and cultured with the aim of using them to inoculate degraded arid soil. We selected two study areas in Almería, SE Spain, where biocrust cover most of the open spaces between plants: El Cautivo experimental site located in the Tabernas desert and a limestone quarry located at the southeastern edge of the Gádor massif. The first site is characterized by

  18. 7 CFR 632.52 - Identifying typical classes of action.

    Science.gov (United States)

    2010-01-01

    ... § 632.52 Identifying typical classes of action. (a) The RFO will analyze the environmental assessment of....12. These actions are determined by a limited environmental assessment that reasonably identifies the... 632.52 Agriculture Regulations of the Department of Agriculture (Continued) NATURAL RESOURCES...

  19. Lived experiences of parents caring for a child with a life-limiting condition in Australia: A qualitative study.

    Science.gov (United States)

    Collins, Anna; Hennessy-Anderson, Nicole; Hosking, Sarah; Hynson, Jenny; Remedios, Cheryl; Thomas, Kristina

    2016-12-01

    Experiential studies in paediatric palliative care are needed to enable an ongoing international agenda which supports the development of responsive family supports. To provide an in-depth exploration of the prevalent lived experiences of parents who are currently providing care for a child with a life-limiting condition in Australia. Cross-sectional, prospective, qualitative study guided by an advisory group and reported according to the consolidated criteria for reporting qualitative studies. Transcripts were subjected to a thematic analysis, underpinned by an interpretative phenomenological framework. Purposively sampled parents (n = 14) recruited from a statewide paediatric hospice who self-identified as a 'primary caregiver' for one or more children and/or adolescents (⩽18 years) with a life-limiting condition. Four key themes represented the prevalent experiences of parents: (1) trapped inside the house, (2) the protector, (3) living with the shadow and (4) travelling a different pathway. They describe parents' physical and social isolation, exclusion from the workforce, pervasive grief and associated impacts to their health and well-being. Limited professional and diminished social supports resulted in full ownership of care responsibility. Yet, parents embraced their role as 'protector', reporting acquired meaning and purpose. This study builds upon the growing body of evidence available in paediatric palliative care internationally. The key themes highlight the substantial demand for both physical and emotional support beyond what is currently offered and call for the implementation of carefully planned support services and other societal initiatives which seek to alleviate the broad health impacts to caregivers. © The Author(s) 2016.

  20. Identification of key target markets for intermodal freight transport solutions in South Africa

    Directory of Open Access Journals (Sweden)

    Joubert van Eeden

    2010-11-01

    Full Text Available The Accelerated and Shared Growth Initiative for South Africa (AsgiSA identified South Africa's freight logistics challenges as among the key binding constraints on the country's growth aspirations. The research presented here points to the structural imbalance between road and rail freight transport as one of the key contributors to this state of affairs. Most long-distance corridor transport has been captured by road. However, long-distance transport is a market segment that is very suitable for intermodal transportation : rail is utilised for the high-density, long-distance component and road for the feeder and distribution services at the corridor end points. A market segmentation approach is developed to identify the corridors and industries that are natural candidates for such solutions, thereby paving the way for role-players and stakeholders to initiate a dialogue on the development of appropriate solutions.

  1. Salient Key Features of Actual English Instructional Practices in Saudi Arabia

    Science.gov (United States)

    Al-Seghayer, Khalid

    2015-01-01

    This is a comprehensive review of the salient key features of the actual English instructional practices in Saudi Arabia. The goal of this work is to gain insights into the practices and pedagogic approaches to English as a foreign language (EFL) teaching currently employed in this country. In particular, we identify the following central features…

  2. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  3. Use of the shared frailty model to identify the determinants of child ...

    African Journals Online (AJOL)

    user

    The key determinants would be prioritized in order to avoid an eventual misallocation of ... constraints of being a landlocked country, high transport costs, low natural resource base, limited .... intrinsically unobservable variables such as ability, common environmental exposures ..... eventual intervention outcomes. The study ...

  4. Cemento-osseous dysplasia of the jaw bones: key radiographic features.

    Science.gov (United States)

    Alsufyani, N A; Lam, E W N

    2011-03-01

    The purpose of this study is to assess possible diagnostic differences between general dentists (GPs) and oral and maxillofacial radiologists (RGs) in the identification of pathognomonic radiographic features of cemento-osseous dysplasia (COD) and its interpretation. Using a systematic objective survey instrument, 3 RGs and 3 GPs reviewed 50 image sets of COD and similarly appearing entities (dense bone island, cementoblastoma, cemento-ossifying fibroma, fibrous dysplasia, complex odontoma and sclerosing osteitis). Participants were asked to identify the presence or absence of radiographic features and then to make an interpretation of the images. RGs identified a well-defined border (odds ratio (OR) 6.67, P < 0.05); radiolucent periphery (OR 8.28, P < 0.005); bilateral occurrence (OR 10.23, P < 0.01); mixed radiolucent/radiopaque internal structure (OR 10.53, P < 0.01); the absence of non-concentric bony expansion (OR 7.63, P < 0.05); and the association with anterior and posterior teeth (OR 4.43, P < 0.05) as key features of COD. Consequently, RGs were able to correctly interpret 79.3% of COD cases. In contrast, GPs identified the absence of root resorption (OR 4.52, P < 0.05) and the association with anterior and posterior teeth (OR 3.22, P = 0.005) as the only key features of COD and were able to correctly interpret 38.7% of COD cases. There are statistically significant differences between RGs and GPs in the identification and interpretation of the radiographic features associated with COD (P < 0.001). We conclude that COD is radiographically discernable from other similarly appearing entities only if the characteristic radiographic features are correctly identified and then correctly interpreted.

  5. Technical Limits of ICT for Enterprises' Innovations

    Directory of Open Access Journals (Sweden)

    Radim Brixi

    2012-01-01

    Full Text Available The paper deals with technical limits of ICT for enterprises' innovations. ICT is now a key asset for the competitiveness of enterprises. It became the main stream of doing business well. These days we come to era where enterprises are fully dependant on ICT. We would try to describe more deeply the impacts of such a dependence and underlying problems. In context of the necessary new innovations of enterprises, we will focus more on the negative aspects of being dependent on ICT with the technological architecture of hard systems. Based on the need to apply a systems approach we will also provide a suggestion as to how to model these limits in a system's manner.

  6. Global metabolic analyses identify key differences in metabolite levels between polymyxin-susceptible and polymyxin-resistant Acinetobacter baumannii.

    Science.gov (United States)

    Maifiah, Mohd Hafidz Mahamad; Cheah, Soon-Ee; Johnson, Matthew D; Han, Mei-Ling; Boyce, John D; Thamlikitkul, Visanu; Forrest, Alan; Kaye, Keith S; Hertzog, Paul; Purcell, Anthony W; Song, Jiangning; Velkov, Tony; Creek, Darren J; Li, Jian

    2016-02-29

    Multidrug-resistant Acinetobacter baumannii presents a global medical crisis and polymyxins are used as the last-line therapy. This study aimed to identify metabolic differences between polymyxin-susceptible and polymyxin-resistant A. baumannii using untargeted metabolomics. The metabolome of each A. baumannii strain was measured using liquid chromatography-mass spectrometry. Multivariate and univariate statistics and pathway analyses were employed to elucidate metabolic differences between the polymyxin-susceptible and -resistant A. baumannii strains. Significant differences were identified between the metabolic profiles of the polymyxin-susceptible and -resistant A. baumannii strains. The lipopolysaccharide (LPS) deficient, polymyxin-resistant 19606R showed perturbation in specific amino acid and carbohydrate metabolites, particularly pentose phosphate pathway (PPP) and tricarboxylic acid (TCA) cycle intermediates. Levels of nucleotides were lower in the LPS-deficient 19606R. Furthermore, 19606R exhibited a shift in its glycerophospholipid profile towards increased abundance of short-chain lipids compared to the parent polymyxin-susceptible ATCC 19606. In contrast, in a pair of clinical isolates 03-149.1 (polymyxin-susceptible) and 03-149.2 (polymyxin-resistant, due to modification of lipid A), minor metabolic differences were identified. Notably, peptidoglycan biosynthesis metabolites were significantly depleted in both of the aforementioned polymyxin-resistant strains. This is the first comparative untargeted metabolomics study to show substantial differences in the metabolic profiles of the polymyxin-susceptible and -resistant A. baumannii.

  7. How much flower-rich habitat is enough for wild pollinators? Answering a key policy question with incomplete knowledge.

    Science.gov (United States)

    Dicks, Lynn V; Baude, Mathilde; Roberts, Stuart P M; Phillips, James; Green, Mike; Carvell, Claire

    2015-09-01

    In 2013, an opportunity arose in England to develop an agri-environment package for wild pollinators, as part of the new Countryside Stewardship scheme launched in 2015. It can be understood as a 'policy window', a rare and time-limited opportunity to change policy, supported by a narrative about pollinator decline and widely supported mitigating actions. An agri-environment package is a bundle of management options that together supply sufficient resources to support a target group of species. This paper documents information that was available at the time to develop such a package for wild pollinators. Four questions needed answering: (1) Which pollinator species should be targeted? (2) Which resources limit these species in farmland? (3) Which management options provide these resources? (4) What area of each option is needed to support populations of the target species? Focussing on wild bees, we provide tentative answers that were used to inform development of the package. There is strong evidence that floral resources can limit wild bee populations, and several sources of evidence identify a set of agri-environment options that provide flowers and other resources for pollinators. The final question could only be answered for floral resources, with a wide range of uncertainty. We show that the areas of some floral resource options in the basic Wild Pollinator and Farmland Wildlife Package (2% flower-rich habitat and 1 km flowering hedgerow), are sufficient to supply a set of six common pollinator species with enough pollen to feed their larvae at lowest estimates, using minimum values for estimated parameters where a range was available. We identify key sources of uncertainty, and stress the importance of keeping the Package flexible, so it can be revised as new evidence emerges about how to achieve the policy aim of supporting pollinators on farmland.

  8. Secure Key Management in the Cloud

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus

    2013-01-01

    information such as cryptographic keys. Applications like this include many cases where secure multiparty computation is outsourced to the cloud, and in particular a number of online auctions and benchmark computations with confidential inputs. We consider fully autonomous servers that switch between online......We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive...... and offline periods without communicating with anyone from outside the cloud, and semi-autonomous servers that need a limited kind of assistance from outside the cloud when doing the transition. We study the levels of security one can – and cannot – obtain in this model, propose light-weight protocols...

  9. Digital games in medical education: Key terms, concepts, and definitions.

    Science.gov (United States)

    Bigdeli, Shoaleh; Kaufman, David

    2017-01-01

    Introduction: Game-based education is fast becoming a key instrument in medical education. Method: In this study, papers related to games were filtered and limited to full-text peer-reviewed published in English. Results: To the best of researchers' knowledge, the concepts used in the literature are varied and distinct, and the literature is not conclusive on the definition of educational games for medical education. Conclusion: This paper attempts to classify terms, concepts and definitions common to gamification in medical education.

  10. Reverse engineering of TLX oncogenic transcriptional networks identifies RUNX1 as tumor suppressor in T-ALL.

    Science.gov (United States)

    Della Gatta, Giusy; Palomero, Teresa; Perez-Garcia, Arianne; Ambesi-Impiombato, Alberto; Bansal, Mukesh; Carpenter, Zachary W; De Keersmaecker, Kim; Sole, Xavier; Xu, Luyao; Paietta, Elisabeth; Racevskis, Janis; Wiernik, Peter H; Rowe, Jacob M; Meijerink, Jules P; Califano, Andrea; Ferrando, Adolfo A

    2012-02-26

    The TLX1 and TLX3 transcription factor oncogenes have a key role in the pathogenesis of T cell acute lymphoblastic leukemia (T-ALL). Here we used reverse engineering of global transcriptional networks to decipher the oncogenic regulatory circuit controlled by TLX1 and TLX3. This systems biology analysis defined T cell leukemia homeobox 1 (TLX1) and TLX3 as master regulators of an oncogenic transcriptional circuit governing T-ALL. Notably, a network structure analysis of this hierarchical network identified RUNX1 as a key mediator of the T-ALL induced by TLX1 and TLX3 and predicted a tumor-suppressor role for RUNX1 in T cell transformation. Consistent with these results, we identified recurrent somatic loss-of-function mutations in RUNX1 in human T-ALL. Overall, these results place TLX1 and TLX3 at the top of an oncogenic transcriptional network controlling leukemia development, show the power of network analyses to identify key elements in the regulatory circuits governing human cancer and identify RUNX1 as a tumor-suppressor gene in T-ALL.

  11. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  12. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  13. Governing economies in areas of limited statehood

    DEFF Research Database (Denmark)

    Rasmussen, Jacob; Varming, Kirstine Strøh

    This DIIS–GOVSEA working paper reviews key debates within economic anthropology and related academic disciplines explaining how economic life is governed in areas of limited statehood. The paper briefly introduces some of the origins of economic anthropology before going into deeper discussions...... of a number of key debates within the field. The literature review and discussion is organised on the basis of six major themes that shed light on this research question: 1) embeddedness and economic transformations, 2) property governance, 3) informal and popular economies, 4) debt and money, 5) borders...... and cross-border trade, and 6) authority, governance and economic regulation. These themes are supported by case examples from the Somali territories in the East and Horn of Africa. Through the reviewed literature, the paper critically engages common categories, such as formal/informal, state...

  14. IARC use of oxidative stress as key mode of action characteristic for facilitating cancer classification: Glyphosate case example illustrating a lack of robustness in interpretative implementation.

    Science.gov (United States)

    Bus, James S

    2017-06-01

    The International Agency for Research on Cancer (IARC) has formulated 10 key characteristics of human carcinogens to incorporate mechanistic data into cancer hazard classifications. The analysis used glyphosate as a case example to examine the robustness of IARC's determination of oxidative stress as "strong" evidence supporting a plausible cancer mechanism in humans. The IARC analysis primarily relied on 14 human/mammalian studies; 19 non-mammalian studies were uninformative of human cancer given the broad spectrum of test species and extensive use of formulations and aquatic testing. The mammalian studies had substantial experimental limitations for informing cancer mechanism including use of: single doses and time points; cytotoxic/toxic test doses; tissues not identified as potential cancer targets; glyphosate formulations or mixtures; technically limited oxidative stress biomarkers. The doses were many orders of magnitude higher than human exposures determined in human biomonitoring studies. The glyphosate case example reveals that the IARC evaluation fell substantially short of "strong" supporting evidence of oxidative stress as a plausible human cancer mechanism, and suggests that other IARC monographs relying on the 10 key characteristics approach should be similarly examined for a lack of robust data integration fundamental to reasonable mode of action evaluations. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Magnetohydrodynamic simulations of density-limit disruptions in tokamaks

    International Nuclear Information System (INIS)

    Kleva, R.G.; Drake, J.F.; Denton, R.E.

    1990-01-01

    Magnetohydrodynamic simulations are presented which demonstrate that density limit disruptions can be triggered by edge radiation which destabilizes a q = 1 kink followed by a q = 2 tearing mode. A bubble of cold plasma is injected from the edge into the center by the q = 1 kink. The q = 2 mode then broadens the current profile and throws the hot plasma to the wall. The MHD simulations presented are the first to successfully reproduce several key features of density limit disruptions including (1) the rapid drop in the central temperature, (2) the rapid expansion of the current profile, (3) the m = 1 cold bubble which is seen to be injected from the edge into the center during density limit disruptions on JET, and (4) disruptions in sawtoothing discharges. (author)

  16. Key issues and challenges in developing a pedagogical intervention in the simulation skills center--an action research study.

    Science.gov (United States)

    Reierson, Inger Åse; Hvidsten, Anne; Wighus, Marianne; Brungot, Solvor; Bjørk, Ida Torunn

    2013-07-01

    Simulation skills centers (SSC) are considered important learning arenas for preparing and qualifying nursing students. Limited clinical placements and claims of diminished learning opportunities raise concerns that newly educated nurses lack proficiency in many psychomotor skills. Accordingly, there is an increased focus on learning in the SSC. However, it has been questioned if the pedagogical underpinning of teaching and learning in the SSC is missing or unclear. At a bachelor nursing education in Norway, there was a desire to change practice and enhance learning in the SSC by systematic use of The Model of Practical Skill Performance (Bjørk and Kirkevold, 2000). A participatory action research design was chosen. A pedagogical intervention was developed and implemented in 2010 in a cohort of eighty-seven first year bachelor nursing students during their basic nursing skill course. The intervention is shortly described. This article reports key issues and challenges that emerged during development of the new intervention. Data to inform the study were collected via thorough meeting minutes and the project leader's logbook, and analyzed using fieldnotes analysis. Six key issues and challenges were identified. These are presented and discussed consecutively in light of their importance for development and implementation of the new intervention. Copyright © 2013 Elsevier Ltd. All rights reserved.

  17. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  18. Examining the Key Factors Affecting e-Service Quality of Small Online Apparel Businesses in Malaysia

    OpenAIRE

    Che Nawi Noorshella; Al Mamun Abdullah; Ahmad Raston Nursalihah

    2015-01-01

    e-Service quality (eSQ) is increasingly recognized as an important aspect, as well as the key to determining the competitive advantage and factor in the long-term retention of firms operating online. This study, therefore, is aimed at identifying the key determinants of eSQ among the small online apparel businesses in Malaysia. This study used a cross-sectional design, and data were collected from 765 customers who pur...

  19. Physiologically-based toxicokinetic models help identifying the key factors affecting contaminant uptake during flood events

    International Nuclear Information System (INIS)

    Brinkmann, Markus; Eichbaum, Kathrin; Kammann, Ulrike; Hudjetz, Sebastian; Cofalla, Catrina; Buchinger, Sebastian; Reifferscheid, Georg; Schüttrumpf, Holger; Preuss, Thomas

    2014-01-01

    Highlights: • A PBTK model for trout was coupled with a sediment equilibrium partitioning model. • The influence of physical exercise on pollutant uptake was studies using the model. • Physical exercise during flood events can increase the level of biliary metabolites. • Cardiac output and effective respiratory volume were identified as relevant factors. • These confounding factors need to be considered also for bioconcentration studies. - Abstract: As a consequence of global climate change, we will be likely facing an increasing frequency and intensity of flood events. Thus, the ecotoxicological relevance of sediment re-suspension is of growing concern. It is vital to understand contaminant uptake from suspended sediments and relate it to effects in aquatic biota. Here we report on a computational study that utilizes a physiologically based toxicokinetic model to predict uptake, metabolism and excretion of sediment-borne pyrene in rainbow trout (Oncorhynchus mykiss). To this end, data from two experimental studies were compared with the model predictions: (a) batch re-suspension experiments with constant concentration of suspended particulate matter at two different temperatures (12 and 24 °C), and (b) simulated flood events in an annular flume. The model predicted both the final concentrations and the kinetics of 1-hydroxypyrene secretion into the gall bladder of exposed rainbow trout well. We were able to show that exhaustive exercise during exposure in simulated flood events can lead to increased levels of biliary metabolites and identified cardiac output and effective respiratory volume as the two most important factors for contaminant uptake. The results of our study clearly demonstrate the relevance and the necessity to investigate uptake of contaminants from suspended sediments under realistic exposure scenarios

  20. Physiologically-based toxicokinetic models help identifying the key factors affecting contaminant uptake during flood events

    Energy Technology Data Exchange (ETDEWEB)

    Brinkmann, Markus; Eichbaum, Kathrin [Department of Ecosystem Analysis, Institute for Environmental Research,ABBt – Aachen Biology and Biotechnology, RWTH Aachen University, Worringerweg 1, 52074 Aachen (Germany); Kammann, Ulrike [Thünen-Institute of Fisheries Ecology, Palmaille 9, 22767 Hamburg (Germany); Hudjetz, Sebastian [Department of Ecosystem Analysis, Institute for Environmental Research,ABBt – Aachen Biology and Biotechnology, RWTH Aachen University, Worringerweg 1, 52074 Aachen (Germany); Institute of Hydraulic Engineering and Water Resources Management, RWTH Aachen University, Mies-van-der-Rohe-Straße 1, 52056 Aachen (Germany); Cofalla, Catrina [Institute of Hydraulic Engineering and Water Resources Management, RWTH Aachen University, Mies-van-der-Rohe-Straße 1, 52056 Aachen (Germany); Buchinger, Sebastian; Reifferscheid, Georg [Federal Institute of Hydrology (BFG), Department G3: Biochemistry, Ecotoxicology, Am Mainzer Tor 1, 56068 Koblenz (Germany); Schüttrumpf, Holger [Institute of Hydraulic Engineering and Water Resources Management, RWTH Aachen University, Mies-van-der-Rohe-Straße 1, 52056 Aachen (Germany); Preuss, Thomas [Department of Environmental Biology and Chemodynamics, Institute for Environmental Research,ABBt- Aachen Biology and Biotechnology, RWTH Aachen University, Worringerweg 1, 52074 Aachen (Germany); and others

    2014-07-01

    Highlights: • A PBTK model for trout was coupled with a sediment equilibrium partitioning model. • The influence of physical exercise on pollutant uptake was studies using the model. • Physical exercise during flood events can increase the level of biliary metabolites. • Cardiac output and effective respiratory volume were identified as relevant factors. • These confounding factors need to be considered also for bioconcentration studies. - Abstract: As a consequence of global climate change, we will be likely facing an increasing frequency and intensity of flood events. Thus, the ecotoxicological relevance of sediment re-suspension is of growing concern. It is vital to understand contaminant uptake from suspended sediments and relate it to effects in aquatic biota. Here we report on a computational study that utilizes a physiologically based toxicokinetic model to predict uptake, metabolism and excretion of sediment-borne pyrene in rainbow trout (Oncorhynchus mykiss). To this end, data from two experimental studies were compared with the model predictions: (a) batch re-suspension experiments with constant concentration of suspended particulate matter at two different temperatures (12 and 24 °C), and (b) simulated flood events in an annular flume. The model predicted both the final concentrations and the kinetics of 1-hydroxypyrene secretion into the gall bladder of exposed rainbow trout well. We were able to show that exhaustive exercise during exposure in simulated flood events can lead to increased levels of biliary metabolites and identified cardiac output and effective respiratory volume as the two most important factors for contaminant uptake. The results of our study clearly demonstrate the relevance and the necessity to investigate uptake of contaminants from suspended sediments under realistic exposure scenarios.

  1. Adaptive spatial filtering for daytime satellite quantum key distribution

    Science.gov (United States)

    Gruneisen, Mark T.; Sickmiller, Brett A.; Flanagan, Michael B.; Black, James P.; Stoltenberg, Kurt E.; Duchane, Alexander W.

    2014-11-01

    The rate of secure key generation (SKG) in quantum key distribution (QKD) is adversely affected by optical noise and loss in the quantum channel. In a free-space atmospheric channel, the scattering of sunlight into the channel can lead to quantum bit error ratios (QBERs) sufficiently large to preclude SKG. Furthermore, atmospheric turbulence limits the degree to which spatial filtering can reduce sky noise without introducing signal losses. A system simulation quantifies the potential benefit of tracking and higher-order adaptive optics (AO) technologies to SKG rates in a daytime satellite engagement scenario. The simulations are performed assuming propagation from a low-Earth orbit (LEO) satellite to a terrestrial receiver that includes an AO system comprised of a Shack-Hartmann wave-front sensor (SHWFS) and a continuous-face-sheet deformable mirror (DM). The effects of atmospheric turbulence, tracking, and higher-order AO on the photon capture efficiency are simulated using statistical representations of turbulence and a time-domain waveoptics hardware emulator. Secure key generation rates are then calculated for the decoy state QKD protocol as a function of the receiver field of view (FOV) for various pointing angles. The results show that at FOVs smaller than previously considered, AO technologies can enhance SKG rates in daylight and even enable SKG where it would otherwise be prohibited as a consequence of either background optical noise or signal loss due to turbulence effects.

  2. Patient- and Family-Identified Problems of Traumatic Brain Injury: Value and Utility of a Target Outcome Approach to Identifying the Worst Problems

    Directory of Open Access Journals (Sweden)

    Laraine Winter

    2016-01-01

    Full Text Available Purpose: This study aimed to identify the sequelae of traumatic brain injury (TBI that are most troubling to veterans with TBI and their families and identify veteran-family differences in content and ranking. Instead of standardized measures of symptom frequency or severity, which may be insensitive to change or intervention effects, we used a target outcome measure for veterans with TBI and their key family members, which elicited open-ended reports concerning the three most serious TBI-related problems. This was followed by Likert-scaled ratings of difficulty in managing the problem. Methods: In this cross-sectional study, interviews were conducted in veterans’ homes. Participants included 83 veterans with TBI diagnosed at a Veterans Affairs medical rehabilitation service and a key family member of each veteran. We utilized open-ended questions to determine the problems caused by TBI within the last month. Sociodemographic characteristics of veterans and family members, and veterans’ military and medical characteristics were collected. A coding scheme was developed to categorize open-ended responses. Results: Families identified nearly twice as many categories of problems as did veterans, and veterans and families ranked problem categories very differently. Veterans ranked cognitive and physical problems worst; families ranked emotional and interpersonal problems worst. Conclusions: Easily administered open-ended questions about the most troubling TBI-related problems yield novel insights and reveal important veteran-family discrepancies.

  3. A network analysis of the Chinese medicine Lianhua-Qingwen formula to identify its main effective components.

    Science.gov (United States)

    Wang, Chun-Hua; Zhong, Yi; Zhang, Yan; Liu, Jin-Ping; Wang, Yue-Fei; Jia, Wei-Na; Wang, Guo-Cai; Li, Zheng; Zhu, Yan; Gao, Xiu-Mei

    2016-02-01

    Chinese medicine is known to treat complex diseases with multiple components and multiple targets. However, the main effective components and their related key targets and functions remain to be identified. Herein, a network analysis method was developed to identify the main effective components and key targets of a Chinese medicine, Lianhua-Qingwen Formula (LQF). The LQF is commonly used for the prevention and treatment of viral influenza in China. It is composed of 11 herbs, gypsum and menthol with 61 compounds being identified in our previous work. In this paper, these 61 candidate compounds were used to find their related targets and construct the predicted-target (PT) network. An influenza-related protein-protein interaction (PPI) network was constructed and integrated with the PT network. Then the compound-effective target (CET) network and compound-ineffective target network (CIT) were extracted, respectively. A novel approach was developed to identify effective components by comparing CET and CIT networks. As a result, 15 main effective components were identified along with 61 corresponding targets. 7 of these main effective components were further experimentally validated to have antivirus efficacy in vitro. The main effective component-target (MECT) network was further constructed with main effective components and their key targets. Gene Ontology (GO) analysis of the MECT network predicted key functions such as NO production being modulated by the LQF. Interestingly, five effective components were experimentally tested and exhibited inhibitory effects on NO production in the LPS induced RAW 264.7 cell. In summary, we have developed a novel approach to identify the main effective components in a Chinese medicine LQF and experimentally validated some of the predictions.

  4. Identifying Key Features, Cutting Edge Cloud Resources, and Artificial Intelligence Tools to Achieve User-Friendly Water Science in the Cloud

    Science.gov (United States)

    Pierce, S. A.

    2017-12-01

    Decision making for groundwater systems is becoming increasingly important, as shifting water demands increasingly impact aquifers. As buffer systems, aquifers provide room for resilient responses and augment the actual timeframe for hydrological response. Yet the pace impacts, climate shifts, and degradation of water resources is accelerating. To meet these new drivers, groundwater science is transitioning toward the emerging field of Integrated Water Resources Management, or IWRM. IWRM incorporates a broad array of dimensions, methods, and tools to address problems that tend to be complex. Computational tools and accessible cyberinfrastructure (CI) are needed to cross the chasm between science and society. Fortunately cloud computing environments, such as the new Jetstream system, are evolving rapidly. While still targeting scientific user groups systems such as, Jetstream, offer configurable cyberinfrastructure to enable interactive computing and data analysis resources on demand. The web-based interfaces allow researchers to rapidly customize virtual machines, modify computing architecture and increase the usability and access for broader audiences to advanced compute environments. The result enables dexterous configurations and opening up opportunities for IWRM modelers to expand the reach of analyses, number of case studies, and quality of engagement with stakeholders and decision makers. The acute need to identify improved IWRM solutions paired with advanced computational resources refocuses the attention of IWRM researchers on applications, workflows, and intelligent systems that are capable of accelerating progress. IWRM must address key drivers of community concern, implement transdisciplinary methodologies, adapt and apply decision support tools in order to effectively support decisions about groundwater resource management. This presentation will provide an overview of advanced computing services in the cloud using integrated groundwater management case

  5. Should diagnosis codes from emergency department data be used for case selection for emergency department key performance indicators?

    Science.gov (United States)

    Howell, Stuart C; Wills, Rachael A; Johnston, Trisha C

    2014-02-01

    The aim of the present study was to assess the suitability of emergency department (ED) discharge diagnosis for identifying patient cohorts included in the definitions of key performance indicators (KPIs) that are used to evaluate ED performance. Hospital inpatient episodes of care with a principal diagnosis that corresponded to an ED-defined KPI were extracted from the Queensland Hospital Admitted Patient Data Collection (QHAPDC) for the year 2010-2011. The data were then linked to the corresponding ED patient record and the diagnoses applied in the two settings were compared. The asthma and injury cohorts produced favourable results with respect to matching the QHAPDC principal diagnosis with the ED discharge diagnosis. The results were generally modest when the QHAPDC principal diagnosis was upper respiratory tract infection, poisoning and toxic effects or a mental health diagnosis, and were quite poor for influenza. There is substantial variation in the capture of patient cohorts using discharge diagnosis as recorded on Queensland Hospital Emergency Department data. WHAT IS KNOWN ABOUT THE TOPIC? There are several existing KPIs that are defined according to the diagnosis recorded on ED data collections. However, there have been concerns over the quality of ED diagnosis in Queensland and other jurisdictions, and the value of these data in identifying patient cohorts for the purpose of assessing ED performance remains uncertain. WHAT DOES THIS PAPER ADD? This paper identifies diagnosis codes that are suitable for use in capturing the patient cohorts that are used to evaluate ED performance, as well as those codes that may be of limited value. WHAT ARE THE IMPLICATIONS FOR PRACTITIONERS? The limitations of diagnosis codes within ED data should be understood by those seeking to use these data items for healthcare planning and management or for research into healthcare quality and outcomes.

  6. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  7. Monitoring the HIV continuum of care in key populations across Europe and Central Asia.

    Science.gov (United States)

    Brown, A E; Attawell, K; Hales, D; Rice, B D; Pharris, A; Supervie, V; Van Beckhoven, D; Delpech, V C; An der Heiden, M; Marcus, U; Maly, M; Noori, T

    2018-05-08

    The aim of the study was to measure and compare national continuum of HIV care estimates in Europe and Central Asia in three key subpopulations: men who have sex with men (MSM), people who inject drugs (PWID) and migrants. Responses to a 2016 European Centre for Disease Prevention and Control (ECDC) survey of 55 European and Central Asian countries were used to describe continuums of HIV care for the subpopulations. Data were analysed using three frameworks: Joint United Nations Programme on HIV/AIDS (UNAIDS) 90-90-90 targets; breakpoint analysis identifying reductions between adjacent continuum stages; quadrant analysis categorizing countries using 90% cut-offs for continuum stages. Overall, 29 of 48 countries reported national data for all HIV continuum stages (numbers living with HIV, diagnosed, receiving treatment and virally suppressed). Six countries reported all stages for MSM, seven for PWID and two for migrants. Thirty-one countries did not report data for MSM (34 for PWID and 41 for migrants). In countries that provided key-population data, overall, 63%, 40% and 41% of MSM, PWID and migrants living with HIV were virally suppressed, respectively (compared with 68%, 65% and 68% nationally, for countries reporting key-population data). Variation was observed between countries, with higher outcomes in subpopulations in Western Europe compared with Eastern Europe and Central Asia. Few reporting countries can produce the continuum of HIV care for the three key populations. Where data are available, differences exist in outcomes between the general and key populations. While MSM broadly mirror national outcomes (in the West), PWID and migrants experience poorer treatment and viral suppression. Countries must develop continuum measures for key populations to identify and address inequalities. © 2018 British HIV Association.

  8. Limits to fuel/coolant mixing

    International Nuclear Information System (INIS)

    Corradini, M.L.; Moses, G.A.

    1985-01-01

    The vapor explosion process involves the mixing of fuel with coolant prior to the explosion. A number of analysts have identified limits to the amount of fuel/coolant mixing that could occur within the reactor vessel following a core melt accident. Past models are reviewed and a sim plified approach is suggested to estimate the upper limit on the amount of fuel/coolant mixing pos sible. The approach uses concepts first advanced by Fauske in a different way. The results indicat that water depth is an important parameter as well as the mixing length scale D /SUB mix/ , and for large values of D /SUB mix/ the fuel mass mixed is limited to <7% of the core mass

  9. Peptidomics for Studying Limited Proteolysis.

    Science.gov (United States)

    Tsuchiya, Takashi; Osaki, Tsukasa; Minamino, Naoto; Sasaki, Kazuki

    2015-11-06

    Limited proteolysis is a pivotal mechanism regulating protein functions. Identifying physiologically or pathophysiologically relevant cleavage sites helps to develop molecular tools that can be used for diagnostics or therapeutics. During proteolysis of secretory and membrane proteins, part of the cleaved protein is liberated and destined to undergo degradation but should retain original cleavage sites created by proteolytic enzymes. We profiled endogenous peptides accumulated for 4 h in media conditioned by primary cultured rat cardiac fibroblasts. A total of 3916 redundant peptide sequences from 94 secretory proteins and membrane proteins served to identify limited cleavage sites, both annotated and unannotated, for signal peptide or propeptide removal, peptide hormone processing, ectodomain shedding, and regulated intramembrane proteolysis. Incorrectly predicted signal cleavage sites are found in typical proteins such as extracellular matrix proteins and the peptide hormone precursor adrenomedullin ADM. The revealed signal peptide cleavage site for ADM was experimentally verified by identifying the major molecular form of flanking proadrenomedullin N-terminal peptide. We suggest that profiling of endogenous peptides, like transcriptome sequence reads, makes sense in regular cells such as fibroblasts and that peptidomics provides insight into proteolysis-regulated protein functions.

  10. Ebola Virus Infection Modelling and Identifiability Problems

    Directory of Open Access Journals (Sweden)

    Van-Kinh eNguyen

    2015-04-01

    Full Text Available The recent outbreaks of Ebola virus (EBOV infections have underlined the impact of the virus as a major threat for human health. Due to the high biosafety classification of EBOV (level 4, basic research is very limited. Therefore, the development of new avenues of thinking to advance quantitative comprehension of the virus and its interaction with the host cells is urgently neededto tackle this lethal disease. Mathematical modelling of the EBOV dynamics can be instrumental to interpret Ebola infection kinetics on quantitative grounds. To the best of our knowledge, a mathematical modelling approach to unravel the interaction between EBOV and the host cells isstill missing. In this paper, a mathematical model based on differential equations is used to represent the basic interactions between EBOV and wild-type Vero cells in vitro. Parameter sets that represent infectivity of pathogens are estimated for EBOV infection and compared with influenza virus infection kinetics. The average infecting time of wild-type Vero cells in EBOV is slower than in influenza infection. Simulation results suggest that the slow infecting time of EBOV could be compensated by its efficient replication. This study reveals several identifiability problems and what kind of experiments are necessary to advance the quantification of EBOV infection. A first mathematical approach of EBOV dynamics and the estimation of standard parametersin viral infections kinetics is the key contribution of this work, paving the way for future modelling work on EBOV infection.

  11. Preliminary data on rheological limits for grouts in the Transportable Grout Facility

    International Nuclear Information System (INIS)

    Gilliam, T.M.; McDaniel, E.W.; Dole, L.R.; West, G.A.

    1987-04-01

    This report describes a method for establishing rheological limits for grouts that can be pumped in the Hanford Transportable Grout Facility (TGF). This method is based on two models that require determining two key parameters - gel strength and density. This work also presents rheological data on grouts prepared with simulated customer phosphate wastes (CPW) and double shell slurry (DSS) from the Hanford complex. These data can be used to make preliminary estimates of operating rheological limits of the TFG grouts. The suggested design limits will include safety factors that will increase these limits significantly. 4 refs

  12. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  13. Structural identifiability analysis of a cardiovascular system model.

    Science.gov (United States)

    Pironet, Antoine; Dauby, Pierre C; Chase, J Geoffrey; Docherty, Paul D; Revie, James A; Desaive, Thomas

    2016-05-01

    The six-chamber cardiovascular system model of Burkhoff and Tyberg has been used in several theoretical and experimental studies. However, this cardiovascular system model (and others derived from it) are not identifiable from any output set. In this work, two such cases of structural non-identifiability are first presented. These cases occur when the model output set only contains a single type of information (pressure or volume). A specific output set is thus chosen, mixing pressure and volume information and containing only a limited number of clinically available measurements. Then, by manipulating the model equations involving these outputs, it is demonstrated that the six-chamber cardiovascular system model is structurally globally identifiable. A further simplification is made, assuming known cardiac valve resistances. Because of the poor practical identifiability of these four parameters, this assumption is usual. Under this hypothesis, the six-chamber cardiovascular system model is structurally identifiable from an even smaller dataset. As a consequence, parameter values computed from limited but well-chosen datasets are theoretically unique. This means that the parameter identification procedure can safely be performed on the model from such a well-chosen dataset. Thus, the model may be considered suitable for use in diagnosis. Copyright © 2016 IPEM. Published by Elsevier Ltd. All rights reserved.

  14. Recognizing limitations in eddy current testing

    International Nuclear Information System (INIS)

    Van Drunen, G.; Cecco, V.S.

    1981-11-01

    This paper addresses known limitations and constraints in eddy current nondestructive testing. Incomplete appreciation for eddy current limitations is believed to have contributed to both under-utilization and misapplication of the technique. Neither situation need arise if known limitations are recognized. Some, such as the skin depth effect, are inherent to electromagnetic test methods and define the role of eddy current testing. Others can be overcome with available technology such as surface probes to find circumferential cracks in tubes and magnetic saturation of ferromagnetic alloys to eliminate permeability effects. The variables responsible for limitations in eddy current testing are discussed and where alternative approaches exist, these are presented. Areas with potential for further research and development are also identified

  15. Identifying an outcome measure to assess the impact of Mobility Dogs.

    Science.gov (United States)

    Mudge, Suzie; Rewi, Dallas; Channon, Alexis

    2017-01-01

    Mobility Dogs® trains dogs to work with people with physical disabilities to increase independence, confidence, self-esteem and participation. Mobility Dogs® seeks to critically evaluate and improve its services as it grows. This study aimed to identify and implement a standardised outcome measure into practice at Mobility Dogs®. Based on the Consolidated Framework for Implementation Research and guided by a steering group of key stakeholders, a three-phase approach was developed to identify and assess an outcome measure. The steering group highlighted the organisation's specific needs, selected participation as the assessment domain and identified core utility requirements of the measure. A comprehensive review of evidence was undertaken to identify and rank potential measures according to the specified needs. Of the seven participation outcome measures that met inclusion criteria, the three highest ranked measures were critically evaluated by the steering group to determine suitability against the organisation's needs. The Impact on Participation and Autonomy (IPA) was selected for implementation into practice at Mobility Dogs®. Use of the IPA is an important first step for Mobility Dogs® to test the benefits of trained service dogs. This process could be replicated by other service dog organisations to identify outcome measures to assess their own services. Implications for Rehabilitation Service dogs (such as Mobility Dogs® in New Zealand) assist people living with physical impairments by performing tasks, however there is limited evidence on outcomes. The process for selecting an appropriate outcome measure for Mobility Dogs® involving partnership between Mobility Dogs® personnel and academics was an effective way to steer the project by determining important properties of the measure, before a search of the literature was undertaken. While the IPA was selected as the most appropriate outcome measure for use at Mobility Dogs®, it was the process that

  16. Key skills by design: adapting a central Web resource to departmental contexts

    Directory of Open Access Journals (Sweden)

    Claire McAvinia

    2002-12-01

    Full Text Available Web-based delivery of support materials for students has proved to be a popular way of helping small teams to implement key skills policies within universities. The development of 'key' or 'transferable' skills is now encouraged throughout education, but resources (both in terms of staffing and budget tend to be limited. It is difficult for key skills teams to see learners face to face, and not feasible to print or distribute large amounts of paper-based material. Web-based delivery presents a means of overcoming these problems but it can result in generic study skills material simply being published online without due consideration of the needs of different groups of learners within different subject disciplines. Therefore, although a centralized Website for skills provision can overcome logistical problems, it may be perceived as irrelevant or unusable by the student population. This paper presents a model for Web-based delivery of support for key skills which incorporates two separate approaches to the design of these resources. The model was implemented as part of a wider key skills pilot project at University College London, over a period of one year. It includes a 'core' Website, containing information and resources for staff and students. These can also be accessed via customized, departmental key skills homepages. This paper presents the basis for the design choices made in preparing these materials, and the evaluation of some of the pilot departments using them. It then draws some wider conclusions about the effectiveness of this design for supporting skills development.

  17. Life cycle assessment in green chemistry: overview of key parameters and methodological concerns

    DEFF Research Database (Denmark)

    Tufvesson, Linda M.; Tufvesson, Pär; Woodley, John

    2013-01-01

    assessment (LCA) is a valuable methodology. However, on the planning stage, a full-scale LCA is considered to be too time consuming and complicated. Two reasons for this have been recognised, the method is too comprehensive and it is hard to find inventory data. In this review, key parameters are presented...... with the purpose to reduce the time-consuming steps in LCA.In this review, several LCAs of so-called ‘green chemicals’ are analysed and key parameters and methodological concerns are identified. Further, some conclusions on the environmental performance of chemicals were drawn.For fossil-based platform chemicals...... chemicals was identified. The environmental performance of bulk chemicals are closely connected to the production of the raw material and thereby different land use aspects. Here, a lot can be learnt from biofuel LCAs. In many of the reviewed articles focusing on bulk chemicals a comparison regarding fossil...

  18. Use of social media in health promotion: purposes, key performance indicators, and evaluation metrics.

    Science.gov (United States)

    Neiger, Brad L; Thackeray, Rosemary; Van Wagenen, Sarah A; Hanson, Carl L; West, Joshua H; Barnes, Michael D; Fagen, Michael C

    2012-03-01

    Despite the expanding use of social media, little has been published about its appropriate role in health promotion, and even less has been written about evaluation. The purpose of this article is threefold: (a) outline purposes for social media in health promotion, (b) identify potential key performance indicators associated with these purposes, and (c) propose evaluation metrics for social media related to the key performance indicators. Process evaluation is presented in this article as an overarching evaluation strategy for social media.

  19. Large-scale recruitment limitation in Mediterranean pines : The role of Quercus ilex and forest successional advance as key regional drivers

    NARCIS (Netherlands)

    Carnicer, Jofre; Coll, Marta; Pons, Xavier; Ninyerola, Miquel; Vayreda, Jordi; Penuelas, Josep

    Aim Large-scale patterns of limitations in tree recruitment remain poorly described in the Mediterranean Basin, and this information is required to assess the impacts of global warming on forests. Here, we unveil the existence of opposite trends of recruitment limitation between the dominant genera

  20. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.