WorldWideScience

Sample records for intrinsically secure fast

  1. Intrinsically secure fast reactors with dense cores

    International Nuclear Information System (INIS)

    Slessarev, Igor

    2007-01-01

    Secure safety, resistance to weapons material proliferation and problems of long-lived wastes remain the most important 'painful points' of nuclear power. Many innovative reactor concepts have been developed aimed at a radical enhancement of safety. The promising potential of innovative nuclear reactors allows for shifting accents in current reactor safety 'strategy' to reveal this worth. Such strategy is elaborated focusing on the priority for intrinsically secure safety features as well as on sure protection being provided by the first barrier of defence. Concerning the potential of fast reactors (i.e. sodium cooled, lead-cooled, etc.), there are no doubts that they are able to possess many favourable intrinsically secure safety features and to lay the proper foundation for a new reactor generation. However, some of their neutronic characteristics have to be radically improved. Among intrinsically secure safety properties, the following core parameters are significantly important: reactivity margin values, reactivity feed-back and coolant void effects. Ways of designing intrinsically secure safety features in fast reactors (titled hereafter as Intrinsically Secure Fast Reactors - ISFR) can be found in the frame of current reactor technologies by radical enhancement of core neutron economy and by optimization of core compositions. Simultaneously, respecting resistance to proliferation, by using non-enriched fuel feed as well as a core breeding gain close to zero, are considered as the important features (long-lived waste problems will be considered in a separate paper). This implies using the following reactor design options as well as closed fuel cycles with natural U as the reactor feed: ·Ultra-plate 'dense cores' of the ordinary (monolithic) type with negative total coolant void effects. ·Modular type cores. Multiple dense modules can be embedded in the common reflector for achieving the desired NPP total power. The modules can be used also independently (as

  2. Enhancing MISP with Fast Mobile IPv6 Security

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2011-01-01

    Full Text Available The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.

  3. Fast and maliciously secure two-party computation using the GPU

    DEFF Research Database (Denmark)

    Frederiksen, Tore Kasper; Nielsen, Jesper Buus

    2013-01-01

    We describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. Our protocol is based on Yao’s garbled circuit and an efficient OT extension. The implementation is done using CUDA and yields fast results for maliciously secure two-party compu......-party computation in a financially feasible and practical setting by using a consumer grade CPU and GPU. Our protocol further uses some novel constructions in order to combine garbled circuits and an OT extension in a parallel and maliciously secure setting.......We describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. Our protocol is based on Yao’s garbled circuit and an efficient OT extension. The implementation is done using CUDA and yields fast results for maliciously secure two...

  4. Fast hydrogen exchange affects 15N relaxation measurements in intrinsically disordered proteins

    International Nuclear Information System (INIS)

    Kim, Seho; Wu, Kuen-Phon; Baum, Jean

    2013-01-01

    Unprotected amide protons can undergo fast hydrogen exchange (HX) with protons from the solvent. Generally, NMR experiments using the out-and-back coherence transfer with amide proton detection are affected by fast HX and result in reduced signal intensity. When one of these experiments, 1 H– 15 N HSQC, is used to measure the 15 N transverse relaxation rate (R 2 ), the measured R 2 rate is convoluted with the HX rate (k HX ) and has higher apparent R 2 values. Since the 15 N R 2 measurement is important for analyzing protein backbone dynamics, the HX effect on the R 2 measurement is investigated and described here by multi-exponential signal decay. We demonstrate these effects by performing 15 N R 2 CPMG experiments on α-synuclein, an intrinsically disordered protein, in which the amide protons are exposed to solvent. We show that the HX effect on R 2 CPMG can be extracted by the derived equation. In conclusion, the HX effect may be pulse sequence specific and results from various sources including the J coupling evolution, the change of steady state water proton magnetization, and the D 2 O content in the sample. To avoid the HX effect on the analysis of relaxation data of unprotected amides, it is suggested that NMR experimental conditions insensitive to the HX should be considered or that intrinsic R 2 CPMG values be obtained by methods described herein.

  5. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  6. Intrinsically secure fast reactors for long-lived waste free and proliferation resistant nuclear power

    International Nuclear Information System (INIS)

    Slessarev, Igor

    2008-01-01

    This paper provides description of a nuclear reactor concept aimed towards a radical safety enhancement, an increased proliferation resistance, as well as a realisation of a 'long-lived waste free' NP development. It emphasizes the achievement of considerable reduction ('by design') of residual actinides in the waste streams and of the most hazardous long-lived fission products. It allows to implement only small volume of repositories for the radioactive waste (mostly fission products) and to postpone the technically arduous problems of a large scale disposal of the long-lived wastes until the next millennium, i.e. up to the exhaustion of the fertile natural resources and/or the emergence of more effective technologies of nuclide separation/transmutation. A thorough incineration/transmutation of the wastes (residual actinides in the mixture with lanthanides as well as of the most hazardous fission products) under reactor neutron flux is proposed for their mass reduction. A gradual growth of NP park is necessary for increasing the NP park capacity for waste irradiation. This 'constraint' is not really limiting because it coincides with the permanently growing demands in energy production. The potential of long-lived waste reduction depends on the total fertile fuel resources and on NP growth rate. It was shown that the accumulated actinide long-lived radioactive masses will be reduced significantly: by factor in the range of 10 4 -10 8 in magnitude (compared with LWR once-through cycle) and by 10 2 -10 6 (compared with the ordinary fast reactor park). Thus, the total long-lived waste toxicity pollution source might be comparable with the 'burnt away' toxicity of the natural fertile feed stream. This is quite realistic taking into account the large fertile fuel (U/Th) world-wide resources which provide the NP growth for a sustained time. Along side with the radical intrinsic safety improvement, a further enhancement of core physics ('neutronics') is one of the

  7. Live-cell super-resolution imaging of intrinsically fast moving flagellates

    International Nuclear Information System (INIS)

    Glogger, M; Subota, I; Spindler, M-C; Engstler, M; Fenz, S F; Stichler, S; Bertlein, S; Teßmar, J; Groll, J

    2017-01-01

    Recent developments in super-resolution microscopy make it possible to resolve structures in biological cells at a spatial resolution of a few nm and observe dynamical processes with a temporal resolution of ms to μ s. However, the optimal structural resolution requires repeated illumination cycles and is thus limited to chemically fixed cells. For live cell applications substantial improvement over classical Abbe-limited imaging can already be obtained in adherent or slow moving cells. Nonetheless, a large group of cells are fast moving and thus could not yet be addressed with live cell super-resolution microscopy. These include flagellate pathogens like African trypanosomes, the causative agents of sleeping sickness in humans and nagana in livestock. Here, we present an embedding method based on a in situ forming cytocompatible UV-crosslinked hydrogel. The fast cross-linking hydrogel immobilizes trypanosomes efficiently to allow microscopy on the nanoscale. We characterized both the trypanosomes and the hydrogel with respect to their autofluorescence properties and found them suitable for single-molecule fluorescence microscopy (SMFM). As a proof of principle, SMFM was applied to super-resolve a structure inside the living trypanosome. We present an image of a flagellar axoneme component recorded by using the intrinsic blinking behavior of eYFP. (paper)

  8. Fast hydrogen exchange affects {sup 15}N relaxation measurements in intrinsically disordered proteins

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Seho; Wu, Kuen-Phon; Baum, Jean, E-mail: jean.baum@rutgers.edu [Rutgers University, Department of Chemistry and Chemical Biology (United States)

    2013-03-15

    Unprotected amide protons can undergo fast hydrogen exchange (HX) with protons from the solvent. Generally, NMR experiments using the out-and-back coherence transfer with amide proton detection are affected by fast HX and result in reduced signal intensity. When one of these experiments, {sup 1}H-{sup 15}N HSQC, is used to measure the {sup 15}N transverse relaxation rate (R{sub 2}), the measured R{sub 2} rate is convoluted with the HX rate (k{sub HX}) and has higher apparent R{sub 2} values. Since the {sup 15}N R{sub 2} measurement is important for analyzing protein backbone dynamics, the HX effect on the R{sub 2} measurement is investigated and described here by multi-exponential signal decay. We demonstrate these effects by performing {sup 15}N R{sub 2}{sup CPMG} experiments on {alpha}-synuclein, an intrinsically disordered protein, in which the amide protons are exposed to solvent. We show that the HX effect on R{sub 2}{sup CPMG} can be extracted by the derived equation. In conclusion, the HX effect may be pulse sequence specific and results from various sources including the J coupling evolution, the change of steady state water proton magnetization, and the D{sub 2}O content in the sample. To avoid the HX effect on the analysis of relaxation data of unprotected amides, it is suggested that NMR experimental conditions insensitive to the HX should be considered or that intrinsic R{sub 2}{sup CPMG} values be obtained by methods described herein.

  9. Secure Route Structures for Parallel Mobile Agents Based Systems Using Fast Binary Dispatch

    Directory of Open Access Journals (Sweden)

    Yan Wang

    2005-01-01

    Full Text Available In a distributed environment, where a large number of computers are connected together to enable the large-scale sharing of data and computing resources, agents, especially mobile agents, are the tools for autonomously completing tasks on behalf of their owners. For applications of large-scale mobile agents, security and efficiency are of great concern. In this paper, we present a fast binary dispatch model and corresponding secure route structures for mobile agents dispatched in parallel to protect the dispatch routes of agents while ensuring the dispatch efficiency. The fast binary dispatch model is simple but efficient with a dispatch complexity of O(log2n. The secure route structures adopt the combination of public-key encryption and digital signature schemes and expose minimal route information to hosts. The nested structure can help detect attacks as early as possible. We evaluated the various models both analytically and empirically.

  10. Which Extrinsic and Intrinsic Factors are Associated with Non-Contact Injuries in Adult Cricket Fast Bowlers?

    Science.gov (United States)

    Olivier, Benita; Taljaard, Tracy; Burger, Elaine; Brukner, Peter; Orchard, John; Gray, Janine; Botha, Nadine; Stewart, Aimee; Mckinon, Warrick

    2016-01-01

    The high prevalence of injury amongst cricket fast bowlers exposes a great need for research into the risk factors associated with injury. Both extrinsic (environment-related) and intrinsic (person-related) risk factors are likely to be implicated within the high prevalence of non-contact injury amongst fast bowlers in cricket. Identifying and defining the relative importance of these risk factors is necessary in order to optimize injury prevention efforts. The objective of this review was to assess and summarize the scientific literature related to the extrinsic and intrinsic factors associated with non-contact injury inherent to adult cricket fast bowlers. A systematic review was performed in compliance with the PRISMA guidelines. This review considered both experimental and epidemiological study designs. Studies that included male cricket fast bowlers aged 18 years or above, from all levels of play, evaluating the association between extrinsic/intrinsic factors and injury in fast bowlers were considered for inclusion. The three-step search strategy aimed at finding both published and unpublished studies from all languages. The searched databases included MEDLINE via PubMed, Cumulative Index to Nursing and Allied Health Literature (CINAHL), the Cochrane Controlled Trials Register in the Cochrane Library, Physiotherapy Evidence Database (PEDro), ProQuest 5000 International, ProQuest Health and Medical Complete, EBSCO MegaFile Premier, Science Direct, SPORTDiscus with Full Text and SCOPUS (prior to 28 April 2015). Initial keywords used were 'cricket', 'pace', 'fast', 'bowler', and 'injury'. Papers which fitted the inclusion criteria were assessed by two independent reviewers for methodological validity prior to inclusion in the review using standardized critical appraisal instruments from the Joanna Briggs Institute Meta Analysis of Statistics Assessment and Review Instrument (JBI-MAStARI). A total of 16 studies were determined to be suitable for inclusion in this

  11. Live-cell super-resolution imaging of intrinsically fast moving flagellates

    Science.gov (United States)

    Glogger, M.; Stichler, S.; Subota, I.; Bertlein, S.; Spindler, M.-C.; Teßmar, J.; Groll, J.; Engstler, M.; Fenz, S. F.

    2017-02-01

    Recent developments in super-resolution microscopy make it possible to resolve structures in biological cells at a spatial resolution of a few nm and observe dynamical processes with a temporal resolution of ms to μs. However, the optimal structural resolution requires repeated illumination cycles and is thus limited to chemically fixed cells. For live cell applications substantial improvement over classical Abbe-limited imaging can already be obtained in adherent or slow moving cells. Nonetheless, a large group of cells are fast moving and thus could not yet be addressed with live cell super-resolution microscopy. These include flagellate pathogens like African trypanosomes, the causative agents of sleeping sickness in humans and nagana in livestock. Here, we present an embedding method based on a in situ forming cytocompatible UV-crosslinked hydrogel. The fast cross-linking hydrogel immobilizes trypanosomes efficiently to allow microscopy on the nanoscale. We characterized both the trypanosomes and the hydrogel with respect to their autofluorescence properties and found them suitable for single-molecule fluorescence microscopy (SMFM). As a proof of principle, SMFM was applied to super-resolve a structure inside the living trypanosome. We present an image of a flagellar axoneme component recorded by using the intrinsic blinking behavior of eYFP. , which features invited work from the best early-career researchers working within the scope of J Phys D. This project is part of the Journal of Physics series’ 50th anniversary celebrations in 2017. Susanne Fenz was selected by the Editorial Board of J Phys D as an Emerging Talent/Leader.

  12. A Novel Fast and Secure Approach for Voice Encryption Based on DNA Computing

    Science.gov (United States)

    Kakaei Kate, Hamidreza; Razmara, Jafar; Isazadeh, Ayaz

    2018-06-01

    Today, in the world of information communication, voice information has a particular importance. One way to preserve voice data from attacks is voice encryption. The encryption algorithms use various techniques such as hashing, chaotic, mixing, and many others. In this paper, an algorithm is proposed for voice encryption based on three different schemes to increase flexibility and strength of the algorithm. The proposed algorithm uses an innovative encoding scheme, the DNA encryption technique and a permutation function to provide a secure and fast solution for voice encryption. The algorithm is evaluated based on various measures including signal to noise ratio, peak signal to noise ratio, correlation coefficient, signal similarity and signal frequency content. The results demonstrate applicability of the proposed method in secure and fast encryption of voice files

  13. Unified compression and encryption algorithm for fast and secure network communications

    International Nuclear Information System (INIS)

    Rizvi, S.M.J.; Hussain, M.; Qaiser, N.

    2005-01-01

    Compression and encryption of data are two vital requirements for the fast and secure transmission of data in the network based communications. In this paper an algorithm is presented based on adaptive Huffman encoding for unified compression and encryption of Unicode encoded textual data. The Huffman encoding weakness that same tree is needed for decoding is utilized in the algorithm presented as an extra layer of security, which is updated whenever the frequency change is above the specified threshold level. The results show that we get compression comparable to popular zip format and in addition to that data has got an additional layer of encryption that makes it more secure. Thus unified algorithm presented here can be used for network communications between different branches of banks, e- Government programs and national database and registration centers where data transmission requires both compression and encryption. (author)

  14. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    International Nuclear Information System (INIS)

    Boaron, Alberto; Korzh, Boris; Boso, Gianluca; Martin, Anthony; Zbinden, Hugo; Houlmann, Raphael; Lim, Charles Ci Wen

    2016-01-01

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. However, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) has been proposed to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. Here, we analyze the security of DDI-QKD and elucidate its security assumptions. We find that DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.

  15. A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform

    Directory of Open Access Journals (Sweden)

    Srinivas Koppu

    2017-01-01

    Full Text Available An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. We have achieved fast encryption and decryption along with privacy of images. The pseudorandom generator has been used along with Lanczos algorithm to generate root characteristics and eigenvectors. Using hybrid CMT image, pixels are shuffled to accomplish excellent randomness. Compared with existing methods, the proposed method had more robustness to various attacks: brute-force attack, known cipher plaintext, chosen-plaintext, security key space, key sensitivity, correlation analysis and information entropy, and differential attacks. Simulation results show that the proposed methods give better result in protecting images with low-time complexity.

  16. CryptosFS: Fast Cryptographic Secure NFS

    OpenAIRE

    O'Shanahan, Declan

    2000-01-01

    The issue of security in file-systems is as relevant today as when the first file system was developed. Current file system implementations rely heavily on centralised security mechanisms such as access control lists. The problem of security in file systems was made more complicated by the introduction of remote access to files. Storing information on a remote server has the potential to introduce additional security weaknesses into the file system model. The client, the commun...

  17. He-4 fast neutron detectors in nuclear security applications

    International Nuclear Information System (INIS)

    Murer, D. E.

    2014-01-01

    This work presents studies of "4He fast neutron detectors for nuclear security applications. Such devices are high pressure gas scintillation detectors, sensitive to neutrons in the energy range of fission sources. First, an introduction to the scope of the intended application is given. This is followed by a description of all components relevant to the operation of the detector. The next chapter presents studies of various characteristics of the neutron detector, among them properties of its scintillation response, differences between neutron and gamma interactions and effects of the light collection process. The results of the detector characterization are used to develop neutron gamma discrimination methods. These methods are put to the test using measurements with a high gamma flux, and the results are compared to performance requirements of Radiation Portal Monitors. Background neutron measurements are presented next. Measured neutron rates are compared to values published in scientific literature. The fluctuation of the background count rate was studied, and the contribution of muons evaluated. Two applications of the detectors in the field of nuclear security are discussed in the last two chapters. The first one is a novel method to measure the plutonium mass in a container filled with Mixed Oxide Fuel. The last chapter presents the development of a Radiation Portal Monitor which, in addition to neutron and gamma counting, exploits time correlation to detect threats such as plutonium and "6"0Co. (author)

  18. He-4 fast neutron detectors in nuclear security applications

    Energy Technology Data Exchange (ETDEWEB)

    Murer, D. E.

    2014-07-01

    This work presents studies of {sup 4}He fast neutron detectors for nuclear security applications. Such devices are high pressure gas scintillation detectors, sensitive to neutrons in the energy range of fission sources. First, an introduction to the scope of the intended application is given. This is followed by a description of all components relevant to the operation of the detector. The next chapter presents studies of various characteristics of the neutron detector, among them properties of its scintillation response, differences between neutron and gamma interactions and effects of the light collection process. The results of the detector characterization are used to develop neutron gamma discrimination methods. These methods are put to the test using measurements with a high gamma flux, and the results are compared to performance requirements of Radiation Portal Monitors. Background neutron measurements are presented next. Measured neutron rates are compared to values published in scientific literature. The fluctuation of the background count rate was studied, and the contribution of muons evaluated. Two applications of the detectors in the field of nuclear security are discussed in the last two chapters. The first one is a novel method to measure the plutonium mass in a container filled with Mixed Oxide Fuel. The last chapter presents the development of a Radiation Portal Monitor which, in addition to neutron and gamma counting, exploits time correlation to detect threats such as plutonium and {sup 60}Co. (author)

  19. The fast reactor

    International Nuclear Information System (INIS)

    1980-02-01

    The subject is discussed as follows: brief description of fast reactors; advantage in conserving uranium resources; experience, in UK and elsewhere, in fast reactor design, construction and operation; safety; production of plutonium, security aspects; consideration of future UK fast reactor programme. (U.K.)

  20. Ultra-fast secure communication with complex systems in classical channels (Conference Presentation)

    KAUST Repository

    Mazzone, Valerio

    2017-04-28

    Developing secure communications is a research area of growing interest. During the past years, several cryptographic schemes have been developed, with Quantum cryptography being a promising scheme due to the use of quantum effects, which make very difficult for an eavesdropper to intercept the communication. However, practical quantum key distribution methods have encountered several limitations; current experimental realizations, in fact, fail to scale up on long distances, as well as in providing unconditional security and speed comparable to classical optical communications channels. Here we propose a new, low cost and ultra-fast cryptographic system based on a fully classical optical channel. Our cryptographic scheme exploits the complex synchronization of two different random systems (one on the side of the sender and another on the side of the receiver) to realize a “physical” one paid system. The random medium is created by an optical chip fabricated through electron beam lithography on a Silicon On Insulator (SOI) substrate. We present experiments with ps lasers and commercial fibers, showing the ultrafast distribution of a random key between two users (Alice and Bob), with absolute no possibility for a passive/active eavesdropper to intercept the communication. Remarkably, this system enables the same security of quantum cryptography, but with the use of a classical communication channel. Our system exploits a unique synchronization that exists between two different random systems, and at such is extremely versatile and can enable safe communications among different users in standards telecommunications channels.

  1. A framework for fast and secure packaging identification on mobile phones

    Science.gov (United States)

    Diephuis, Maurits; Voloshynovskiy, Svyatoslav; Holotyak, Taras; Stendardo, Nabil; Keel, Bruno

    2014-02-01

    In this paper, we address the problem of fast and secure packaging identification on mobile phones. It is a well known fact that consumer goods are counterfeited on a massive scale in certain regions of the world, illustrating how existing counter measures fall short or don't exist at all, as can be seen in the local absence of laws pertaining to brand protection. This paper introduces a technological tool that allows the consumer to quickly identify a product or package with a mobile device using a physical non-cloneable features in the form of a surface micro- structure image. This natural occurring identifier allows a producer or brand owner to track and trace all its products and gives the consumer a powerful tool to confirm the authenticity of an offered product.

  2. Effects of Nuclear Energy on Sustainable Development and Energy Security: Sodium-Cooled Fast Reactor Case

    Directory of Open Access Journals (Sweden)

    Sungjoo Lee

    2016-09-01

    Full Text Available We propose a stepwise method of selecting appropriate indicators to measure effects of a specific nuclear energy option on sustainable development and energy security, and also to compare an energy option with another. Focusing on the sodium-cooled fast reactor, one of the highlighted Generation IV reactors, we measure and compare its effects with the standard pressurized water reactor-based nuclear power, and then with coal power. Collecting 36 indicators, five experts select seven key indicators to meet data availability, nuclear energy relevancy, comparability among energy options, and fit with Korean energy policy objectives. The results show that sodium-cooled fast reactors is a better alternative than existing nuclear power as well as coal electricity generation across social, economic and environmental dimensions. Our method makes comparison between energy alternatives easier, thereby clarifying consequences of different energy policy decisions.

  3. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  4. Survey of Cyber Security Intrinsic for a Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Yoo Rark; Lee, Jae Cheol [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2009-05-15

    Federal agencies are facing a set of emerging cyber security threats that are the result of increasingly sophisticated methods of attack and the blending of once distinct types of attack into more complex and damaging forms. Spam, phishing, and spyware, while once viewed as discrete consumer challenges, are being blended to create substantial threats to large enterprises, including federal systems and digital I and C of a NPP (Nuclear Power Plant) is one of them. The cyber security policy for a NPP has been established for years by KINS, but its scope is very broad and conceptual. We will describe several important cyber security issues for a NPP in the applicative boundary.

  5. Survey of Cyber Security Intrinsic for a Nuclear Power Plant

    International Nuclear Information System (INIS)

    Choi, Yoo Rark; Lee, Jae Cheol

    2009-01-01

    Federal agencies are facing a set of emerging cyber security threats that are the result of increasingly sophisticated methods of attack and the blending of once distinct types of attack into more complex and damaging forms. Spam, phishing, and spyware, while once viewed as discrete consumer challenges, are being blended to create substantial threats to large enterprises, including federal systems and digital I and C of a NPP (Nuclear Power Plant) is one of them. The cyber security policy for a NPP has been established for years by KINS, but its scope is very broad and conceptual. We will describe several important cyber security issues for a NPP in the applicative boundary

  6. The Subaru FMOS galaxy redshift survey (FastSound). V. Intrinsic alignments of emission-line galaxies at z ˜ 1.4

    Science.gov (United States)

    Tonegawa, Motonari; Okumura, Teppei; Totani, Tomonori; Dalton, Gavin; Glazebrook, Karl; Yabe, Kiyoto

    2018-04-01

    Intrinsic alignments (IA), the coherent alignment of intrinsic galaxy orientations, can be a source of a systematic error of weak lensing surveys. The redshift evolution of IA also contains information about the physics of galaxy formation and evolution. This paper presents the first measurement of IA at high redshift, z ˜ 1.4, using the spectroscopic catalog of blue star-forming galaxies of the FastSound redshift survey, with the galaxy shape information from the Canada-Hawaii-France telescope lensing survey. The IA signal is consistent with zero with power-law amplitudes fitted to the projected correlation functions for density-shape and shape-shape correlation components, Aδ+ = -0.0071 ± 0.1340 and A++ = -0.0505 ± 0.0848, respectively. These results are consistent with those obtained from blue galaxies at lower redshifts (e.g., A _{δ +}=0.0035_{-0.0389}^{+0.0387} and A_{++}=0.0045_{-0.0168}^{+0.0166} at z = 0.51 from the WiggleZ survey). The upper limit of the constrained IA amplitude corresponds to a few percent contamination to the weak-lensing shear power spectrum, resulting in systematic uncertainties on the cosmological parameter estimations by -0.052 < Δσ8 < 0.039 and -0.039 < ΔΩm < 0.030.

  7. Development of a security-by-design handbook

    International Nuclear Information System (INIS)

    Olson, David L.; Snell, Mark Kamerer; Iida, Toru; Ochiai, Kazuya; Tanuma, Koji

    2010-01-01

    There is an increasing awareness that efficient and effective nuclear facility design is best achieved when requirements from the 3S disciplines Safety, Safeguards, and Security - are balanced and intrinsic to the facility design. This can be achieved when policy, processes, methods, and technologies are understood and applied in these areas during all phases of the design process. For the purposes of this paper, Security-by-design will be defined as the system level incorporation of the physical protection system (PPS) into a new or retrofitted nuclear power plant (NPP) or nuclear facility (NF) resulting in intrinsic security. Security-by-design can also be viewed as a framework to achieve robust and durable security systems. This paper reports on work performed to date to create a Security-by-Design Handbook, under a bilateral agreement between the United States and Japan, specifically, a review of physical protection principles and best practices, and a decommissioning to better understand where these principles and practices can be applied. This paper describes physical protection principles and best practices to achieve security-by- design that were gathered from International, Japanese, and U.S. sources. Principles are included for achieving security early in the design process where security requirements are typically less costly and easier to incorporate. The paper then describes a generic design process that covers the entire facility lifecycle from scoping and planning of the project to decommissioning and decontamination. Early design process phases, such as conceptual design, offer opportunities to add security features intrinsic to the facility design itself. Later phases, including design engineering and construction, are important for properly integrating security features into a coherent design and for planning for and assuring the proper performance of the security system during the operation and decommissioning of the facility. The paper also

  8. Intrinsic disorder here, there, and everywhere, and nowhere to escape from it.

    Science.gov (United States)

    Uversky, Vladimir N

    2017-09-01

    The concept of protein intrinsic disorder persistently penetrates into all areas of modern protein science. It cannot be ignored anymore, and cannot be shrugged off, as it represents a vital feature (or, more correctly, a broad spectrum of important features), which, when added to and mixed with features arising from the well established protein structure-function paradigm, complete the picture of a functioning protein. The field of protein intrinsic disorder is very dynamic and fast developing. This Multi-Author Review represents a snapshot of this field by introducing some recent advances. Articles assembled in this Multi-Author Review introduce some of the new aspects of intrinsic disorder, outline some fascinating ideas related to the intrinsically disordered proteins, their structure, and functionality, and show challenges related to the analysis of proteins carrying intrinsic disorder.

  9. Audit Teknologiinformasiatas Physical Security Control Dan Logical Security Control Serta Penentuan Kondisi Security Risk Studi Kasus: PT Talc Indonesia

    OpenAIRE

    Inggrid; Arfianti, Rizka I; Utami, Viany

    2009-01-01

    Abstract The fast growth of technology has an impact to the accounting field. This relates to the term of information technology (17) auditing. One of the risI6 of using information technology in business which can be fatal enough i fignored is security risk Security risk can be reduced by security controls which include physical security control and logical security contra Information technology auditing is the process of collecting and evaluating evidence to determine whether or not a co...

  10. Intrinsic information Security: Embedding security issues in the design process of telematics systems

    NARCIS (Netherlands)

    Tettero, Olaf; Tettero, O.

    This book presents a systematic approach to embed information security issues in the design process of telematics systems. The approach supports both designers and user organisations. We elaborate on the activities that designers should perform to design telematics systems in which information

  11. Percentage of Fast-Track Receipts

    Data.gov (United States)

    Social Security Administration — The dataset provides the percentage of fast-track receipts by state during the reporting fiscal year. Fast-tracked cases consist of those cases identified as Quick...

  12. Assessing and managing security risk in IT systems a structured methodology

    CERN Document Server

    McCumber, John

    2004-01-01

    SECURITY CONCEPTSUsing ModelsIntroduction: Understanding, Selecting, and Applying Models Understanding AssetsLayered Security Using Models in Security Security Models for Information Systems Shortcomings of Models in SecuritySecurity in Context Reference Defining Information SecurityConfidentiality, Integrity, and Availability Information AttributesIntrinsic versus Imputed Value Information as an Asset The Elements of Security Security Is Security Only in Context Information as an Asset Introduction Determining Value Managing Information Resources ReferencesUnderstanding Threat and Its Relatio

  13. Fast neutrons dosimetry

    International Nuclear Information System (INIS)

    Rzyski, B.M.

    1977-01-01

    A proton recoil technique has been developed for inducing thermoluminescence with incident fast neutrons. CaF 2 was used as the TL phosphor, and cane sugar and polyethylene were used as proton radiators. The phosphor and the hydrogeneous material powders were well mixed, encapsulated in glass tubes and exposed to Am-Be sources, resulting in recoils from incident fast neutrons of energy between 0,25 and 11,25 MeV. The intrinsic response of pure CaF 2 to fast neutrons without a hydrogeneous radiator was checked by using LiF (TLD-700). Glow curves were recorded from room temperature up to 350 0 C after different doses of neutrons and gamma rays of 60 Co. First collision dose due to fast neutrons in tissue like materials such as cane sugar and polyethylene was also calculated [pt

  14. Fast reactors and problems in their development. Chapter 6

    International Nuclear Information System (INIS)

    Dombey, N.

    1980-01-01

    The main differences between fast reactors, in particular the liquid-metal fast breeder reactor (LMFBR), and thermal reactors are discussed. The view is taken, based on the intrinsic physics of the systems, that fast reactors should be considered as a different genus from thermal reactors. Some conclusions are drawn for fast reactor development generally and for the British programme in particular. Physics, economics and safety aspects are covered. (U.K.)

  15. Digested disorder: Quarterly intrinsic disorder digest (July-August-September, 2013).

    Science.gov (United States)

    Reddy, Krishna D; DeForte, Shelly; Uversky, Vladimir N

    2014-01-01

    The current literature on intrinsically disordered proteins grows fast. To keep interested readers up to speed with this literature, we continue a "Digested Disorder" project and represent a new issue of reader's digest of the research papers and reviews on intrinsically disordered proteins. The only 2 criteria for inclusion in this digest are the publication date (a paper should be published within the covered time frame) and topic (a paper should be dedicated to any aspect of protein intrinsic disorder). The current digest issue covers papers published during the third quarter of 2013; i.e., during the period of June, July, and September of 2013. Similar to previous issues, the papers are grouped hierarchically by topics they cover, and for each of the included paper a short description is given on its major findings.

  16. Intrinsic Risk Factors of Lateral Ankle Sprain: A Systematic Review and Meta-analysis.

    Science.gov (United States)

    Kobayashi, Takumi; Tanaka, Masashi; Shida, Masahiro

    2016-01-01

    Lateral ankle ligamentous sprain (LAS) is one of the most common injuries in recreational activities and competitive sports. Many studies have attempted to determine whether there are certain intrinsic factors that can predict LAS. However, no consensus has been reached on the predictive intrinsic factors. To identify the intrinsic risk factors of LAS by meta-analysis from data in randomized control trials and prospective cohort studies. A systematic computerized literature search of MEDLINE, CINAHL, ScienceDirect, SPORTDiscus, and Cochrane Register of Clinical Trials was performed. A computerized literature search from inception to January 2015 resulted in 1133 studies of the LAS intrinsic risk factors written in English. Systematic review. Level 4. The modified quality index was used to assess the quality of the design of the papers and the standardized mean difference was used as an index to pool included study outcomes. Eight articles were included in this systematic review. Meta-analysis results showed that body mass index, slow eccentric inversion strength, fast concentric plantar flexion strength, passive inversion joint position sense, and peroneus brevis reaction time correlated with LAS. Body mass index, slow eccentric inversion strength, fast concentric plantar flexion strength, passive inversion joint position sense, and the reaction time of the peroneus brevis were associated with significantly increased risk of LAS.

  17. Entropy Squeezing in Coupled Field-Superconducting Charge Qubit with Intrinsic Decoherence

    Institute of Scientific and Technical Information of China (English)

    YAN Xue-Qun; SHAO Bin; ZOU Jian

    2007-01-01

    We investigate the entropy squeezing in the system of a superconducting charge qubit coupled to a single mode field. We find an exact solution of the Milburn equation for the system and discuss the influence of intrinsic decoherence on entropy squeezing. As a comparison, we also consider the variance squeezing. Our results show that in the absence of the intrinsic decoherence both entropy and variance squeezings have the same periodic properties of time,and occur at the same range of time. However, when the intrinsic decoherence is considered, we find that as the time going on the entropy squeezing disappears fast than the variance squeezing, there exists a range of time where entropy squeezing can occur but variance squeezing cannot.

  18. FAST: FAST Analysis of Sequences Toolbox

    Directory of Open Access Journals (Sweden)

    Travis J. Lawrence

    2015-05-01

    Full Text Available FAST (FAST Analysis of Sequences Toolbox provides simple, powerful open source command-line tools to filter, transform, annotate and analyze biological sequence data. Modeled after the GNU (GNU’s Not Unix Textutils such as grep, cut, and tr, FAST tools such as fasgrep, fascut, and fastr make it easy to rapidly prototype expressive bioinformatic workflows in a compact and generic command vocabulary. Compact combinatorial encoding of data workflows with FAST commands can simplify the documentation and reproducibility of bioinformatic protocols, supporting better transparency in biological data science. Interface self-consistency and conformity with conventions of GNU, Matlab, Perl, BioPerl, R and GenBank help make FAST easy and rewarding to learn. FAST automates numerical, taxonomic, and text-based sorting, selection and transformation of sequence records and alignment sites based on content, index ranges, descriptive tags, annotated features, and in-line calculated analytics, including composition and codon usage. Automated content- and feature-based extraction of sites and support for molecular population genetic statistics makes FAST useful for molecular evolutionary analysis. FAST is portable, easy to install and secure thanks to the relative maturity of its Perl and BioPerl foundations, with stable releases posted to CPAN. Development as well as a publicly accessible Cookbook and Wiki are available on the FAST GitHub repository at https://github.com/tlawrence3/FAST. The default data exchange format in FAST is Multi-FastA (specifically, a restriction of BioPerl FastA format. Sanger and Illumina 1.8+ FastQ formatted files are also supported. FAST makes it easier for non-programmer biologists to interactively investigate and control biological data at the speed of thought.

  19. Fast and precise method of contingency ranking in modern power system

    DEFF Research Database (Denmark)

    Rather, Zakir Hussain; Chen, Zhe; Thøgersen, Paul

    2011-01-01

    Contingency Analysis is one of the most important aspect of Power System Security Analysis. This paper presents a fast and precise method of contingency ranking for effective power system security analysis. The method proposed in this research work takes due consideration of both apparent power o...... is based on realistic approach taking practical situations into account. Besides taking real situations into consideration the proposed method is fast enough to be considered for on-line security analysis.......Contingency Analysis is one of the most important aspect of Power System Security Analysis. This paper presents a fast and precise method of contingency ranking for effective power system security analysis. The method proposed in this research work takes due consideration of both apparent power...

  20. Application of direct agglutination test (DAT) and fast agglutination screening test (FAST) for sero-diagnosis of visceral leishmaniasis in endemic area of Minas Gerais, Brazil

    NARCIS (Netherlands)

    Silva, Eduardo S.; Schoone, Gerard J.; Gontijo, Celia M. F.; Brazil, Reginaldo P.; Pacheco, Raquel S.; Schallig, Henk D. F. H.

    2005-01-01

    The direct agglutination test (DAT) has proved to be a very important sero-diagnostic tool combining high levels of intrinsic validity and ease of performance. Otherwise, fast agglutination screening test (FAST) utilises only one serum dilution making the test very suitable for the screening of

  1. Health Security and Risk Aversion.

    Science.gov (United States)

    Herington, Jonathan

    2016-09-01

    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (i) that security is intrinsically valuable, (ii) that it is necessary for social planning and (iii) that it is an appropriate response to decision-making in contexts of very limited information. Striking the right balance between securing and maximizing population health thus requires a substantive, and hitherto unrecognized, value judgment. Finally, I critically evaluate the current health security agenda in light of this new account of the concept and its relationship to the other aims of public health policy. © 2016 John Wiley & Sons Ltd.

  2. Android Applications Security

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2011-01-01

    Full Text Available The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the architecture of a mobile security system for Android devices.

  3. VMware view security essentials

    CERN Document Server

    Langenhan, Daniel

    2013-01-01

    A practical and fast-paced guide that gives you all the information you need to secure your virtual environment.This book is a ""how-to"" for the novice, a ""reference guide"" for the advanced user, and a ""go to"" for the experienced user in all the aspects of VMware View desktop virtualization security.

  4. Direct measurement of the intrinsic ankle stiffness during standing.

    Science.gov (United States)

    Vlutters, M; Boonstra, T A; Schouten, A C; van der Kooij, H

    2015-05-01

    Ankle stiffness contributes to standing balance, counteracting the destabilizing effect of gravity. The ankle stiffness together with the compliance between the foot and the support surface make up the ankle-foot stiffness, which is relevant to quiet standing. The contribution of the intrinsic ankle-foot stiffness to balance, and the ankle-foot stiffness amplitude dependency remain a topic of debate in the literature. We therefore developed an experimental protocol to directly measure the bilateral intrinsic ankle-foot stiffness during standing balance, and determine its amplitude dependency. By applying fast (40 ms) ramp-and-hold support surface rotations (0.005-0.08 rad) during standing, reflexive contributions could be excluded, and the amplitude dependency of the intrinsic ankle-foot stiffness was investigated. Results showed that reflexive activity could not have biased the torque used for estimating the intrinsic stiffness. Furthermore, subjects required less recovery action to restore balance after bilateral rotations in opposite directions compared to rotations in the same direction. The intrinsic ankle-foot stiffness appears insufficient to ensure balance, ranging from 0.93±0.09 to 0.44±0.06 (normalized to critical stiffness 'mgh'). This implies that changes in muscle activation are required to maintain balance. The non-linear stiffness decrease with increasing rotation amplitude supports the previous published research. With the proposed method reflexive effects can be ruled out from the measured torque without any model assumptions, allowing direct estimation of intrinsic stiffness during standing. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. Android Applications Security

    OpenAIRE

    Paul POCATILU

    2011-01-01

    The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the a...

  6. LFR safety features through intrinsic negative reactivity feedbacks

    International Nuclear Information System (INIS)

    Grasso, Giacomo

    2012-01-01

    The safety of Lead-cooled Fast Reactors can rely on intrinsic features such as: • the impossibility of Lead boiling, hence the unreliability of core (only) voiding; • the buoyancy of Control Rods in Lead, allowing their safe positioning also below the active region. For heightening the safety features of LFRs in safety analyses it could be required to approach the evaluation of the reactivity coefficients from a more physical point of view, including more elementary mechanisms, each one related to the proper driving temperature

  7. Fast beam radiofrequency spectroscopy

    International Nuclear Information System (INIS)

    Pipkin, F.M.

    1983-01-01

    The combination of a fast atom or ion beam derived from a small accelerator with radiofrequency spectroscopy methods provides a powerful method for measuring the fine structure of atomic and molecular systems. The fast beam makes possible measurements in which two separated oscillatory fields are used to obtain resonance lines whose widths are less than the natural line width due to the lifetimes of the states. The separated oscillatory field lines have, in addition, a number of features which make possible measurements with greater precision and less sensitivity to systematic errors. The fast beam also makes accessible multiple photon radiofrequency transitions whose line width is intrinsically narrower than that of the single photon transitions and which offer great potential for high precision measurements. This report focuses on the techniques and their promise. Recent measurements of the fine structure of H and He + are used as illustrations

  8. Protecting livelihoods, boosting food security in Kenya | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-05-21

    May 21, 2015 ... Protecting livelihoods, boosting food security in Kenya ... America, and the Caribbean with funds from the Government of Canada's fast-start financing. ... Water management and food security in vulnerable regions of China.

  9. Intrinsic thermal expansion of crystal defects

    International Nuclear Information System (INIS)

    Ganne, J.-P.

    1981-02-01

    Although the phenomenon of thermal expansion has long been known, the intrinsic thermal expansion coefficient (ITEC) βsub(d) of a point defect, derived from its formation volume vsub(d), has never been measured directly. The differential dilatometer by interferometry built by ASTY and GILDER is described. It has allowed βsub(d) to be measured for several defects. Vacancies and small interstitial loops were produced in aluminium by low temperature (20 K) fast neutron irradiation followed by an anneal up to the beginning of stage III (160 K). The very high value of the measured ratio βsub(d)/β 0 (12+-4) is comparable with a lattice statics calculated (42) value (11.5 0 [fr

  10. Intrinsically active and pacemaker neurons in pluripotent stem cell-derived neuronal populations.

    Science.gov (United States)

    Illes, Sebastian; Jakab, Martin; Beyer, Felix; Gelfert, Renate; Couillard-Despres, Sébastien; Schnitzler, Alfons; Ritter, Markus; Aigner, Ludwig

    2014-03-11

    Neurons generated from pluripotent stem cells (PSCs) self-organize into functional neuronal assemblies in vitro, generating synchronous network activities. Intriguingly, PSC-derived neuronal assemblies develop spontaneous activities that are independent of external stimulation, suggesting the presence of thus far undetected intrinsically active neurons (IANs). Here, by using mouse embryonic stem cells, we provide evidence for the existence of IANs in PSC-neuronal networks based on extracellular multielectrode array and intracellular patch-clamp recordings. IANs remain active after pharmacological inhibition of fast synaptic communication and possess intrinsic mechanisms required for autonomous neuronal activity. PSC-derived IANs are functionally integrated in PSC-neuronal populations, contribute to synchronous network bursting, and exhibit pacemaker properties. The intrinsic activity and pacemaker properties of the neuronal subpopulation identified herein may be particularly relevant for interventions involving transplantation of neural tissues. IANs may be a key element in the regulation of the functional activity of grafted as well as preexisting host neuronal networks.

  11. Secure Fiberoptic Communications

    Science.gov (United States)

    Hodara, Henri

    At the heart of our current information explosion is the communication network. Networks are now an intrinsic part of our daily activities, whether they are for Internet business transactions or military communications in Future Combat Systems. Protection of this communication infrastructure is a must. In this article, we discuss two approaches for securing all-optical networks. The first is an optical encryption technique that denies the information to intruders. The second is an authentication scheme capable of detecting and identifying unauthorized users.

  12. Hydrogenic fast-ion diagnostic using Balmer-alpha light

    International Nuclear Information System (INIS)

    Heidbrink, W W; Burrell, K H; Luo, Y; Pablant, N A; Ruskov, E

    2004-01-01

    Hydrogenic fast-ion populations are common in toroidal magnetic fusion devices, especially in devices with neutral beam injection. As the fast ions orbit around the device and pass through a neutral beam, some fast ions neutralize and emit Balmer-alpha light. The intensity of this emission is weak compared with the signals from the injected neutrals, the warm (halo) neutrals and the cold edge neutrals, but, for a favourable viewing geometry, the emission is Doppler shifted away from these bright interfering signals. Signals from fast ions are detected in the DIII-D tokamak. When the electron density exceeds ∼7 x 10 19 m -3 , visible bremsstrahlung obscures the fast-ion signal. The intrinsic spatial resolution of the diagnostic is ∼5 cm for 40 keV amu -1 fast ions. The technique is well suited for diagnosis of fast-ion populations in devices with fast-ion energies (∼30 keV amu -1 ), minor radii (∼0.6 m) and plasma densities (∼ 20 m -3 ) that are similar to those of DIII-D

  13. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  14. Work security in a global economy.

    Science.gov (United States)

    Rosskam, Ellen

    2003-01-01

    Work security is a fundamental right of all working people. After World War II, the welfare state became an intrinsic part of the "Golden Age" of capitalism, in which universal prosperity seemed attainable. Workers' organizations frequently played a crucial role in policy decisions that promoted full employment, income stability, and equitable treatment of workers. Today's world order is quite different. Globalization in its present form is a major obstacle to work security. Globalization is not simply a market-driven phenomenon. It is a political and ideological movement that grants authority to capital over governments and labor. This transfer of authority hinders national efforts to promote work security and may impact the well-being of communities worldwide. In the absence of domestic autonomy, international labor standards are needed to protect social welfare. They should be geared toward curbing unemployment, poverty, and social exclusion in the global economy. The article looks at three initiatives to promote global work security.

  15. High-speed true random number generation based on paired memristors for security electronics

    Science.gov (United States)

    Zhang, Teng; Yin, Minghui; Xu, Changmin; Lu, Xiayan; Sun, Xinhao; Yang, Yuchao; Huang, Ru

    2017-11-01

    True random number generator (TRNG) is a critical component in hardware security that is increasingly important in the era of mobile computing and internet of things. Here we demonstrate a TRNG using intrinsic variation of memristors as a natural source of entropy that is otherwise undesirable in most applications. The random bits were produced by cyclically switching a pair of tantalum oxide based memristors and comparing their resistance values in the off state, taking advantage of the more pronounced resistance variation compared with that in the on state. Using an alternating read scheme in the designed TRNG circuit, the unbiasedness of the random numbers was significantly improved, and the bitstream passed standard randomness tests. The Pt/TaO x /Ta memristors fabricated in this work have fast programming/erasing speeds of ˜30 ns, suggesting a high random number throughput. The approach proposed here thus holds great promise for physically-implemented random number generation.

  16. Development of Food Security Information System Based on Business Intelligence in Food Security Agency, Ministry of Agriculture, Indonesia

    OpenAIRE

    Hendrawaty, Manise; Harisno, Harisno

    2014-01-01

    Food is the main basic need of human, because of that fulfillment of human need of food has to be fulfilled. So it can fulfill that need, then government institution, Food Security Agency (BKP) is formed so it can monitor fulfillment of food need of society. The goals of this writing are to develop food security information system that provides dashboard facility based on business intelligence, to develop food security information system that can give fast, precise and real time information a...

  17. Neuromodulation intrinsic to the central pattern generator for escape swimming in Tritonia.

    Science.gov (United States)

    Katz, P S

    1998-11-16

    Extrinsic neuromodulatory inputs to central pattern generators (CPGs) can alter the properties and synaptic interactions of neurons in those circuits and thereby modify the output of the CPG. Recent work in a number of systems has now demonstrated that neurons intrinsic to CPG can also evoke neuromodulatory actions on other members of the CPG. Such "intrinsic neuromodulation" plays a role in controlling the CPG underlying the escape swim response of the nudibrach mollusc, Tritonia diomedea. The dorsal swim interneurons (DSIs) are a bilaterally represented set of three serotonergic neurons that participate in the generation of the rhythmic swim motor program. Serotonin released from these CPG neurons functions both as a fast neurotransmitter and as a slower neuromodulator. In its modulatory role, serotonin enhances the release of neurotransmitter from another CPG neuron, C2, and also increases C2 excitability by decreasing spike frequency adaptation. These neuromodulatory actions intrinsic to the CPG may be important for the initial self-configuration of the system into a function CPG and for experience-dependent changes in the output such as behavioral sensitization and habituation.

  18. Intrinsic shapes of discy and boxy ellipticals

    International Nuclear Information System (INIS)

    Fasano, Giovanni

    1991-01-01

    Statistical tests for intrinsic shapes of elliptical galaxies have given so far inconclusive and sometimes contradictory results. These failures have been often charged to the fact that classical tests consider only the two axisymmetric shapes (oblate versus prolate), while ellipticals are truly triaxial bodies. On the other hand, recent analyses indicate that the class of elliptical galaxies could be a mixture of (at least) two families having different morphology and dynamical behaviour: (i) a family of fast-rotating, disc-like ellipticals (discy); (ii) a family of slow-rotating, box-shaped ellipticals (boxy). In this paper we review the tests for instrinsic shapes of elliptical galaxies using data of better quality (CCD) with respect to previous applications. (author)

  19. Effects of fast neutrons on chromatin: dependence on chromatin structure

    Energy Technology Data Exchange (ETDEWEB)

    Radu, L. [Dept. of Molecular Genetics, V. Babes National Inst., Bd. Timisoara, Bucharest (Romania); Constantinescu, B. [Dept. of Cyclotron, H. Hulubei National Inst., Bucharest (Romania); Gazdaru, D. [Dept. of Biophysics, Physics Faculty, Univ. of Bucharest (Romania)

    2002-07-01

    The effects of fast neutrons (10-100 Gy) on chromatin extracted from normal (liver of Wistar rats) and tumor (Walker carcinosarcoma maintained on Wistar rats) tissues were compared. The spectroscopic assays used were (i) chromatin intrinsic fluorescence, (ii) time-resolved fluorescence of chromatin-proflavine complexes, and (iii) fluorescence resonance energy transfer (FRET) between dansyl chloride and acridine orange coupled to chromatin. For both normal and tumor chromatin, the intensity of intrinsic fluorescence specific for acidic and basic proteins decreased with increasing dose. The relative contributions of the excited-state lifetime of proflavine bound to chromatin were reduced upon fast-neutron irradiation, indicating a decrease in the proportion of chromatin DNA available for ligand binding. The Forster energy transfer efficiencies were also modified by irradiation. These effects were larger for chromatin from tumor tissue. In the range 0-100 Gy, fast neutrons induced alterations in DNA and acidic and basic proteins, as well as in global chromatin structure. The radiosensitivity of chromatin extracted from tumor tissue seems to be higher than that of chromatin extracted from normal tissue, probably because of its higher euchromatin (loose)-heterochromatin (compact) ratio. (author)

  20. Effects of fast neutrons on chromatin: dependence on chromatin structure

    International Nuclear Information System (INIS)

    Radu, L.; Constantinescu, B.; Gazdaru, D.

    2002-01-01

    The effects of fast neutrons (10-100 Gy) on chromatin extracted from normal (liver of Wistar rats) and tumor (Walker carcinosarcoma maintained on Wistar rats) tissues were compared. The spectroscopic assays used were (i) chromatin intrinsic fluorescence, (ii) time-resolved fluorescence of chromatin-proflavine complexes, and (iii) fluorescence resonance energy transfer (FRET) between dansyl chloride and acridine orange coupled to chromatin. For both normal and tumor chromatin, the intensity of intrinsic fluorescence specific for acidic and basic proteins decreased with increasing dose. The relative contributions of the excited-state lifetime of proflavine bound to chromatin were reduced upon fast-neutron irradiation, indicating a decrease in the proportion of chromatin DNA available for ligand binding. The Forster energy transfer efficiencies were also modified by irradiation. These effects were larger for chromatin from tumor tissue. In the range 0-100 Gy, fast neutrons induced alterations in DNA and acidic and basic proteins, as well as in global chromatin structure. The radiosensitivity of chromatin extracted from tumor tissue seems to be higher than that of chromatin extracted from normal tissue, probably because of its higher euchromatin (loose)-heterochromatin (compact) ratio. (author)

  1. Strong intrinsic motivation

    OpenAIRE

    Dessi, Roberta; Rustichini, Aldo

    2015-01-01

    A large literature in psychology, and more recently in economics, has argued that monetary rewards can reduce intrinsic motivation. We investigate whether the negative impact persists when intrinsic motivation is strong, and test this hypothesis experimentally focusing on the motivation to undertake interesting and challenging tasks, informative about individual ability. We find that this type of task can generate strong intrinsic motivation, that is impervious to the effect of monetary incen...

  2. The IAEA Activities in the Field of Fast Reactors Technology Development

    International Nuclear Information System (INIS)

    Monti, Stefano

    2011-01-01

    Main activities of the IAEA Programme on Fast Reactor: Carry out Collaborative Research Projects (CRPs) of common interest to the TWG-FR Member States in the field of FRs and ADS; Secure Training and Education in the field of fast neutron system physics, technology and applications; Support Fast Reactor data retrieval and knowledge preservation activities in MSs; Provide support to IAEA Nuclear Safety and Security Department for preparation of fast reactor Safety standards / requirements / guides. IAEA TWG-FR Functions: Provide advice and guidance, and marshal support in their countries for implementation of IAEA’s programmatic activities in the area of advanced technologies and R&D for fast reactors and sub-critical hybrid systems for energy production and for utilization/transmutation of long-lived nuclides; Provide a forum for information and knowledge sharing on national and international development programs; Act as a link between IAEA’s activities in the specific area of the TWG-FR and national scientific communities, delivering information from and to national communities

  3. Intrinsic Motivation.

    Science.gov (United States)

    Deci, Edward L.

    The paper draws together a wide variety of research which relates to the topic of intrinsic motivation; intrinsically motivated activities are defined as those which a person does for no apparent reward except the activity itself or the feelings which result from the activity. Most of this research was not originally reported within the framework…

  4. Information Security and People: A Conundrum for Compliance

    Directory of Open Access Journals (Sweden)

    Hiep Cong Pham

    2017-01-01

    Full Text Available This evaluation of end-users and IT experts/managers’ attitudes towards performing IT security tasks indicates important differences between their perspectives on what is and is not necessary to establish a secure corporate IT environment. Through a series of case studies, this research illustrates that making it easier for end-users to comply does not necessarily equate to enhanced implementation of security measures. End-users want to be autonomous, competent, self-motivated and active participants in the development of secure environments. However, managers and experts want to limit autonomy to ensure that procedures are followed closely, rather than permitting flexibility. This results in the creation of environments that are intrinsically de-motivating rather than motivating end-users to become self-determined and self-regulating co-creators of a secure IT environment. The paper also discusses alternative approaches to developing a human system that works for end-users and experts.

  5. Intrinsic contractures of the hand.

    Science.gov (United States)

    Paksima, Nader; Besh, Basil R

    2012-02-01

    Contractures of the intrinsic muscles of the fingers disrupt the delicate and complex balance of intrinsic and extrinsic muscles, which allows the hand to be so versatile and functional. The loss of muscle function primarily affects the interphalangeal joints but also may affect etacarpophalangeal joints. The resulting clinical picture is often termed, intrinsic contracture or intrinsic-plus hand. Disruption of the balance between intrinsic and extrinsic muscles has many causes and may be secondary to changes within the intrinsic musculature or the tendon unit. This article reviews diagnosis, etiology, and treatment algorithms in the management of intrinsic contractures of the fingers. Copyright © 2012 Elsevier Inc. All rights reserved.

  6. An introduction to information security and ISO27001:2013

    CERN Document Server

    Watkins, Steve

    2013-01-01

    Up to date with the latest version of the Standard (ISO27001:2013), An Introduction to information security and ISO27001:2013 is the perfect solution for anyone wanting an accurate, fast, easy-to-read primer on information security from an acknowledged expert on ISO27001.

  7. Rural social security for Zimbabwe: Challenges and opportunities for ...

    African Journals Online (AJOL)

    For them, the remaining sources of livelihood now reside in non-formal social security arrangements anchored upon a staggering cultural base being eroded by the fast encroaching tide of neoliberal individualistic ways of life. Regrettably, government has got no institutional framework to promote non-formal security ...

  8. Intrinsic and extrinsic mortality reunited

    DEFF Research Database (Denmark)

    Koopman, Jacob J E; Wensink, Maarten J; Rozing, Maarten P

    2015-01-01

    Intrinsic and extrinsic mortality are often separated in order to understand and measure aging. Intrinsic mortality is assumed to be a result of aging and to increase over age, whereas extrinsic mortality is assumed to be a result of environmental hazards and be constant over age. However......, allegedly intrinsic and extrinsic mortality have an exponentially increasing age pattern in common. Theories of aging assert that a combination of intrinsic and extrinsic stressors underlies the increasing risk of death. Epidemiological and biological data support that the control of intrinsic as well...... as extrinsic stressors can alleviate the aging process. We argue that aging and death can be better explained by the interaction of intrinsic and extrinsic stressors than by classifying mortality itself as being either intrinsic or extrinsic. Recognition of the tight interaction between intrinsic and extrinsic...

  9. Securing Biometric Images using Reversible Watermarking

    OpenAIRE

    Thampi, Sabu M.; Jacob, Ann Jisma

    2011-01-01

    Biometric security is a fast growing area. Protecting biometric data is very important since it can be misused by attackers. In order to increase security of biometric data there are different methods in which watermarking is widely accepted. A more acceptable, new important development in this area is reversible watermarking in which the original image can be completely restored and the watermark can be retrieved. But reversible watermarking in biometrics is an understudied area. Reversible ...

  10. An Overview of DRAM-Based Security Primitives

    Directory of Open Access Journals (Sweden)

    Nikolaos Athanasios Anagnostopoulos

    2018-03-01

    Full Text Available Recent developments have increased the demand for adequate security solutions, based on primitives that cannot be easily manipulated or altered, such as hardware-based primitives. Security primitives based on Dynamic Random Access Memory (DRAM can provide cost-efficient and practical security solutions, especially for resource-constrained devices, such as hardware used in the Internet of Things (IoT, as DRAMs are an intrinsic part of most contemporary computer systems. In this work, we present a comprehensive overview of the literature regarding DRAM-based security primitives and an extended classification of it, based on a number of different criteria. In particular, first, we demonstrate the way in which DRAMs work and present the characteristics being exploited for the implementation of security primitives. Then, we introduce the primitives that can be implemented using DRAM, namely Physical Unclonable Functions (PUFs and True Random Number Generators (TRNGs, and present the applications of each of the two types of DRAM-based security primitives. We additionally proceed to assess the security such primitives can provide, by discussing potential attacks and defences, as well as the proposed security metrics. Subsequently, we also compare these primitives to other hardware-based security primitives, noting their advantages and shortcomings, and proceed to demonstrate their potential for commercial adoption. Finally, we analyse our classification methodology, by reviewing the criteria employed in our classification and examining their significance.

  11. Intrinsic and extrinsic mortality reunited.

    Science.gov (United States)

    Koopman, Jacob J E; Wensink, Maarten J; Rozing, Maarten P; van Bodegom, David; Westendorp, Rudi G J

    2015-07-01

    Intrinsic and extrinsic mortality are often separated in order to understand and measure aging. Intrinsic mortality is assumed to be a result of aging and to increase over age, whereas extrinsic mortality is assumed to be a result of environmental hazards and be constant over age. However, allegedly intrinsic and extrinsic mortality have an exponentially increasing age pattern in common. Theories of aging assert that a combination of intrinsic and extrinsic stressors underlies the increasing risk of death. Epidemiological and biological data support that the control of intrinsic as well as extrinsic stressors can alleviate the aging process. We argue that aging and death can be better explained by the interaction of intrinsic and extrinsic stressors than by classifying mortality itself as being either intrinsic or extrinsic. Recognition of the tight interaction between intrinsic and extrinsic stressors in the causation of aging leads to the recognition that aging is not inevitable, but malleable through the environment. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    Science.gov (United States)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  13. Intrinsic-density functionals

    International Nuclear Information System (INIS)

    Engel, J.

    2007-01-01

    The Hohenberg-Kohn theorem and Kohn-Sham procedure are extended to functionals of the localized intrinsic density of a self-bound system such as a nucleus. After defining the intrinsic-density functional, we modify the usual Kohn-Sham procedure slightly to evaluate the mean-field approximation to the functional, and carefully describe the construction of the leading corrections for a system of fermions in one dimension with a spin-degeneracy equal to the number of particles N. Despite the fact that the corrections are complicated and nonlocal, we are able to construct a local Skyrme-like intrinsic-density functional that, while different from the exact functional, shares with it a minimum value equal to the exact ground-state energy at the exact ground-state intrinsic density, to next-to-leading order in 1/N. We briefly discuss implications for real Skyrme functionals

  14. Seamless and secure communications over heterogeneous wireless networks

    CERN Document Server

    Cao, Jiannong

    2014-01-01

    This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to support seamless and secure roaming for mobile clients. The reader will also learn about the challenges in developing relevant technologies and providing ubiquitous Internet access over heterogeneous wireless networks. The authors have extensive experience in im

  15. Parallel-Bit Stream for Securing Iris Recognition

    OpenAIRE

    Elsayed Mostafa; Maher Mansour; Heba Saad

    2012-01-01

    Biometrics-based authentication schemes have usability advantages over traditional password-based authentication schemes. However, biometrics raises several privacy concerns, it has disadvantages comparing to traditional password in which it is not secured and non revocable. In this paper, we propose a fast method for securing revocable iris template using parallel-bit stream watermarking to overcome these problems. Experimental results prove that the proposed method has low computation time ...

  16. Fast clustering using adaptive density peak detection.

    Science.gov (United States)

    Wang, Xiao-Feng; Xu, Yifan

    2017-12-01

    Common limitations of clustering methods include the slow algorithm convergence, the instability of the pre-specification on a number of intrinsic parameters, and the lack of robustness to outliers. A recent clustering approach proposed a fast search algorithm of cluster centers based on their local densities. However, the selection of the key intrinsic parameters in the algorithm was not systematically investigated. It is relatively difficult to estimate the "optimal" parameters since the original definition of the local density in the algorithm is based on a truncated counting measure. In this paper, we propose a clustering procedure with adaptive density peak detection, where the local density is estimated through the nonparametric multivariate kernel estimation. The model parameter is then able to be calculated from the equations with statistical theoretical justification. We also develop an automatic cluster centroid selection method through maximizing an average silhouette index. The advantage and flexibility of the proposed method are demonstrated through simulation studies and the analysis of a few benchmark gene expression data sets. The method only needs to perform in one single step without any iteration and thus is fast and has a great potential to apply on big data analysis. A user-friendly R package ADPclust is developed for public use.

  17. Comparison of extrinsic and intrinsic neuromodulation in two central pattern generator circuits in invertebrates.

    Science.gov (United States)

    Katz, P S

    1998-05-01

    There are many sources of modulatory input to CPGs and other types of neuronal circuits. These inputs can change the properties of cells and synapses and dramatically alter the production of motor patterns. Sometimes this enables the production of motor patterns by the circuit. At other times, the modulation allows alternate motor patterns to be produced by a single circuit. Modulatory neurones have fast as well as slow actions. In some cases, such as with GPR, the two types of effects are due to the release of co-transmitters. In other cases, such as with the DSIs, a single substance can act at different receptors to cause fast and slow postsynaptic actions. The effect of a neuromodulatory neurone is determined by the type of receptor on the target neurone. Thus a single modulatory neurone evokes a suite of actions in a circuit and thereby produces a co-ordinated output. Extrinsic and intrinsic sources of neuromodulation have different sets of constraints acting upon them. For example, extrinsic neuromodulation can easily be used for motor pattern selection; a different pattern is produced depending upon which modulatory inputs are active. However, intrinsic neuromodulation is not well suited to that task. Instead, it is useful for self-organizing properties and experience-dependent effects. One clear conclusion from this work and other work in the field is that neuromodulation by neurones intrinsic and extrinsic to CPGs is not uncommon (Katz, 1995; Katz & Frost, 1996). It is part of the normal process of motor pattern generation. As such, it needs to be considered when discussing mechanisms for neuronal circuit actions.

  18. Pulsed power supply system for the fast quadrupoles in the AGS

    International Nuclear Information System (INIS)

    Nawrocky, R.J.; Lambiase, R.F.

    1983-01-01

    In the acceleration of polarized protons in the AGS, a number of depolarizing resonances will be encountered. Depolarization due to the so-called intrinsic resonances will be minimized by crossing each resonance in less than one beam revolution period (approx. 2 μs). This will be accomplished with a set of twelve fast tune-shifting quadrupoles distributed symmetrically around the ring. During a typical acceleration cycle, the fast quads will be energized with a burst of alternating polarity, fast rise/slow fall triangular current pulses. The amplitude of these pulses will vary from 160 A to about 2700 A peak. This paper describes the development of the pulsed power supply for the fast quads, the construction of a prototype modulator, and some of the initial test results obtained with the prototype

  19. Fast Computation and Assessment Methods in Power System Analysis

    Science.gov (United States)

    Nagata, Masaki

    Power system analysis is essential for efficient and reliable power system operation and control. Recently, online security assessment system has become of importance, as more efficient use of power networks is eagerly required. In this article, fast power system analysis techniques such as contingency screening, parallel processing and intelligent systems application are briefly surveyed from the view point of their application to online dynamic security assessment.

  20. The fast breeder reactor: what is security and freedom worth to us

    International Nuclear Information System (INIS)

    1975-01-01

    Risks for governmental and non-governmental proliferation of nuclear weapons as a consequence of the development of fast breeder reactor technology are discussed. Polemological as well as sociological and political analyses together with ecological consequences lead to the conclusion that the fast breeder is not necessary for energy production and socially unacceptable

  1. Application Security for the Android Platform Processes, Permissions, and Other Safeguards

    CERN Document Server

    Six, Jeff

    2011-01-01

    This book will educate readers on the need for application security and secure coding practices when designing any app. No prior knowledge of security or secure programming techniques is assumed. The book will discuss the need for such practices, how the Android environment is structured with respect to security considerations, what services and techniques are available on the platform to protect data, and how developers can build and code applications that address the risk to their applications and the data processed by them. This text is especially important now, as Android is fast becoming

  2. On the Security of Mexican Digital Fiscal Documents

    OpenAIRE

    González García, Vladimir; Rodríguez Henríquez, Francisco; Cruz Cortés, Nareli

    2008-01-01

    In January 2005, the Mexican Tributary Administration System (SAT) introduced an official norm that stipulates how to generate electronic invoices that were termed by SAT, Comprobante Fiscal Digital (CFD). Supporting the CFD service implies the exchange of confidential information over Internet and other communication channels that are intrinsically highly vulnerable. Therefore, it becomes indispensable to incorporate to this service reliable and sound information security mechanisms. In the ...

  3. Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations

    Science.gov (United States)

    Donohue, John T.; Critchfield, Anna R.

    2000-01-01

    We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.

  4. The Carnegie Supernova Project: Intrinsic colors of type Ia supernovae

    International Nuclear Information System (INIS)

    Burns, Christopher R.; Persson, S. E.; Freedman, Wendy L.; Madore, Barry F.; Stritzinger, Maximilian; Contreras, Carlos; Phillips, M. M.; Hsiao, E. Y.; Boldt, Luis; Campillay, Abdo; Castellón, Sergio; Morrell, Nidia; Salgado, Francisco; Folatelli, Gaston; Suntzeff, Nicholas B.

    2014-01-01

    We present an updated analysis of the intrinsic colors of Type Ia supernova (SNe Ia) using the latest data release of the Carnegie Supernova Project. We introduce a new light-curve parameter very similar to stretch that is better suited for fast-declining events, and find that these peculiar types can be seen as extensions to the population of 'normal' SNe Ia. With a larger number of objects, an updated fit to the Lira relation is presented along with evidence for a dependence on the late-time slope of the B – V light-curves with stretch and color. Using the full wavelength range from u to H band, we place constraints on the reddening law for the sample as a whole and also for individual events/hosts based solely on the observed colors. The photometric data continue to favor low values of R V , though with large variations from event to event, indicating an intrinsic distribution. We confirm the findings of other groups that there appears to be a correlation between the derived reddening law, R V , and the color excess, E(B – V), such that larger E(B – V) tends to favor lower R V . The intrinsic u-band colors show a relatively large scatter that cannot be explained by variations in R V or by the Goobar power-law for circumstellar dust, but rather is correlated with spectroscopic features of the supernova and is therefore likely due to metallicity effects.

  5. A repeating fast radio burst.

    Science.gov (United States)

    Spitler, L G; Scholz, P; Hessels, J W T; Bogdanov, S; Brazier, A; Camilo, F; Chatterjee, S; Cordes, J M; Crawford, F; Deneva, J; Ferdman, R D; Freire, P C C; Kaspi, V M; Lazarus, P; Lynch, R; Madsen, E C; McLaughlin, M A; Patel, C; Ransom, S M; Seymour, A; Stairs, I H; Stappers, B W; van Leeuwen, J; Zhu, W W

    2016-03-10

    Fast radio bursts are millisecond-duration astronomical radio pulses of unknown physical origin that appear to come from extragalactic distances. Previous follow-up observations have failed to find additional bursts at the same dispersion measure (that is, the integrated column density of free electrons between source and telescope) and sky position as the original detections. The apparent non-repeating nature of these bursts has led to the suggestion that they originate in cataclysmic events. Here we report observations of ten additional bursts from the direction of the fast radio burst FRB 121102. These bursts have dispersion measures and sky positions consistent with the original burst. This unambiguously identifies FRB 121102 as repeating and demonstrates that its source survives the energetic events that cause the bursts. Additionally, the bursts from FRB 121102 show a wide range of spectral shapes that appear to be predominantly intrinsic to the source and which vary on timescales of minutes or less. Although there may be multiple physical origins for the population of fast radio bursts, these repeat bursts with high dispersion measure and variable spectra specifically seen from the direction of FRB 121102 support an origin in a young, highly magnetized, extragalactic neutron star.

  6. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  7. Theory, Demonstration and Methods: Research on Social Security of Migrant Workers by Domestic Scholar

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker social security, policy defects and equity construction in social security system of migrant workers. Secondly, real studies on social security of migrant workers, including researches on sequence of demand and influencing factors of social security of migrant workers as well as intrinsic motivation forming the perspective on social security. Lastly, road exploration of establishing social security system, including researches on the multi-level development of rural worker social security system, comparison of "Double-low method", "Guangdong Method" and "Shanghai Method" of the social security of migrant workers in Zhejiang Province and establishing multi-level social security system according to the hierarchy after the internal differentiation.

  8. Wave Driven Fast Ion Loss in the National Spherical Torus Experiment

    International Nuclear Information System (INIS)

    Fredrickson, E.D.; Cheng, C.Z.; Darrow, D.; Fu, G.; Gorelenkov, N.N.; Kramer, G.; Medley, S.S.; Menard, J.; Roquemore, L.; Stutman, D.; White, R.B.

    2003-01-01

    The study of fast ion instabilities in conventional aspect ratio tokamaks is motivated in large part by their potential to negatively impact the ignition threshold in fusion reactors by causing fast ion losses. Spherical tokamak's (ST), with intrinsically low magnetic fields, are particularly susceptible to fast ion driven instabilities. The 3.5 MeV alpha's from the D-T [deuterium-tritium] fusion reaction in proposed ST reactors will have velocities much higher than the Alfven speed. The Larmor radius of the fusion alphas, normalized to the plasma size, will also be larger than for conventional aspect ratio tokamak reactors. The resulting longer wavelengths of the *AE instabilities will be more effective in driving fast ion loss. The change in magnetic topology also influences the mode structure, as in the case of the Compressional Alfven Eigenmodes (CAE) seen on NSTX

  9. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  10. Quantum Secure Direct Communication with Five-Qubit Entangled State

    International Nuclear Information System (INIS)

    Lin Song; Liu Xiao-Fen; Gao Fei

    2011-01-01

    Recently, a genuine five-qubit entangled state has been achieved by Brown et al.[J. Phys. A 38 (2005) 1119]. Later it was indicated that this state can be used for quantum teleportation and quantum state sharing. Here we build a quantum secure direct communication protocol with this state, and prove that it is secure in ideal conditions. In the protocol, the sender performs unitary transformations to encode a secret message on his/her particles and sends them to the receiver. The receiver then performs projective determinate measurement to decode the secret message directly. Furthermore, this protocol utilizes superdense coding to achieve a high intrinsic efficiency and source capacity. (general)

  11. Genome-Wide Prediction of Intrinsic Disorder; Sequence Alignment of Intrinsically Disordered Proteins

    Science.gov (United States)

    Midic, Uros

    2012-01-01

    Intrinsic disorder (ID) is defined as a lack of stable tertiary and/or secondary structure under physiological conditions in vitro. Intrinsically disordered proteins (IDPs) are highly abundant in nature. IDPs possess a number of crucial biological functions, being involved in regulation, recognition, signaling and control, e.g. their functional…

  12. Intrinsic spin-relaxation induced negative tunnel magnetoresistance in a single-molecule magnet

    Science.gov (United States)

    Xie, Haiqing; Wang, Qiang; Xue, Hai-Bin; Jiao, HuJun; Liang, J.-Q.

    2013-06-01

    We investigate theoretically the effects of intrinsic spin-relaxation on the spin-dependent transport through a single-molecule magnet (SMM), which is weakly coupled to ferromagnetic leads. The tunnel magnetoresistance (TMR) is obtained by means of the rate-equation approach including not only the sequential but also the cotunneling processes. It is shown that the TMR is strongly suppressed by the fast spin-relaxation in the sequential region and can vary from a large positive to slight negative value in the cotunneling region. Moreover, with an external magnetic field along the easy-axis of SMM, a large negative TMR is found when the relaxation strength increases. Finally, in the high bias voltage limit the TMR for the negative bias is slightly larger than its characteristic value of the sequential region; however, it can become negative for the positive bias caused by the fast spin-relaxation.

  13. Wearable Intrinsically Soft, Stretchable, Flexible Devices for Memories and Computing.

    Science.gov (United States)

    Rajan, Krishna; Garofalo, Erik; Chiolerio, Alessandro

    2018-01-27

    A recent trend in the development of high mass consumption electron devices is towards electronic textiles (e-textiles), smart wearable devices, smart clothes, and flexible or printable electronics. Intrinsically soft, stretchable, flexible, Wearable Memories and Computing devices (WMCs) bring us closer to sci-fi scenarios, where future electronic systems are totally integrated in our everyday outfits and help us in achieving a higher comfort level, interacting for us with other digital devices such as smartphones and domotics, or with analog devices, such as our brain/peripheral nervous system. WMC will enable each of us to contribute to open and big data systems as individual nodes, providing real-time information about physical and environmental parameters (including air pollution monitoring, sound and light pollution, chemical or radioactive fallout alert, network availability, and so on). Furthermore, WMC could be directly connected to human brain and enable extremely fast operation and unprecedented interface complexity, directly mapping the continuous states available to biological systems. This review focuses on recent advances in nanotechnology and materials science and pays particular attention to any result and promising technology to enable intrinsically soft, stretchable, flexible WMC.

  14. Bigdata Driven Cloud Security: A Survey

    Science.gov (United States)

    Raja, K.; Hanifa, Sabibullah Mohamed

    2017-08-01

    Cloud Computing (CC) is a fast-growing technology to perform massive-scale and complex computing. It eliminates the need to maintain expensive computing hardware, dedicated space, and software. Recently, it has been observed that massive growth in the scale of data or big data generated through cloud computing. CC consists of a front-end, includes the users’ computers and software required to access the cloud network, and back-end consists of various computers, servers and database systems that create the cloud. In SaaS (Software as-a-Service - end users to utilize outsourced software), PaaS (Platform as-a-Service-platform is provided) and IaaS (Infrastructure as-a-Service-physical environment is outsourced), and DaaS (Database as-a-Service-data can be housed within a cloud), where leading / traditional cloud ecosystem delivers the cloud services become a powerful and popular architecture. Many challenges and issues are in security or threats, most vital barrier for cloud computing environment. The main barrier to the adoption of CC in health care relates to Data security. When placing and transmitting data using public networks, cyber attacks in any form are anticipated in CC. Hence, cloud service users need to understand the risk of data breaches and adoption of service delivery model during deployment. This survey deeply covers the CC security issues (covering Data Security in Health care) so as to researchers can develop the robust security application models using Big Data (BD) on CC (can be created / deployed easily). Since, BD evaluation is driven by fast-growing cloud-based applications developed using virtualized technologies. In this purview, MapReduce [12] is a good example of big data processing in a cloud environment, and a model for Cloud providers.

  15. The Carnegie Supernova Project: Intrinsic colors of type Ia supernovae

    Energy Technology Data Exchange (ETDEWEB)

    Burns, Christopher R.; Persson, S. E.; Freedman, Wendy L.; Madore, Barry F. [Observatories of the Carnegie Institution for Science, 813 Santa Barbara Street, Pasadena, CA 91101 (United States); Stritzinger, Maximilian; Contreras, Carlos [Department of Physics and Astronomy, Aarhus University, Ny Munkegade 120, DK-8000 Aarhus C (Denmark); Phillips, M. M.; Hsiao, E. Y.; Boldt, Luis; Campillay, Abdo; Castellón, Sergio; Morrell, Nidia; Salgado, Francisco [Carnegie Institution of Washington, Las Campanas Observatory, Colina El Pino, Casilla 601 (Chile); Folatelli, Gaston [Kavli Institute for the Physics and Mathematics of the Universe, Todai Institutes for Advanced Study, the University of Tokyo, 277-8583 Kashiwa (Japan); Suntzeff, Nicholas B. [George P. and Cynthia Woods Mitchell Institute for Fundamental Physics and Astronomy, Texas A and M University, Department of Physics and Astronomy, College Station, TX 77843 (United States)

    2014-07-01

    We present an updated analysis of the intrinsic colors of Type Ia supernova (SNe Ia) using the latest data release of the Carnegie Supernova Project. We introduce a new light-curve parameter very similar to stretch that is better suited for fast-declining events, and find that these peculiar types can be seen as extensions to the population of 'normal' SNe Ia. With a larger number of objects, an updated fit to the Lira relation is presented along with evidence for a dependence on the late-time slope of the B – V light-curves with stretch and color. Using the full wavelength range from u to H band, we place constraints on the reddening law for the sample as a whole and also for individual events/hosts based solely on the observed colors. The photometric data continue to favor low values of R{sub V} , though with large variations from event to event, indicating an intrinsic distribution. We confirm the findings of other groups that there appears to be a correlation between the derived reddening law, R{sub V} , and the color excess, E(B – V), such that larger E(B – V) tends to favor lower R{sub V} . The intrinsic u-band colors show a relatively large scatter that cannot be explained by variations in R{sub V} or by the Goobar power-law for circumstellar dust, but rather is correlated with spectroscopic features of the supernova and is therefore likely due to metallicity effects.

  16. Fast and secure key distribution using mesoscopic coherent states of light

    International Nuclear Information System (INIS)

    Barbosa, Geraldo A.

    2003-01-01

    This work shows how two parties A and B can securely share unlimited sequences of random bits at optical speeds. A and B possess true-random physical sources and exchange random bits by using a random sequence received to cipher the following one to be sent. A starting shared secret key is used and the method can be described as a one-time-pad unlimited extender. It is demonstrated that the minimum probability of error in signal determination by the eavesdropper can be set arbitrarily close to the pure guessing level. Being based on the M-ry encryption protocol this method also allows for optical amplification without security degradation, offering practical advantages over the Bennett-Brassard 1984 protocol for key distribution

  17. The ''Flight Chamber'': A fast, large area, zero-time detector

    International Nuclear Information System (INIS)

    Trautner, N.

    1976-01-01

    A new, fast, zero-time detector with an active area of 20 cm 2 has been constructed. Secondary electrons from a thin self-supporting foil are accelerated onto a scinitllator. The intrinsic time resolution (fwhm) was 0.85 for 5.5 MeV α-particles and 0.42 ns for 17 MeV 16 O-ions, at an efficiency of 97.5% and 99.6%, respectively. (author)

  18. Intrinsic mobility limit for anisotropic electron transport in Alq3.

    Science.gov (United States)

    Drew, A J; Pratt, F L; Hoppler, J; Schulz, L; Malik-Kumar, V; Morley, N A; Desai, P; Shakya, P; Kreouzis, T; Gillin, W P; Kim, K W; Dubroka, A; Scheuermann, R

    2008-03-21

    Muon spin relaxation has been used to probe the charge carrier motion in the molecular conductor Alq3 (tris[8-hydroxy-quinoline] aluminum). At 290 K, the magnetic field dependence of the muon spin relaxation corresponds to that expected for highly anisotropic intermolecular electron hopping. Intermolecular mobility in the fast hopping direction has been found to be 0.23+/-0.03 cm2 V-1 s(-1) in the absence of an electric- field gradient, increasing to 0.32+/-0.06 cm2 V-1 s(-1) in an electric field gradient of 1 MV m(-1). These intrinsic mobility values provide an estimate of the upper limit for mobility achievable in bulk material.

  19. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  20. Polarized proton beam development at COSY with EDDA as a fast internal polarimeter

    International Nuclear Information System (INIS)

    Hinterberger, F.

    2001-01-01

    Polarized protons in the Cooler Synchrotron COSY encounter five imperfection and nine intrinsic depolarizing resonances during the acceleration from 300 to 3300 MeV/c. When crossing imperfection resonances vertical correction dipoles are excited in order to enhance the average vertical displacement and thereby the resonance strength to result in a complete spin flip without loss of polarization. When crossing intrinsic resonances a rapid vertical tune jump is applied to minimize polarization losses. In order to find the optimum machine parameters a novel and fast method was developed to measure the internal beam polarization as a function of the beam momentum in the vicinity of a depolarizing resonance as well as in the full acceleration ramp. Using very thin internal CH 2 - and/or C-fiber targets the polarization is deduced from the left-right asymmetry of fast scaler rates. To this end the EDDA detector is used. This detector consists of two cylindrical scintillation hodoscope layers covering about 87% of 4π for pp elastic scattering. The effective analyzing power of the fast method is obtained by a special calibration procedure using a 'slow but proper' EDDA-style measurement of the elastic pp scattering asymmetries. For this calibration precise analyzing power excitation functions measured by EDDA became available in time

  1. Improving Food and Nutrition Security in the Philippines through ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Improving food and nutrition security in the Philippines through school ... Implementation of the Community Health Assessment Program in the Philippines ... This project will address the effects of fast-paced economic growth in the Greater ...

  2. McBits: fast constant-time code-based cryptography

    NARCIS (Netherlands)

    Bernstein, D.J.; Chou, T.; Schwabe, P.

    2015-01-01

    This paper presents extremely fast algorithms for code-based public-key cryptography, including full protection against timing attacks. For example, at a 2^128 security level, this paper achieves a reciprocal decryption throughput of just 60493 cycles (plus cipher cost etc.) on a single Ivy Bridge

  3. Intrinsic Chevrolets at the SSC

    International Nuclear Information System (INIS)

    Brodsky, S.J.; Collins, J.C.; Ellis, S.D.; Gunion, J.F.; Mueller, A.H.

    1984-01-01

    The possibility of the production at high energy of heavy quarks, supersymmetric particles and other large mass colored systems via the intrinsic twist-six components in the proton wave function is discussed. While the existing data do not rule out the possible relevance of intrinsic charm production at present energies, the extrapolation of such intrinsic contributions to very high masses and energies suggests that they will not play an important role at the SSC

  4. Intrinsic work function of molecular films

    International Nuclear Information System (INIS)

    Ivančo, Ján

    2012-01-01

    The electronic properties of molecular films are analysed with the consideration of the molecular orientation. The study demonstrates that surfaces of electroactive oligomeric molecular films can be classified—analogously to the elemental surfaces—by their intrinsic work functions. The intrinsic work function of molecular films is correlated with their ionisation energies; again, the behaviour is analogous to the correlation existing between the first ionisation energy of elements and the work function of the corresponding elemental surfaces. The proposed intrinsic work-function concept suggests that the mechanism for the energy-level alignment at the interfaces associated with molecular films is virtually controlled by work functions of materials brought into the contact. - Highlights: ► Molecular films exhibit their own (intrinsic) work function. ► Intrinsic work function is correlated with ionisation energy of molecular films. ► Intrinsic work function determines dipole at interface with a particular surface. ► Surface vacuum-level change upon film growth does not relate to interfacial dipole.

  5. On the security of Y-00 under fast correlation and other attacks on the key

    Science.gov (United States)

    Yuen, Horace P.; Nair, Ranjith

    2007-04-01

    The security of the Y-00 direct encryption protocol under correlation attack is addressed. A Y-00 configuration that is more secure than AES under known-plaintext attack is presented. It is shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any encryption box ENC with proper deliberate signal randomization.

  6. On the security of Y-00 under fast correlation and other attacks on the key

    International Nuclear Information System (INIS)

    Yuen, Horace P.; Nair, Ranjith

    2007-01-01

    The security of the Y-00 direct encryption protocol under correlation attack is addressed. A Y-00 configuration that is more secure than AES under known-plaintext attack is presented. It is shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any encryption box ENC with proper deliberate signal randomization

  7. Encyclopedia of Information Ethics and Security

    OpenAIRE

    Reviewed by Yavuz AKBULUT

    2008-01-01

    233Rapid developments in information andcommunication technologies have created newsecurity threats along with ethical dilemmas. Thesedevelopments have been so fast that appropriatesecurity precautions and ethical codes fail to keeppace with the technological developments. In thisrespect, education of both professionals andordinary citizens regarding information technologyethics carries utmost importance. Encyclopedia ofInformation Ethics and Security serves as anauthentic and comprehensive r...

  8. Revealing Hidden Structural Order Controlling Both Fast and Slow Glassy Dynamics in Supercooled Liquids

    Directory of Open Access Journals (Sweden)

    Hua Tong

    2018-03-01

    Full Text Available The dynamics of a supercooled liquid near the glass transition is characterized by two-step relaxation, fast β and slow α relaxations. Because of the apparently disordered nature of glassy structures, there have been long debates over whether the origin of drastic slowing-down of the α relaxation accompanied by heterogeneous dynamics is thermodynamic or dynamic. Furthermore, it has been elusive whether there is any deep connection between fast β and slow α modes. To settle these issues, here we introduce a set of new structural order parameters characterizing sterically favored structures with high local packing capability, and then access structure-dynamics correlation by a novel nonlocal approach. We find that the particle mobility is under control of the static order parameter field. The fast β process is controlled by the instantaneous order parameter field locally, resulting in short-time particle-scale dynamics. Then the mobility field progressively develops with time t, following the initial order parameter field from disorder to more ordered regions. As is well known, the heterogeneity in the mobility field (dynamic heterogeneity is maximized with a characteristic length ξ_{4}, when t reaches the relaxation time τ_{α}. We discover that this mobility pattern can be predicted solely by a spatial coarse graining of the initial order parameter field at t=0 over a length ξ without any dynamical information. Furthermore, we find a relation ξ∼ξ_{4}, indicating that the static length ξ grows coherently with the dynamic one ξ_{4} upon cooling. This further suggests an intrinsic link between τ_{α} and ξ: the growth of the static length ξ is the origin of dynamical slowing-down. These we confirm for the first time in binary glass formers both in two and three spatial dimensions. Thus, a static structure has two intrinsic characteristic lengths, particle size and ξ, which control dynamics in local and nonlocal manners, resulting

  9. Revealing Hidden Structural Order Controlling Both Fast and Slow Glassy Dynamics in Supercooled Liquids

    Science.gov (United States)

    Tong, Hua; Tanaka, Hajime

    2018-01-01

    The dynamics of a supercooled liquid near the glass transition is characterized by two-step relaxation, fast β and slow α relaxations. Because of the apparently disordered nature of glassy structures, there have been long debates over whether the origin of drastic slowing-down of the α relaxation accompanied by heterogeneous dynamics is thermodynamic or dynamic. Furthermore, it has been elusive whether there is any deep connection between fast β and slow α modes. To settle these issues, here we introduce a set of new structural order parameters characterizing sterically favored structures with high local packing capability, and then access structure-dynamics correlation by a novel nonlocal approach. We find that the particle mobility is under control of the static order parameter field. The fast β process is controlled by the instantaneous order parameter field locally, resulting in short-time particle-scale dynamics. Then the mobility field progressively develops with time t , following the initial order parameter field from disorder to more ordered regions. As is well known, the heterogeneity in the mobility field (dynamic heterogeneity) is maximized with a characteristic length ξ4, when t reaches the relaxation time τα. We discover that this mobility pattern can be predicted solely by a spatial coarse graining of the initial order parameter field at t =0 over a length ξ without any dynamical information. Furthermore, we find a relation ξ ˜ξ4, indicating that the static length ξ grows coherently with the dynamic one ξ4 upon cooling. This further suggests an intrinsic link between τα and ξ : the growth of the static length ξ is the origin of dynamical slowing-down. These we confirm for the first time in binary glass formers both in two and three spatial dimensions. Thus, a static structure has two intrinsic characteristic lengths, particle size and ξ , which control dynamics in local and nonlocal manners, resulting in the emergence of the two

  10. Intrinsic radioactivity of KSr2I5:Eu2+

    International Nuclear Information System (INIS)

    Rust, M.; Melcher, C.; Lukosi, E.

    2016-01-01

    A current need in nuclear security is an economical, yet high energy resolution (near 2%), scintillation detector suitable for gamma-ray spectroscopy. For current scintillators on the market, there is an inverse relationship between scintillator energy resolution and cost of production. A new promising scintillator, KSr 2 I 5 :Eu 2+ , under development at the University of Tennessee, has achieved an energy resolution of 2.4% at 662 keV at room temperature, with potential growth rates exceeding several millimeters per hour. However, the internal background due to the 40 K content could present a hurdle for effective source detection/identification in nuclear security applications. As a first step in addressing this question, this paper reports on a computational investigation of the intrinsic differential pulse height spectrum (DPHS) generated by 40 K within the KSr 2 I 5 :Eu 2+ scintillator as a function of crystal geometry. It was found that the DPHS remains relatively equal to a constant multiplicative factor of the negatron emission spectrum with a direct increase of the 1.46 MeV photopeak relative height to the negatron spectrum with volume. Further, peak pileup does not readily manifest itself for practical KSr 2 I 5 :Eu 2+ volumes.

  11. The fast encryption package

    Science.gov (United States)

    Bishop, Matt

    1988-01-01

    The organization of some tools to help improve passwork security at a UNIX-based site is described along with how to install and use them. These tools and their associated library enable a site to force users to pick reasonably safe passwords (safe being site configurable) and to enable site management to try to crack existing passworks. The library contains various versions of a very fast implementation of the Data Encryption Standard and of the one-way encryption functions used to encryp the password.

  12. Symmetries of collective models in intrinsic frame

    International Nuclear Information System (INIS)

    Gozdz, A.; Pedrak, A.; Szulerecka, A.; Dobrowolski, A.; Dudek, J.

    2013-01-01

    In the paper a very general definition of intrinsic frame, by means of group theoretical methods, is introduced. It allows to analyze nuclear properties which are invariant in respect to the group which defines the intrinsic frame. For example, nuclear shape is a well determined feature in the intrinsic frame defined by the Euclidean group. It is shown that using of intrinsic frame gives an opportunity to consider intrinsic nuclear symmetries which are independent of symmetries observed in the laboratory frame. An importance of the notion of partial symmetries is emphasized. (author)

  13. Fast-Valving of Large Steam Turbine Units as a Means of Power System Security Enhancement

    Directory of Open Access Journals (Sweden)

    Bogdan Sobczak

    2014-03-01

    Full Text Available Fast-valving assists in maintaining system stability following a severe transmission system fault by reducing the turbine mechanical power. Fast-valving consists in rapid closing and opening of steam valves in an adequate manner to reduce the generator accelerating power following the recognition of a severe fault. FV can be an effective and economical method of meeting the performance requirements of a power system in the presence of an increase in wind and solar generation in the power system, newly connected large thermal units and delaying of building new transmission lines. The principle of fast-valving and advantages of applying this technique in large steam turbine units was presented in the paper. Effectiveness of fast-valving in enhancing the stability of the Polish Power Grid was analyzed. The feasibility study of fast-valving application in the 560 MW unit in Kozienice Power Station (EW SA was discussed.

  14. Fluctuation-Response Relation and modeling in systems with fast and slow dynamics

    Directory of Open Access Journals (Sweden)

    G. Lacorata

    2007-10-01

    Full Text Available We show how a general formulation of the Fluctuation-Response Relation is able to describe in detail the connection between response properties to external perturbations and spontaneous fluctuations in systems with fast and slow variables. The method is tested by using the 360-variable Lorenz-96 model, where slow and fast variables are coupled to one another with reciprocal feedback, and a simplified low dimensional system. In the Fluctuation-Response context, the influence of the fast dynamics on the slow dynamics relies in a non trivial behavior of a suitable quadratic response function. This has important consequences for the modeling of the slow dynamics in terms of a Langevin equation: beyond a certain intrinsic time interval even the optimal model can give just statistical prediction.

  15. Assessment of plutonium security effect using import premium method

    International Nuclear Information System (INIS)

    Ohkubo, Hiroo; Aoyagi, Tadashi; Kikuchi, Masahiro; Suzuki, Atsuyuki.

    1994-01-01

    A mathematical formulation was developed to describe the concept of import premium method, which can quantify a security effect of demand reduction of imports by introducing the alternative before its supply disruption (or variation) may happen. Next, by using this formula, a security value of plutonium use (especially, fast breeder reactor), defined as a contributor to reduction of possibilities of disruption (or variation) of natural uranium supply was estimated. From these studies, it is concluded that although the formula proposed here is simplified, it may be available for assessing an energy security if only we prepare the data concerning future motions of supply and demand curves. (author)

  16. Neutronic design for a 100MWth Small modular natural circulation lead or lead-alloy cooled fast reactors core

    International Nuclear Information System (INIS)

    Chen, C.; Chen, H.; Zhang, H.; Chen, Z.; Zeng, Q.

    2015-01-01

    Lead or lead-alloy cooled fast reactor with good fuel proliferation and nuclear waste transmutation capability, as well as high security and economy, is a great potential for the development of fourth-generation nuclear energy systems. Small natural circulation reactor is an important technical route lead cooled fast reactors industrial applications, which has been chosen as one of the three reference technical for solution lead or lead-alloy cooled fast reactors by GIF lead-cooled fast reactor steering committee. The School of Nuclear Science and Technology of USTC proposed a small 100MW th natural circulation lead cooled fast reactor concept called SNCLFR-100 based realistic technology. This article describes the SNCLFR-100 reactor of the overall technical program, core physics calculation and analysis. The results show that: SNCLFR-100 with good neutronic and safety performance and relevant design parameters meet the security requirements with feasibility. (author)

  17. Telemedicine with integrated data security in ATM-based networks

    Science.gov (United States)

    Thiel, Andreas; Bernarding, Johannes; Kurth, Ralf; Wenzel, Rudiger; Villringer, Arno; Tolxdorff, Thomas

    1997-05-01

    Telemedical services rely on the digital transfer of large amounts of data in a short time. The acceptance of these services requires therefore new hard- and software concepts. The fast exchange of data is well performed within a high- speed ATM-based network. The fast access to the data from different platforms imposes more difficult problems, which may be divided into those relating to standardized data formats and those relating to different levels of data security across nations. For a standardized access to the formats and those relating to different levels of data security across nations. For a standardized access to the image data, a DICOM 3.0 server was implemented.IMages were converted into the DICOM 3.0 standard if necessary. The access to the server is provided by an implementation of DICOM in JAVA allowing access to the data from different platforms. Data protection measures to ensure the secure transfer of sensitive patient data are not yet solved within the DICOM concept. We investigated different schemes to protect data using the DICOM/JAVA modality with as little impact on data transfer speed as possible.

  18. Trends and Developments for Fast Neutron Reactors and Related Fuel Cycles

    International Nuclear Information System (INIS)

    Carré, Frank

    2013-01-01

    • FR13 – A unique and dedicated framework to share updates on national programs of Fast Reactor developments, projects of new builds and plans for the future: - Near term projects of sodium and lead-alloy Fast Reactors; - Gen-IV visions of sodium-cooled and alternative types of Fast Neutron Reactors (GFR, LFR…). • FR13 – A special emphasis put on Fast Reactor Safety, Sustainability of nuclear fuel cycle and Young Generation perspective. • FR13 – A catalyst for further collaborations and alliances: - To share visions of goals and advisable options for future Fast Reactors and Nuclear Fuel Cycle; - To share cost of R&D and large demonstrations (safety, security, recycling); - To progress towards harmonized international standards; - To integrate national projects into a consistent international roadmap

  19. Moving towards Cloud Security

    OpenAIRE

    Edit Szilvia Rubóczki; Zoltán Rajnai

    2015-01-01

    Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment th...

  20. Contributions of fast breeder test reactor to the advanced technology in India

    International Nuclear Information System (INIS)

    Kapoor, R.P.

    2001-01-01

    Fast Breeder Test Reactor (FBTR) is a 40 MWt/13.2 MWe loop type, sodium cooled, plutonium rich mixed carbide fuelled reactor. Its operation at Indira Gandhi Centre for Atomic Research, since first criticality in 1985, has contributed immensely to the advancement of this multidisciplinary and complex fast breeder technology in the country. It has also given a valuable operational feedback for the design of 500 MWe Prototype Fast Breeder Reactor. This paper highlights FBTR's significant contributions to this important technology which has a potential to provide energy security to the country in future. (author)

  1. Intrinsic Time Quantum Geometrodynamics

    OpenAIRE

    Ita III, Eyo Eyo; Soo, Chopin; Yu, Hoi-Lai

    2015-01-01

    Quantum Geometrodynamics with intrinsic time development and momentric variables is presented. An underlying SU(3) group structure at each spatial point regulates the theory. The intrinsic time behavior of the theory is analyzed, together with its ground state and primordial quantum fluctuations. Cotton-York potential dominates at early times when the universe was small; the ground state naturally resolves Penrose's Weyl Curvature Hypothesis, and thermodynamic and gravitational `arrows of tim...

  2. HEROICA: A fast screening facility for the characterization of germanium detectors

    Energy Technology Data Exchange (ETDEWEB)

    Andreotti, Erica [Universität Tübingen, Auf der Morgenstelle 14, 72076 Tübingen (Germany); Collaboration: GERDA Collaboration

    2013-08-08

    In the course of 2012, a facility for the fast screening of germanium detectors called HEROICA (Hades Experimental Research Of Intrinsic Crystal Appliances) has been installed at the HADES underground laboratory in the premises of the Belgian Nuclear Research Centre SCK•CEN, in Mol (Belgium). The facility allows performing a complete characterization of the critical germanium detectors' operational parameters with a rate of about two detectors per week.

  3. The energy gap and the fast reactor

    International Nuclear Information System (INIS)

    Hill, J.

    1977-01-01

    The background to the development of fast reactors is summarized. In Britain, the results of the many experiments performed, the operation of the Dounreay Fast Reactor for the past 18 years and the first year's operation of the larger Prototype Fast Reactor have all been very encouraging, in that they demonstrated that the performance corresponded well with predictions, breeding is possible, and the system is exceptionally stable in operation. The next step in fast reactor engineering is to build a full-scale fast reactor power station. There would seem to be little reason to expect more trouble than could reasonably be expected in constructing any large project of this general nature. However, from an engineering point of view continuity of experience is required. If a decision to build a commercial fast reactor were taken today there would be a 14-year gap between strating this and the start of the Prototype Fast Reactor. This is already much too long. From an environmental standpoint we have to demonstrate that we can manufacture and reprocess fast reacctor fuel for a substantial programme in a way that does not lead to pollution of the environment, and that plutonium-containing fuel can be transported in the quantities required in safety and in a way that does not attract terrorists or require a private army to ensure its security. Finally, we have to find a way to allow many countries to obtain the energy they need from fast reactors, without leading to the proliferation of nuclear weapons or weapons capability. (author)

  4. The intrinsic resistome of bacterial pathogens.

    Science.gov (United States)

    Olivares, Jorge; Bernardini, Alejandra; Garcia-Leon, Guillermo; Corona, Fernando; B Sanchez, Maria; Martinez, Jose L

    2013-01-01

    Intrinsically resistant bacteria have emerged as a relevant health problem in the last years. Those bacterial species, several of them with an environmental origin, present naturally low-level susceptibility to several drugs. It has been proposed that intrinsic resistance is mainly the consequence of the impermeability of cellular envelopes, the activity of multidrug efflux pumps or the lack of appropriate targets for a given family of drugs. However, recently published articles indicate that the characteristic phenotype of susceptibility to antibiotics of a given bacterial species depends on the concerted activity of several elements, what has been named as intrinsic resistome. These determinants comprise not just classical resistance genes. Other elements, several of them involved in basic bacterial metabolic processes, are of relevance for the intrinsic resistance of bacterial pathogens. In the present review we analyze recent publications on the intrinsic resistomes of Escherichia coli and Pseudomonas aeruginosa. We present as well information on the role that global regulators of bacterial metabolism, as Crc from P. aeruginosa, may have on modulating bacterial susceptibility to antibiotics. Finally, we discuss the possibility of searching inhibitors of the intrinsic resistome in the aim of improving the activity of drugs currently in use for clinical practice.

  5. The intrinsic resistome of bacterial pathogens

    Directory of Open Access Journals (Sweden)

    Jorge Andrés Olivares Pacheco

    2013-04-01

    Full Text Available Intrinsically resistant bacteria have emerged as a relevant health problem in the last years. Those bacterial species, several of them with an environmental origin, present naturally a low-level susceptibility to several drugs. It has been proposed that intrinsic resistance is mainly the consequence of the impermeability of cellular envelopes, the activity of multidrug efflux pumps or the lack of appropriate targets for a given family of drugs. However, recently published articles indicate that the characteristic phenotype of susceptibility to antibiotics of a given bacterial species depends on the concerted activity of several elements, what has been named as intrinsic resistome. These determinants comprise not just classical resistance genes. Other elements, several of them involved in basic bacterial metabolic processes, are of relevance for the intrinsic resistance of bacterial pathogens. In the present review we analyse recent publications on the intrinsic resistomes of Escherichia coli and Pseudomonas aeruginosa. We present as well information on the role that global regulators of bacterial metabolism, as Crc from P. aeruginosa, may have on modulating bacterial susceptibility to antibiotics. Finally, we discuss the possibility of searching inhibitors of the intrinsic resistome in the aim of improving the activity of drugs currently in use for clinical practice.

  6. Incentives and intrinsic motivation in healthcare.

    Science.gov (United States)

    Berdud, Mikel; Cabasés, Juan M; Nieto, Jorge

    It has been established in the literature that workers within public organisations are intrinsically motivated. This paper is an empirical study of the healthcare sector using methods of qualitative analysis research, which aims to answer the following hypotheses: 1) doctors are intrinsically motivated; 2) economic incentives and control policies may undermine doctors' intrinsic motivation; and 3) well-designed incentives may encourage doctors' intrinsic motivation. We conducted semi-structured interviews à-la-Bewley with 16 doctors from Navarre's Healthcare Service (Servicio Navarro de Salud-Osasunbidea), Spain. The questions were based on current theories of intrinsic motivation and incentives to test the hypotheses. Interviewees were allowed to respond openly without time constraints. Relevant information was selected, quantified and analysed by using the qualitative concepts of saturation and codification. The results seem to confirm the hypotheses. Evidence supporting hypotheses 1 and 2 was gathered from all interviewees, as well as indications of the validity of hypothesis 3 based on interviewees' proposals of incentives. The conclusions could act as a guide to support the optimal design of incentive policies and schemes within health organisations when healthcare professionals are intrinsically motivated. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  7. Intrinsic motivation and attentional capture from gamelike features in a visual search task.

    Science.gov (United States)

    Miranda, Andrew T; Palmer, Evan M

    2014-03-01

    In psychology research studies, the goals of the experimenter and the goals of the participants often do not align. Researchers are interested in having participants who take the experimental task seriously, whereas participants are interested in earning their incentive (e.g., money or course credit) as quickly as possible. Creating experimental methods that are pleasant for participants and that reward them for effortful and accurate data generation, while not compromising the scientific integrity of the experiment, would benefit both experimenters and participants alike. Here, we explored a gamelike system of points and sound effects that rewarded participants for fast and accurate responses. We measured participant engagement at both cognitive and perceptual levels and found that the point system (which invoked subtle, anonymous social competition between participants) led to positive intrinsic motivation, while the sound effects (which were pleasant and arousing) led to attentional capture for rewarded colors. In a visual search task, points were awarded after each trial for fast and accurate responses, accompanied by short, pleasant sound effects. We adapted a paradigm from Anderson, Laurent, and Yantis (Proceedings of the National Academy of Sciences 108(25):10367-10371, 2011b), in which participants completed a training phase during which red and green targets were probabilistically associated with reward (a point bonus multiplier). During a test phase, no points or sounds were delivered, color was irrelevant to the task, and previously rewarded targets were sometimes presented as distractors. Significantly longer response times on trials in which previously rewarded colors were present demonstrated attentional capture, and positive responses to a five-question intrinsic-motivation scale demonstrated participant engagement.

  8. The Neuroscience of Growth Mindset and Intrinsic Motivation.

    Science.gov (United States)

    Ng, Betsy

    2018-01-26

    Our actions can be triggered by intentions, incentives or intrinsic values. Recent neuroscientific research has yielded some results about the growth mindset and intrinsic motivation. With the advances in neuroscience and motivational studies, there is a global need to utilize this information to inform educational practice and research. Yet, little is known about the neuroscientific interplay between growth mindset and intrinsic motivation. This paper attempts to draw on the theories of growth mindset and intrinsic motivation, together with contemporary ideas in neuroscience, outline the potential for neuroscientific research in education. It aims to shed light on the relationship between growth mindset and intrinsic motivation in terms of supporting a growth mindset to facilitate intrinsic motivation through neural responses. Recent empirical research from the educational neuroscience perspective that provides insights into the interplay between growth mindset and intrinsic motivation will also be discussed.

  9. Neutronic design for a 100MW{sub th} Small modular natural circulation lead or lead-alloy cooled fast reactors core

    Energy Technology Data Exchange (ETDEWEB)

    Chen, C.; Chen, H.; Zhang, H.; Chen, Z.; Zeng, Q., E-mail: shchshch@ustc.edu.cn, E-mail: hlchen1@ustc.edu.cn, E-mail: kulah@mail.ustc.edu.cn, E-mail: zchen214@mail.ustc.edu.cn, E-mail: zengqin@ustc.edu.cn [Univ. of Science and Technology of China, School of Nuclear Science and Technology, Hefei, Anhui (China)

    2015-07-01

    Lead or lead-alloy cooled fast reactor with good fuel proliferation and nuclear waste transmutation capability, as well as high security and economy, is a great potential for the development of fourth-generation nuclear energy systems. Small natural circulation reactor is an important technical route lead cooled fast reactors industrial applications, which has been chosen as one of the three reference technical for solution lead or lead-alloy cooled fast reactors by GIF lead-cooled fast reactor steering committee. The School of Nuclear Science and Technology of USTC proposed a small 100MW{sub th} natural circulation lead cooled fast reactor concept called SNCLFR-100 based realistic technology. This article describes the SNCLFR-100 reactor of the overall technical program, core physics calculation and analysis. The results show that: SNCLFR-100 with good neutronic and safety performance and relevant design parameters meet the security requirements with feasibility. (author)

  10. Microwave and millimeter-wave remote sensing for security applications

    CERN Document Server

    Nanzer, Jeffrey

    2012-01-01

    Microwave and millimeter-wave remote sensing techniques are fast becoming a necessity in many aspects of security as detection and classification of objects or intruders becomes more difficult. This groundbreaking resource offers you expert guidance in this burgeoning area. It provides you with a thorough treatment of the principles of microwave and millimeter-wave remote sensing for security applications, as well as practical coverage of the design of radiometer, radar, and imaging systems. You learn how to design active and passive sensors for intruder detection, concealed object detection,

  11. The Neuroscience of Growth Mindset and Intrinsic Motivation

    Directory of Open Access Journals (Sweden)

    Betsy Ng

    2018-01-01

    Full Text Available Our actions can be triggered by intentions, incentives or intrinsic values. Recent neuroscientific research has yielded some results about the growth mindset and intrinsic motivation. With the advances in neuroscience and motivational studies, there is a global need to utilize this information to inform educational practice and research. Yet, little is known about the neuroscientific interplay between growth mindset and intrinsic motivation. This paper attempts to draw on the theories of growth mindset and intrinsic motivation, together with contemporary ideas in neuroscience, outline the potential for neuroscientific research in education. It aims to shed light on the relationship between growth mindset and intrinsic motivation in terms of supporting a growth mindset to facilitate intrinsic motivation through neural responses. Recent empirical research from the educational neuroscience perspective that provides insights into the interplay between growth mindset and intrinsic motivation will also be discussed.

  12. Ultra-fast secure communication with complex systems in classical channels (Conference Presentation)

    KAUST Repository

    Mazzone, Valerio; Di Falco, Andrea; Fratalocchi, Andrea

    2017-01-01

    Developing secure communications is a research area of growing interest. During the past years, several cryptographic schemes have been developed, with Quantum cryptography being a promising scheme due to the use of quantum effects, which make very

  13. Beyond the evoked/intrinsic neural process dichotomy

    Directory of Open Access Journals (Sweden)

    Taylor Bolt

    2018-03-01

    Full Text Available Contemporary functional neuroimaging research has increasingly focused on characterization of intrinsic or “spontaneous” brain activity. Analysis of intrinsic activity is often contrasted with analysis of task-evoked activity that has traditionally been the focus of cognitive neuroscience. But does this evoked/intrinsic dichotomy adequately characterize human brain function? Based on empirical data demonstrating a close functional interdependence between intrinsic and task-evoked activity, we argue that the dichotomy between intrinsic and task-evoked activity as unobserved contributions to brain activity is artificial. We present an alternative picture of brain function in which the brain’s spatiotemporal dynamics do not consist of separable intrinsic and task-evoked components, but reflect the enaction of a system of mutual constraints to move the brain into and out of task-appropriate functional configurations. According to this alternative picture, cognitive neuroscientists are tasked with describing both the temporal trajectory of brain activity patterns across time, and the modulation of this trajectory by task states, without separating this process into intrinsic and task-evoked components. We argue that this alternative picture of brain function is best captured in a novel explanatory framework called enabling constraint. Overall, these insights call for a reconceptualization of functional brain activity, and should drive future methodological and empirical efforts.

  14. Acoustic resonance spectroscopy intrinsic seals

    International Nuclear Information System (INIS)

    Olinger, C.T.; Burr, T.; Vnuk, D.R.

    1994-01-01

    We have begun to quantify the ability of acoustic resonance spectroscopy (ARS) to detect the removal and replacement of the lid of a simulated special nuclear materials drum. Conceptually, the acoustic spectrum of a container establishcs a baseline fingerprint, which we refer to as an intrinsic seal, for the container. Simply removing and replacing the lid changes some of the resonant frequencies because it is impossible to exactly duplicate all of the stress patterns between the lid and container. Preliminary qualitative results suggested that the ARS intrinsic seal could discriminate between cases where a lid has or has not been removed. The present work is directed at quantifying the utility of the ARS intrinsic seal technique, including the technique's sensitivity to ''nuisance'' effects, such as temperature swings, movement of the container, and placement of the transducers. These early quantitative tests support the potential of the ARS intrinsic seal application, but also reveal a possible sensitivity to nuisance effects that could limit environments or conditions under which the technique is effective

  15. Chromatin damage induced by fast neutrons or UV laser radiation

    Energy Technology Data Exchange (ETDEWEB)

    Radu, L.; Constantinescu, B.; Gazdaru, D.; Mihailescu, I

    2002-07-01

    Chromatin samples from livers of Wistar rats were subjected to fast neutron irradiation in doses of 10-100 Gy or to a 248 nm excimer laser radiation, in doses of 0.5-3 MJ.m{sup -2}. The action of the radiation on chromatin was monitored by chromatin intrinsic fluorescence and fluorescence lifetimes (of bound ethidium bromide to chromatin) and by analysing fluorescence resonance energy transfer between dansyl chloride and acridine orange coupled to chromatin. For the mentioned doses of UV excimer laser radiation, the action on chromatin was more intense than in the case of fast neutrons. The same types of damage are produced by the two radiations: acidic and basic destruction of chromatin protein structure, DNA strand breaking and the increase of the distance between DNA and proteins in chromatin. (author)

  16. Chromatin damage induced by fast neutrons or UV laser radiation

    International Nuclear Information System (INIS)

    Radu, L.; Constantinescu, B.; Gazdaru, D.; Mihailescu, I.

    2002-01-01

    Chromatin samples from livers of Wistar rats were subjected to fast neutron irradiation in doses of 10-100 Gy or to a 248 nm excimer laser radiation, in doses of 0.5-3 MJ.m -2 . The action of the radiation on chromatin was monitored by chromatin intrinsic fluorescence and fluorescence lifetimes (of bound ethidium bromide to chromatin) and by analysing fluorescence resonance energy transfer between dansyl chloride and acridine orange coupled to chromatin. For the mentioned doses of UV excimer laser radiation, the action on chromatin was more intense than in the case of fast neutrons. The same types of damage are produced by the two radiations: acidic and basic destruction of chromatin protein structure, DNA strand breaking and the increase of the distance between DNA and proteins in chromatin. (author)

  17. Structural vs. intrinsic carriers: contrasting effects of cation chemistry and disorder on ionic conductivity in pyrochlores

    International Nuclear Information System (INIS)

    Perriot, Romain; Uberuaga, Blas P.

    2015-01-01

    We use molecular dynamics simulations to investigate the role of cation disorder on oxygen diffusion in Gd 2 Zr 2 O 7 (GZO) and Gd 2 Ti 2 O 7 (GTO) pyrochlores, a class of complex oxides which contain a structural vacancy relative to the basic fluorite structure. The introduction of disorder has distinct effects depending on the chemistry of the material, increasing the mobility of structural carriers by up to four orders of magnitude in GZO. In contrast, in GTO, there is no mobility at zero or low disorder on the ns timescale, but higher disorder liberates the otherwise immobile carriers, allowing diffusion with rates comparable to GZO for the fully disordered material. Here, we show that the cation disorder enhances the diffusivity by both increasing the concentration of mobile structural carriers and their individual mobility. The disorder also influences the diffusion in materials containing intrinsic carriers, such as additional vacancies VO or oxygen interstitials OI. And while in ordered GZO and GTO the contribution of the intrinsic carriers dominates the overall diffusion of oxygen, OI in GZO contributes along with structural carriers, and the total diffusion rate can be calculated by assuming simple additive contributions from the two sources. Although the disorder in the materials with intrinsic defects usually enhances the diffusivity as in the defect-free case, in low concentrations, cation antisites AB or BA, where A = Gd and B = Zr or Ti, can act as traps for fast intrinsic defects. The trapping results in a lowering of the diffusivity, and causes a non-monotonic behavior of the diffusivity with disorder. Conversely, in the case of slow intrinsic defects, the main effect of the disorder is to liberate the structural carriers, resulting in an increase of the diffusivity regardless of the defect trapping.

  18. Demonstration of Ultra-Fast Switching in Nano metallic Resistive Switching Memory Devices

    International Nuclear Information System (INIS)

    Yang, Y.

    2016-01-01

    Interdependency of switching voltage and time creates a dilemma/obstacle for most resistive switching memories, which indicates low switching voltage and ultra-fast switching time cannot be simultaneously achieved. In this paper, an ultra-fast (sub-100 ns) yet low switching voltage resistive switching memory device (“nano metallic ReRAM”) was demonstrated. Experimental switching voltage is found independent of pulse width (intrinsic device property) when the pulse is long but shows abrupt time dependence (“cliff”) as pulse width approaches characteristic RC time of memory device (extrinsic device property). Both experiment and simulation show that the onset of cliff behavior is dependent on physical device size and parasitic resistance, which is expected to diminish as technology nodes shrink down. We believe this study provides solid evidence that nano metallic resistive switching memory can be reliably operated at low voltage and ultra-fast regime, thus beneficial to future memory technology.

  19. PeerFlow: Secure Load Balancing in Tor

    Directory of Open Access Journals (Sweden)

    Johnson Aaron

    2017-04-01

    Full Text Available We present PeerFlow, a system to securely load balance client traffic in Tor. Security in Tor requires that no adversary handle too much traffic. However, Tor relays are run by volunteers who cannot be trusted to report the relay bandwidths, which Tor clients use for load balancing. We show that existing methods to determine the bandwidths of Tor relays allow an adversary with little bandwidth to attack large amounts of client traffic. These methods include Tor’s current bandwidth-scanning system, TorFlow, and the peer-measurement system EigenSpeed. We present an improved design called PeerFlow that uses a peer-measurement process both to limit an adversary’s ability to increase his measured bandwidth and to improve accuracy. We show our system to be secure, fast, and efficient. We implement PeerFlow in Tor and demonstrate its speed and accuracy in large-scale network simulations.

  20. Crowding out intrinsic motivation in the public sector

    OpenAIRE

    Georgellis, Y; Iossa, E; Tabvuma, V

    2011-01-01

    Employing intrinsically motivated individuals has been proposed as a means of improving public sector performance. In this article, we investigate whether intrinsic motivation affects the sorting of employees between the private and the public sectors, paying particular attention to whether extrinsic rewards crowd out intrinsic motivation. Using British longitudinal data, we find that individuals are attracted to the public sector by the intrinsic rather than the extrinsic rewards that the se...

  1. The impact of intrinsic and extrinsic factors on the job satisfaction of dentists.

    Science.gov (United States)

    Goetz, K; Campbell, S M; Broge, B; Dörfer, C E; Brodowski, M; Szecsenyi, J

    2012-10-01

    The Two-Factor Theory of job satisfaction distinguishes between intrinsic-motivation (i.e. recognition, responsibility) and extrinsic-hygiene (i.e. job security, salary, working conditions) factors. The presence of intrinsic-motivation facilitates higher satisfaction and performance, whereas the absences of extrinsic factors help mitigate against dissatisfaction. The consideration of these factors and their impact on dentists' job satisfaction is essential for the recruitment and retention of dentists. The objective of the study is to assess the level of job satisfaction of German dentists and the factors that are associated with it. This cross-sectional study was based on a job satisfaction survey. Data were collected from 147 dentists working in 106 dental practices. Job satisfaction was measured with the 10-item Warr-Cook-Wall job satisfaction scale. Organizational characteristics were measured with two items. Linear regression analyses were performed in which each of the nine items of the job satisfaction scale (excluding overall satisfaction) were handled as dependent variables. A stepwise linear regression analysis was performed with overall job satisfaction as the dependent outcome variable, the nine items of job satisfaction and the two items of organizational characteristics controlled for age and gender as predictors. The response rate was 95.0%. Dentists were satisfied with 'freedom of working method' and mostly dissatisfied with their 'income'. Both variables are extrinsic factors. The regression analyses identified five items that were significantly associated with each item of the job satisfaction scale: 'age', 'mean weekly working time', 'period in the practice', 'number of dentist's assistant' and 'working atmosphere'. Within the stepwise linear regression analysis the intrinsic factor 'opportunity to use abilities' (β = 0.687) showed the highest score of explained variance (R(2) = 0.468) regarding overall job satisfaction. With respect to the Two

  2. Secure Communications over Wireless Networks Even 1-bit Feedback Helps Achieving Security

    KAUST Repository

    Rezki, Zouheir

    2016-01-06

    Recently, there have been a surge toward developing sophisticated security mechanisms based on a cross layer design. While an extensive progress has been realized toward establishing physical layer security as an important design paradigm to enhance security of existing wireless networks, only a little effort has been made toward designing practical coding schemes that achieve or approach the secrecy capacity. Most of existing results are tied to some simplifying assumptions that do not seem always reasonable (passive eavesdropper, perfect channel state information (CSI), etc.). Furthermore, it is still not very clear how to exploit physical layer security paradigms, together with existing cryptosystems, in order to add a supplementary level of protection for information transmission or to achieve key agreement. In this talk, we address the first part of the above problematic, i.e., the effect of channel uncertainty on network security. Particularly, we show that even a coarse estimate of the main channel (channel between the transmitter and the legitimate receiver) can help providing a positive secrecy rate. Specifically, we assume two types of channel uncertainty at the transmitter. The first one is a rate-limited feedback in a block fading channel where the feedback information can be proactive (at the beginning of the coherence block) or of ARQ-type. The second type of uncertainty takes the form of a noisy estimate of the main channel at the transmitter in a fast fading channel. In both cases, we provide upper and lower bounds on the secrecy capacity. We argue how our achievable schemes and upper bounding techniques extend to multi-user setting (broadcasting a single confidential message or multiple confidential messages to multiple legitimate receivers) and to multiple antenna channels.

  3. Secure Communications over Wireless Networks Even 1-bit Feedback Helps Achieving Security

    KAUST Repository

    Rezki, Zouheir

    2016-01-01

    Recently, there have been a surge toward developing sophisticated security mechanisms based on a cross layer design. While an extensive progress has been realized toward establishing physical layer security as an important design paradigm to enhance security of existing wireless networks, only a little effort has been made toward designing practical coding schemes that achieve or approach the secrecy capacity. Most of existing results are tied to some simplifying assumptions that do not seem always reasonable (passive eavesdropper, perfect channel state information (CSI), etc.). Furthermore, it is still not very clear how to exploit physical layer security paradigms, together with existing cryptosystems, in order to add a supplementary level of protection for information transmission or to achieve key agreement. In this talk, we address the first part of the above problematic, i.e., the effect of channel uncertainty on network security. Particularly, we show that even a coarse estimate of the main channel (channel between the transmitter and the legitimate receiver) can help providing a positive secrecy rate. Specifically, we assume two types of channel uncertainty at the transmitter. The first one is a rate-limited feedback in a block fading channel where the feedback information can be proactive (at the beginning of the coherence block) or of ARQ-type. The second type of uncertainty takes the form of a noisy estimate of the main channel at the transmitter in a fast fading channel. In both cases, we provide upper and lower bounds on the secrecy capacity. We argue how our achievable schemes and upper bounding techniques extend to multi-user setting (broadcasting a single confidential message or multiple confidential messages to multiple legitimate receivers) and to multiple antenna channels.

  4. Defining intrinsic vs. extrinsic atopic dermatitis.

    Science.gov (United States)

    Karimkhani, Chante; Silverberg, Jonathan I; Dellavalle, Robert P

    2015-06-16

    Atopic dermatitis (AD) is a chronic, relapsing inflammatory skin condition characterized by eczematous lesions, i.e. ill-demarcated erythematous patches and plaques. AD is commonly associated with elevated immunoglobulin E (IgE) and atopic disorders, such as asthma, hay fever, and food allergies. Rackemann and Mallory were some of the first to distinguish between asthma based on the presence ("extrinsic") or absence ("intrinsic") of allergy. This distinction has subsequently been applied to AD based on the presence ("extrinsic") or absence ("intrinsic") of increased IgE and atopic disease. Although the distinction between intrinsic and extrinsic AD is widely used, it remains controversial.

  5. Intrinsic Tunneling in Phase Separated Manganites

    Science.gov (United States)

    Singh-Bhalla, G.; Selcuk, S.; Dhakal, T.; Biswas, A.; Hebard, A. F.

    2009-02-01

    We present evidence of direct electron tunneling across intrinsic insulating regions in submicrometer wide bridges of the phase-separated ferromagnet (La,Pr,Ca)MnO3. Upon cooling below the Curie temperature, a predominantly ferromagnetic supercooled state persists where tunneling across the intrinsic tunnel barriers (ITBs) results in metastable, temperature-independent, high-resistance plateaus over a large range of temperatures. Upon application of a magnetic field, our data reveal that the ITBs are extinguished resulting in sharp, colossal, low-field resistance drops. Our results compare well to theoretical predictions of magnetic domain walls coinciding with the intrinsic insulating phase.

  6. Intrinsic-extrinsic factors in sport motivation.

    Science.gov (United States)

    Pedersen, Darhl M

    2002-10-01

    Participants were 83 students (36 men and 47 women). 10 intrinsic-extrinsic factors involved in sport motivation were obtained. The factors were generated from items obtained from the participants rather than items from the experimenter. This was done to avoid the possible influence of preconceptions on the part of the experimenter regarding what the final dimensions may be. Obtained motivational factors were Social Reinforcement, Fringe Benefits, Fame and Fortune, External Forces, Proving Oneself, Social Benefits, Mental Enrichment, Expression of Self, Sense of Accomplishment, and Self-enhancement. Each factor was referred to an intrinsic-extrinsic dimension to describe its relative position on that dimension. The order of the factors as listed indicates increasing intrinsic motivation. i.e., the first four factors were rated in the extrinsic range, whereas the remaining six were rated to be in the intrinsic range. Next, the participants rated the extent to which each of the various factors was involved in their decision to participate in sport activities. The pattern of use of the motivational factors was the same for both sexes except that men indicated greater use of the Fringe Benefits factor. Overall, the more intrinsic a sport motivation factor was rated, the more likely it was to be rated as a factor in actual sport participation.

  7. First results on fast baking

    International Nuclear Information System (INIS)

    Visentin, B.; Gasser, Y.; Charrier, J.P.

    2006-01-01

    High gradient performances of bulk niobium cavities go through a low-temperature baking during one or two days, the temperature parameter is adjusted in a narrow tuning range around 110 or 120deg, C. With such treatment, the intrinsic quality factor Q 0 is improved at high fields. Assuming the oxygen diffusion is involved in this phenomenon, we have developed the 'fast baking' (145deg, C/3h) as an alternative method. Similar results have been achieved with this method compared to standard baking. Consequently, for the first time, a link between oxygen diffusion and high field Q-slope has been demonstrated. Furthermore, this method open the way to a simpler and better baking procedure for the large-scale cavity production due to:*time reduction and *possibility to combine baking and drying during cavity preparation

  8. A Novel Deterministic Secure Quantum Communication Scheme with Einstein—Podolsky—Rosen Pairs and Single Photons

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Liu Xiao; Shang Tao

    2013-01-01

    A novel deterministic secure quantum communication (DSQC) scheme is presented based on Einstein-Podolsky-Rosen (EPR) pairs and single photons in this study. In this scheme, the secret message can be encoded directly on the first particles of the prepared Bell states by simple unitary operations and decoded by performing the Bell-basis measurement after the additional classic information is exchanged. In addition, the strategy with two-step transmission of quantum data blocks and the technique of decoy-particle checking both are exploited to guarantee the security of the communication. Compared with some previous DSQC schemes, this scheme not only has a higher resource capacity, intrinsic efficiency and total efficiency, but also is more realizable in practical applications. Security analysis shows that the proposed scheme is unconditionally secure against various attacks over an ideal quantum channel and still conditionally robust over a noisy and lossy quantum channel. (general)

  9. Compact Neutron Generators for Medical, Home Land Security, and Planetary Exploration

    CERN Document Server

    Reijonen, Jani

    2005-01-01

    The Plasma and Ion Source Technology Group at Lawrence Berkeley National Laboratory has developed various types of advanced D-D (neutron energy 2.5 MeV), D-T (14 MeV) and T-T (0 - 9 MeV) neutron generators for wide range of applications. These applications include medical (Boron Neutron Capture Therapy), homeland security (Prompt Gamma Activation Analysis, Fast Neutron Activation Analysis and Pulsed Fast Neutron Transmission Spectroscopy) and planetary exploration in form of neutron based, sub-surface hydrogen detection systems. These neutron generators utilize RF induction discharge to ionize the deuterium/tritium gas. This discharge method provides high plasma density for high output current, high atomic species from molecular gases, long life operation and versatility for various discharge chamber geometries. Three main neutron generator developments are discussed here: high neutron output co-axial neutron generator for BNCT applications, point neutron generator for security applications, compact and sub-c...

  10. Experiences matter: Positive emotions facilitate intrinsic motivation

    OpenAIRE

    Løvoll, Helga Synnevåg; Røysamb, Espen; Vittersø, Joar

    2017-01-01

    This paper has two major aims. First, to investigate how positive emotions and intrinsic motivation affect each other over time. Second, to test the effect of positive emotions and intrinsic motivation on subsequent educational choices. Through two ordinary study semesters, 64 sport students in Norway reported on their intrinsic motivation for outdoor activities (twice) as well as positive emotions after two three-day outdoor events (four times). Next autumn, students study choice was collect...

  11. Experiences matter: Positive emotions facilitate intrinsic motivation

    OpenAIRE

    Løvoll, Helga Synnevåg; Røysamb, Espen; Vittersø, Joar

    2017-01-01

    https://doi.org/10.1080/23311908.2017.1340083 This paper has two major aims. First, to investigate how positive emotions and intrinsic motivation affect each other over time. Second, to test the effect of positive emotions and intrinsic motivation on subsequent educational choices. Through two ordinary study semesters, 64 sport students in Norway reported on their intrinsic motivation for outdoor activities (twice) as well as positive emotions after two three-day outdoor e...

  12. Intrinsic and extrinsic geometry of random surfaces

    International Nuclear Information System (INIS)

    Jonsson, T.

    1992-01-01

    We prove that the extrinsic Hausdorff dimension is always greater than or equal to the intrinsic Hausdorff dimension in models of triangulated random surfaces with action which is quadratic in the separation of vertices. We furthermore derive a few naive scaling relations which relate the intrinsic Hausdorff dimension to other critical exponents. These relations suggest that the intrinsic Hausdorff dimension is infinite if the susceptibility does not diverge at the critical point. (orig.)

  13. Fast frequency hopping codes applied to SAC optical CDMA network

    Science.gov (United States)

    Tseng, Shin-Pin

    2015-06-01

    This study designed a fast frequency hopping (FFH) code family suitable for application in spectral-amplitude-coding (SAC) optical code-division multiple-access (CDMA) networks. The FFH code family can effectively suppress the effects of multiuser interference and had its origin in the frequency hopping code family. Additional codes were developed as secure codewords for enhancing the security of the network. In considering the system cost and flexibility, simple optical encoders/decoders using fiber Bragg gratings (FBGs) and a set of optical securers using two arrayed-waveguide grating (AWG) demultiplexers (DeMUXs) were also constructed. Based on a Gaussian approximation, expressions for evaluating the bit error rate (BER) and spectral efficiency (SE) of SAC optical CDMA networks are presented. The results indicated that the proposed SAC optical CDMA network exhibited favorable performance.

  14. Intrinsic Motivation: An Overlooked Component for Student Success

    Science.gov (United States)

    Augustyniak, Robert A.; Ables, Adrienne Z.; Guilford, Philip; Lujan, Heidi L.; Cortright, Ronald N.; DiCarlo, Stephen E.

    2016-01-01

    Intrinsic motivation to learn involves engaging in learning opportunities because they are seen as enjoyable, interesting, or relevant to meeting one's core psychological needs. As a result, intrinsic motivation is associated with high levels of effort and task performance. Students with greater levels of intrinsic motivation demonstrate strong…

  15. The value of nature: Economic, intrinsic, or both?

    Science.gov (United States)

    There has been a long standing argument that ecosystems have intrinsic value and therefore there is no need to put a price tag on Mother Nature. The concept of intrinsic value reflects the perspective that nature has value in its own right, independent of human uses. Intrinsic va...

  16. Intrinsic and extrinsic motivation for smoking cessation.

    Science.gov (United States)

    Curry, S; Wagner, E H; Grothaus, L C

    1990-06-01

    An intrinsic-extrinsic model of motivation for smoking cessation was evaluated with 2 samples (ns = 1.217 and 151) of smokers who requested self-help materials for smoking cessation. Exploratory and confirmatory principal components analysis on a 36-item Reasons for Quitting (RFQ) scale supported the intrinsic-extrinsic motivation distinction. A 4-factor model, with 2 intrinsic dimensions (concerns about health and desire for self-control) and 2 extrinsic dimensions (immediate reinforcement and social influence), was defined by 20 of the 36 RFQ items. The 20-item measure demonstrated moderate to high levels of internal consistency and convergent and discriminant validity. Logistic regression analyses indicated that smokers with higher levels of intrinsic relative to extrinsic motivation were more likely to achieve abstinence from smoking.

  17. Deuterium NMR, induced and intrinsic cholesteric lyomesophases

    International Nuclear Information System (INIS)

    Alcantara, M.R.

    1982-01-01

    Induced and intrinsic cholesteric lyotropic mesophases were studied. Induced cholesteric lyomesophases based on potassium laurate (KL) system, with small amounts of cholesterol added, were studied by deuterium NMR and by polarizing microscopy. Order profiles obtained from deuterium NMR of KL perdenderated chains in both induced cholesteric and normal mesophases were compared. The intrinsic cholesteric lyotropic mesophases were based on the amphiphile potassium N-lauroyl serinate (KLNS) in the resolved levo form. The study of the type I intrinsic cholesteric mesophase was made by optical microscopy under polarized light and the type II intrinsic cholesteric lyomesophase was characterized by deuterium NMR. The new texture was explained by the use of the theory of disclinations developed for thermotropic liquid crystals, specially for cholesteric type. (M.J.C.) [pt

  18. Intrinsic bioremediation of landfills interim report

    International Nuclear Information System (INIS)

    Brigmon, R.L.; Fliermans, C.B.

    1997-01-01

    Intrinsic bioremediation is a risk management option that relies on natural biological and physical processes to contain the spread of contamination from a source. Evidence is presented in this report that intrinsic bioremediation is occurring at the Sanitary Landfill is fundamental to support incorportion into a Corrective Action Plan (CAP)

  19. Intrinsic bioremediation of landfills interim report

    Energy Technology Data Exchange (ETDEWEB)

    Brigmon, R.L. [Westinghouse Savannah River Company, Aiken, SC (United States); Fliermans, C.B.

    1997-07-14

    Intrinsic bioremediation is a risk management option that relies on natural biological and physical processes to contain the spread of contamination from a source. Evidence is presented in this report that intrinsic bioremediation is occurring at the Sanitary Landfill is fundamental to support incorportion into a Corrective Action Plan (CAP).

  20. Expressing intrinsic volumes as rotational integrals

    DEFF Research Database (Denmark)

    Auneau, Jeremy Michel; Jensen, Eva Bjørn Vedel

    2010-01-01

    A new rotational formula of Crofton type is derived for intrinsic volumes of a compact subset of positive reach. The formula provides a functional defined on the section of X with a j-dimensional linear subspace with rotational average equal to the intrinsic volumes of X. Simplified forms of the ...

  1. Status report on the Small Secure Transportable Autonomous Reactor (SSTAR) /Lead-cooled Fast Reactor (LFR) and supporting research and development.

    Energy Technology Data Exchange (ETDEWEB)

    Sienicki, J. J.; Moisseytsev, A.; Yang, W. S.; Wade, D. C.; Nikiforova, A.; Hanania, P.; Ryu, H. J.; Kulesza, K. P.; Kim, S. J.; Halsey, W. G.; Smith, C. F.; Brown, N. W.; Greenspan, E.; de Caro, M.; Li, N.; Hosemann, P.; Zhang, J.; Yu, H.; Nuclear Engineering Division; LLNL; LANL; Massachusetts Inst. of Tech.; Ecole des Mines de Paris; Oregon State Univ.; Univ.of California at Berkley

    2008-06-23

    This report provides an update on development of a pre-conceptual design for the Small Secure Transportable Autonomous Reactor (SSTAR) Lead-Cooled Fast Reactor (LFR) plant concept and supporting research and development activities. SSTAR is a small, 20 MWe (45 MWt), natural circulation, fast reactor plant for international deployment concept incorporating proliferation resistance for deployment in non-fuel cycle states and developing nations, fissile self-sufficiency for efficient utilization of uranium resources, autonomous load following making it suitable for small or immature grid applications, and a high degree of passive safety further supporting deployment in developing nations. In FY 2006, improvements have been made at ANL to the pre-conceptual design of both the reactor system and the energy converter which incorporates a supercritical carbon dioxide Brayton cycle providing higher plant efficiency (44 %) and improved economic competitiveness. The supercritical CO2 Brayton cycle technology is also applicable to Sodium-Cooled Fast Reactors providing the same benefits. One key accomplishment has been the development of a control strategy for automatic control of the supercritical CO2 Brayton cycle in principle enabling autonomous load following over the full power range between nominal and essentially zero power. Under autonomous load following operation, the reactor core power adjusts itself to equal the heat removal from the reactor system to the power converter through the large reactivity feedback of the fast spectrum core without the need for motion of control rods, while the automatic control of the power converter matches the heat removal from the reactor to the grid load. The report includes early calculations for an international benchmarking problem for a LBE-cooled, nitride-fueled fast reactor core organized by the IAEA as part of a Coordinated Research Project on Small Reactors without Onsite Refueling; the calculations use the same neutronics

  2. Fast and efficient wireless power transfer via transitionless quantum driving.

    Science.gov (United States)

    Paul, Koushik; Sarma, Amarendra K

    2018-03-07

    Shortcut to adiabaticity (STA) techniques have the potential to drive a system beyond the adiabatic limits. Here, we present a robust and efficient method for wireless power transfer (WPT) between two coils based on the so-called transitionless quantum driving (TQD) algorithm. We show that it is possible to transfer power between the coils significantly fast compared to its adiabatic counterpart. The scheme is fairly robust against the variations in the coupling strength and the coupling distance between the coils. Also, the scheme is found to be reasonably immune to intrinsic losses in the coils.

  3. Identifying the neural substrates of intrinsic motivation during task performance.

    Science.gov (United States)

    Lee, Woogul; Reeve, Johnmarshall

    2017-10-01

    Intrinsic motivation is the inherent tendency to seek out novelty and challenge, to explore and investigate, and to stretch and extend one's capacities. When people imagine performing intrinsically motivating tasks, they show heightened anterior insular cortex (AIC) activity. To fully explain the neural system of intrinsic motivation, however, requires assessing neural activity while people actually perform intrinsically motivating tasks (i.e., while answering curiosity-inducing questions or solving competence-enabling anagrams). Using event-related functional magnetic resonance imaging, we found that the neural system of intrinsic motivation involves not only AIC activity, but also striatum activity and, further, AIC-striatum functional interactions. These findings suggest that subjective feelings of intrinsic satisfaction (associated with AIC activations), reward processing (associated with striatum activations), and their interactions underlie the actual experience of intrinsic motivation. These neural findings are consistent with the conceptualization of intrinsic motivation as the pursuit and satisfaction of subjective feelings (interest and enjoyment) as intrinsic rewards.

  4. Fast gamma oscillations are generated intrinsically in CA1 without the involvement of fast-spiking basket cells.

    Science.gov (United States)

    Craig, Michael T; McBain, Chris J

    2015-02-25

    Information processing in neuronal networks relies on the precise synchronization of ensembles of neurons, coordinated by the diverse family of inhibitory interneurons. Cortical interneurons can be usefully parsed by embryonic origin, with the vast majority arising from either the caudal or medial ganglionic eminences (CGE and MGE). Here, we examine the activity of hippocampal interneurons during gamma oscillations in mouse CA1, using an in vitro model where brief epochs of rhythmic activity were evoked by local application of kainate. We found that this CA1 KA-evoked gamma oscillation was faster than that in CA3 and, crucially, did not appear to require the involvement of fast-spiking basket cells. In contrast to CA3, we also found that optogenetic inhibition of pyramidal cells in CA1 did not significantly affect the power of the oscillation, suggesting that excitation may not be essential for gamma genesis in this region. We found that MGE-derived interneurons were generally more active than CGE interneurons during CA1 gamma, although a group of CGE-derived interneurons, putative trilaminar cells, were strongly phase-locked with gamma oscillations and, together with MGE-derived axo-axonic and bistratified cells, provide attractive candidates for being the driver of this locally generated, predominantly interneuron-driven model of gamma oscillations. Copyright © 2015 the authors 0270-6474/15/353616-09$15.00/0.

  5. Refining the intrinsic chimera flap: a review.

    Science.gov (United States)

    Agarwal, Jayant P; Agarwal, Shailesh; Adler, Neta; Gottlieb, Lawrence J

    2009-10-01

    Reconstruction of complex tissue deficiencies in which each missing component is in a different spatial relationship to each other can be particularly challenging, especially in patients with limited recipient vessels. The chimera flap design is uniquely suited to reconstruct these deformities. Chimera flaps have been previously defined in many ways with 2 main categories: prefabricated or intrinsic. Herein we attempt to clarify the definition of a true intrinsic chimeric flap and provide examples of how these constructs provide a method for reconstruction of complex defects. The versatility of the intrinsic chimera flap and its procurement from 7 different vascular systems is described. A clarification of the definition of a true intrinsic chimera flap is described. In addition, construction of flaps from the lateral femoral circumflex, deep circumflex iliac, inferior gluteal, peroneal, subscapular, thoracodorsal, and radial arterial systems is described to showcase the versatility of these chimera flaps. A true intrinsic chimera flap must consist of more than a single tissue type. Each of the tissue components receives its blood flow from separate vascular branches or perforators that are connected to a single vascular source. These vascular branches must be of appropriate length to allow for insetting with 3-dimensional spatial freedom. There are a multitude of sites from which true intrinsic chimera flaps may be harvested.

  6. Intrinsically Disordered Side of the Zika Virus Proteome

    Directory of Open Access Journals (Sweden)

    Rajanish Giri

    2016-11-01

    Full Text Available Over the last few decades, concepts of protein intrinsic disorder have been implicated in different biological processes. Recent studies have suggested that intrinsically disordered proteins (IDPs provide structural plasticity and functional diversity to viral proteins that are involved in rapid replication and immune evasion in host cells. In case of Zika virus, the roles of protein intrinsic disorder in mechanisms of pathogenesis are not completely understood. In this study, we have analyzed the prevalence of intrinsic disorder in Zika virus proteome (strain MR 766. Our analyses revealed that Zika virus polyprotein is enriched with intrinsically disordered protein regions (IDPRs and this finding is consistent with previous reports on the involvement of IDPs in shell formation and virulence of the Flaviviridae family. We found abundant IDPRs in Capsid, NS2B, NS3, NS4A, and NS5 proteins that are involved in mature particle formation and replication. In our view, the intrinsic disorder-focused analysis of ZIKV proteins could be important for the development of new disorder-based drugs.

  7. Collisionally induced stochastic dynamics of fast ions in solids

    International Nuclear Information System (INIS)

    Burgdoerfer, J.

    1989-01-01

    Recent developments in the theory of excited state formation in collisions of fast highly charged ions with solids are reviewed. We discuss a classical transport theory employing Monte-Carlo sampling of solutions of a microscopic Langevin equation. Dynamical screening by the dielectric medium as well as multiple collisions are incorporated through the drift and stochastic forces in the Langevin equation. The close relationship between the extrinsically stochastic dynamics described by the Langevin and the intrinsic stochasticity in chaotic nonlinear dynamical systems is stressed. Comparison with experimental data and possible modification by quantum corrections are discussed. 49 refs., 11 figs

  8. An assay for serum vitamin-B12 and for intrinsic factor antibody type I by means of hog intrinsic factor

    International Nuclear Information System (INIS)

    Hudak, J.; Berger, Z.; Varga, L.

    1980-01-01

    A new radioassay method was elaborated for the determination of the plasma level of vitamin B 12 and of the intrinsic factor antibody type I. The assay applies vitamin-B 12 labelled with 58 Co, but replaces human intrinsic factor by hog intrinsic factor. 124 cases were investigated by both the original and this modified method, and the results were in very good agreement. (L.E.)

  9. Introduction of regulatory guide on cyber security of L and C systems in nuclear facilities

    International Nuclear Information System (INIS)

    Kang, Y.; Jeong, C. H.; Kim, D. I.

    2008-01-01

    In the case of unauthorized individuals, systems and entities or process threatening the instrumentation and control systems of nuclear facilities using the intrinsic vulnerabilities of digital based technologies, those systems may lose their own required functions. The loss of required functions of the systems can seriously affect the safety of nuclear facilities. Consequently, digital instrumentation and control systems, which perform functions important to safety, should be designed and operated to respond to cyber threats capitalizing on the vulnerabilities of digital based technologies. To make it possible, the developers and licensees of nuclear facilities should perform appropriate cyber security activities throughout the whole life cycle of digital instrumentation and control systems. Under the goal of securing the safety of nuclear facilities, this paper presents the regulatory on cyber security activities to remove the cyber threats that exploit the vulnerabilities of digital instrumentation and control systems and to mitigate the effect of such threats. Presented regulatory guide includes establishing the cyber security policy and plan, analyzing and classifying the cyber threats and cyber security assessment of digital instrumentation and control systems. (authors)

  10. Intrinsic imperfection of self-differencing single-photon detectors harms the security of high-speed quantum cryptography systems

    Science.gov (United States)

    Jiang, Mu-Sheng; Sun, Shi-Hai; Tang, Guang-Zhao; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2013-12-01

    Thanks to the high-speed self-differencing single-photon detector (SD-SPD), the secret key rate of quantum key distribution (QKD), which can, in principle, offer unconditionally secure private communications between two users (Alice and Bob), can exceed 1 Mbit/s. However, the SD-SPD may contain loopholes, which can be exploited by an eavesdropper (Eve) to hack into the unconditional security of the high-speed QKD systems. In this paper, we analyze the fact that the SD-SPD can be remotely controlled by Eve in order to spy on full information without being discovered, then proof-of-principle experiments are demonstrated. Here, we point out that this loophole is introduced directly by the operating principle of the SD-SPD, thus, it cannot be removed, except for the fact that some active countermeasures are applied by the legitimate parties.

  11. Flavor Structure of Intrinsic Nucleon Sea

    International Nuclear Information System (INIS)

    Peng, Jen-Chieh; Chang, Wen-Chen; Cheng, Hai-Yang; Liu, Keh-Fei

    2015-01-01

    The concept of intrinsic charm suggested by Brodsky et al. is extended to lighter quarks. Extraction of the intrinsic ū, d-macron, and s-macron seas is obtained from an analysis of the d-macron − ū, s + s-macron, and ū + d-macron − s −s-macron distributions. The connection between the intrinsic/extrinsic seas and the connected/disconnected seas in lattice QCD is also examined. It is shown that the connected and disconnected components for the ū(x) + d-macron(x) sea can be separated. The striking x-dependence of the [s(x) + s-macron(x)]/[ū(x) + d-macron(x)] ratio is interpreted as an interplay between the connected and disconnected seas. (author)

  12. SSTAR: The US lead-cooled fast reactor (LFR)

    International Nuclear Information System (INIS)

    Smith, Craig F.; Halsey, William G.; Brown, Neil W.; Sienicki, James J.; Moisseytsev, Anton; Wade, David C.

    2008-01-01

    It is widely recognized that the developing world is the next area for major energy demand growth, including demand for new and advanced nuclear energy systems. With limited existing industrial and grid infrastructures, there will be an important need for future nuclear energy systems that can provide small or moderate increments of electric power (10-700 MWe) on small or immature grids in developing nations. Most recently, the global nuclear energy partnership (GNEP) has identified, as one of its key objectives, the development and demonstration of concepts for small and medium-sized reactors (SMRs) that can be globally deployed while assuring a high level of proliferation resistance. Lead-cooled systems offer several key advantages in meeting these goals. The small lead-cooled fast reactor concept known as the small secure transportable autonomous reactor (SSTAR) has been under ongoing development as part of the US advanced nuclear energy systems programs. It is a system designed to provide energy security to developing nations while incorporating features to achieve nonproliferation goals, anticipating GNEP objectives. This paper presents the motivation for development of internationally deployable nuclear energy systems as well as a summary of one such system, SSTAR, which is the US Generation IV lead-cooled fast reactor system

  13. First results on fast baking

    Energy Technology Data Exchange (ETDEWEB)

    Visentin, B. [CEA-Saclay, DSM/DAPNIA/SACM - 91191 Gif/Yvette Cedex (France)]. E-mail: bvisentin@cea.fr; Gasser, Y. [CEA-Saclay, DSM/DAPNIA/SACM - 91191 Gif/Yvette Cedex (France); Charrier, J.P. [CEA-Saclay, DSM/DAPNIA/SACM - 91191 Gif/Yvette Cedex (France)

    2006-07-15

    High gradient performances of bulk niobium cavities go through a low-temperature baking during one or two days, the temperature parameter is adjusted in a narrow tuning range around 110 or 120deg, C. With such treatment, the intrinsic quality factor Q{sub 0} is improved at high fields. Assuming the oxygen diffusion is involved in this phenomenon, we have developed the 'fast baking' (145deg, C/3h) as an alternative method. Similar results have been achieved with this method compared to standard baking. Consequently, for the first time, a link between oxygen diffusion and high field Q-slope has been demonstrated. Furthermore, this method open the way to a simpler and better baking procedure for the large-scale cavity production due to:*time reduction and *possibility to combine baking and drying during cavity preparation.

  14. China’s oil security from the supply chain perspective: A review

    International Nuclear Information System (INIS)

    Zhao, Chunfu; Chen, Bin

    2014-01-01

    Highlights: • The development phase of China’s oil industry is detailed. • Risk to oil industry in China is identified along the supply chain. • Policy aimed at improving oil security is examined. - Abstract: Oil security has become a major issue in China. This paper analyzes China’s oil security from the supply chain perspective, as the country faces challenges from an increasing reliance on imported oil, a fast-growing economy, the Malacca dilemma, and volatile international oil prices. To clarify the issue of oil security, we first review the development phase of China’s oil industry and previous research related to its energy security. Then a framework from the supply chain perspective is constructed to identify the current risk from three aspects: energy flow, financial and environmental. Finally, policies aimed at improving the country’s energy security are examined and potential problems presented. From this analysis, we conclude that the potential risk arising from China’s oil system is inherently interconnected. There is still great potential for the country to improve oil security by strengthening its strategic oil reserves, improving energy efficiency, and developing its domestic oil tanker fleet

  15. Information and Knowledge Management in the Scope of the Information Security practices: the human factor within Organizations

    Directory of Open Access Journals (Sweden)

    Luciana Emirena Santos Carneiro

    2013-08-01

    Full Text Available The security of informational assets has always been a corporate requirement. These assets can be scaled in three main spheres, namely, people, organizational processes and technologies. The internet, the web, the broadcast of networks, and the growing presence of technology both in people's lives and in organizational contexts have caused profound transformations in the intrinsic processes that constitute personal and organizational routines. On the one hand, these changes provided by the technological progress have fostered competitiveness and decentralization; on the other hand, they require better management, control, security and protection for information and knowledge. This article presents the results of an investigation within information security realm, focusing on the human aspects of knowledge and information management related to security practices. Using a quality-quantitative approach, we identify behavioral actions and profiles of employees of a company in the field of healthcare, which reveal some connections with information security failures. We conclude that the human element is a relevant variable, even a critical one, for the management of information security in organizations.

  16. Security Enhancement for Data Migration in the Cloud

    Directory of Open Access Journals (Sweden)

    Jean Raphael Ngnie Sighom

    2017-06-01

    Full Text Available In today’s society, cloud computing has significantly impacted nearly every section of our lives and business structures. Cloud computing is, without any doubt, one of the strategic directions for many companies and the most dominating infrastructure for enterprises as long as end users. Instead of buying IT equipment (hardware and/or software and managing it themselves, many organizations today prefer to buy services from IT service providers. The number of service providers increase dramatically and the cloud is becoming the tools of choice for more cloud storage services. However, as more personal information and data are moved to the cloud, into social media sites, DropBox, Baidu WangPan, etc., data security and privacy issues are questioned. Daily, academia and industry seek to find an efficient way to secure data migration in the cloud. Various solution approaches and encryption techniques have been implemented. In this work, we will discuss some of these approaches and evaluate the popular ones in order to find the elements that affect system performance. Finally, we will propose a model that enhances data security and privacy by combining Advanced Encryption Standard-256, Information Dispersal Algorithms and Secure Hash Algorithm-512. Our protocol achieves provable security assessments and fast execution times for medium thresholds.

  17. Intrinsic radioactivity of KSr{sub 2}I{sub 5}:Eu{sup 2+}

    Energy Technology Data Exchange (ETDEWEB)

    Rust, M.; Melcher, C.; Lukosi, E., E-mail: elukosi@utk.edu

    2016-10-11

    A current need in nuclear security is an economical, yet high energy resolution (near 2%), scintillation detector suitable for gamma-ray spectroscopy. For current scintillators on the market, there is an inverse relationship between scintillator energy resolution and cost of production. A new promising scintillator, KSr{sub 2}I{sub 5}:Eu{sup 2+}, under development at the University of Tennessee, has achieved an energy resolution of 2.4% at 662 keV at room temperature, with potential growth rates exceeding several millimeters per hour. However, the internal background due to the {sup 40}K content could present a hurdle for effective source detection/identification in nuclear security applications. As a first step in addressing this question, this paper reports on a computational investigation of the intrinsic differential pulse height spectrum (DPHS) generated by {sup 40}K within the KSr{sub 2}I{sub 5}:Eu{sup 2+} scintillator as a function of crystal geometry. It was found that the DPHS remains relatively equal to a constant multiplicative factor of the negatron emission spectrum with a direct increase of the 1.46 MeV photopeak relative height to the negatron spectrum with volume. Further, peak pileup does not readily manifest itself for practical KSr{sub 2}I{sub 5}:Eu{sup 2+} volumes.

  18. Dedifferentiation of intrinsic response properties of motoneurons in organotypic cultures of the spinal cord of the adult turtle

    DEFF Research Database (Denmark)

    Perrier, J.F.; Noraberg, J.; Simon, M.

    2000-01-01

    Explant cultures from the spinal cord of adult turtles were established and used to study the sensitivity of the intrinsic response properties of motoneurons to the changes in connectivity and milieu imposed by isolation in culture. Transverse sections 700 microm thick were explanted on cover slips...... the ability to fire repetitively. By the second week in culture, a fraction of motoneurons displayed fast and slow transient outward rectification and low-threshold calcium spikes, features not seen in turtle motoneurons in acute slices. On the other hand, properties mediated by L-type Ca2+ channels...

  19. The European Lead Fast Reactor Strategy and the Roadmap for the Demonstrator ALFRED

    International Nuclear Information System (INIS)

    Alemberti, A.; De Bruyn, D.; Grasso, G.; Mansani, L.; Mattioli, D.; Roelofs, F.

    2013-01-01

    Expected impacts: → To ensure that nuclear energy remains a long-term contributor to a low carbon economy it is necessary to increase its sustainability through demonstrating the technical, industrial and economic viability of Gen IV fast nuclear reactors; → With the construction and operation of MYRRHA and ALFRED, Europe will be in an excellent position to secure the development of a safe, sustainable and competitive fast nuclear technology; → ALFRED Demonstrator Roadmap will: • play a key role by involving European industry and maintaining and developing European leadership in nuclear technologies worldwide; • allow to investigate and address the main technological issues that can be implemented in the LFR prototype (2035); • make possible commercial deployment, by the European industry, of these technologies by 2050 and beyond; • contribute significantly to the development of a sustainable and secure energy supply for Europe from the second half of this century onwards

  20. Intrinsic neuromodulation: altering neuronal circuits from within.

    Science.gov (United States)

    Katz, P S; Frost, W N

    1996-02-01

    There are two sources of neuromodulation for neuronal circuits: extrinsic inputs and intrinsic components of the circuits themselves. Extrinsic neuromodulation is known to be pervasive in nervous systems, but intrinsic neuromodulation is less recognized, despite the fact that it has now been demonstrated in sensory and neuromuscular circuits and in central pattern generators. By its nature, intrinsic neuromodulation produces local changes in neuronal computation, whereas extrinsic neuromodulation can cause global changes, often affecting many circuits simultaneously. Studies in a number of systems are defining the different properties of these two forms of neuromodulation.

  1. The safety of the fast reactor

    International Nuclear Information System (INIS)

    Matthews, R.R.

    1977-01-01

    Verbatim of an address by R.R. Matthews, Chief Nuclear Health and Safety Officer, UK Central Electricity Generating Board given on January 15th 1977. The object of this address was to give some opinions on the safety issues of fast reactors as seen from an operational point of view. An outline of the basic responsibilities for nuclear safety is first given, and it is emphasized that the Central Electricity Generating Board has a statutory responsibility for the safe operation of its nuclear plant. The Nuclear Installations Act places absolute responsibility on the operator for ensuring that injury to persons and damage to property do not occur, and the new Health and Safety at Work Act does likewise. In addition the Board has a Nuclear Health and Safety Department that has to ensure that adequate provision for safety is made in the design, construction, and operation of nuclear plant, and safety at operational stations is monitored continuously by inspectors. In addition the requirements of the Nuclear Installations Inspectorate, laid down in the site licence conditions, must be satisfied. All these requirements are here discussed in the light of application to commercial fast reactors. It is considered that the hazards to fast reactor operating personnel are small and little different from those of other types of reactor, and in some respects the fast reactor has advantages, particularly in regard to the use of a Na coolant. The possibility of various types of accident is considered. Radioactive effluent discharge is also considered. The fast reactor as an international problem is discussed, including security matters. The extensive experience gained in operation of the experimental and prototype fast reactors at Dounreay is emphasized. (U.K.)

  2. Fast-Valving of Large Steam Turbine Units as a Means of Power System Security Enhancement

    OpenAIRE

    Bogdan Sobczak; Robert Rink; Rafał Kuczyński; Robert Trębski

    2014-01-01

    Fast-valving assists in maintaining system stability following a severe transmission system fault by reducing the turbine mechanical power. Fast-valving consists in rapid closing and opening of steam valves in an adequate manner to reduce the generator accelerating power following the recognition of a severe fault. FV can be an effective and economical method of meeting the performance requirements of a power system in the presence of an increase in wind and solar generation in the power syst...

  3. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  4. Concepts of intrinsic safety

    International Nuclear Information System (INIS)

    Anon.

    1985-01-01

    A newly introduced Japanese reactor concept, ISER (Intrinsically Safe and Economical Reactor), is intended to be a reference intrinsically safe light water reactor. ISER is designed similarly to PIUS but with greater economy in mind such that any utility in any country can choose it for its power system. Social assimilation and acceptability in the Asia Pacific Region including the United States are the keys to the ISER with the hope of dramatic reductions of social costs due to safeguards, reliability, financiability, and infrastructure building, particularly in the third world, as well as reactor safety itself. In this respect and others, the ISER proposal is different from other vendor-proposed reactor concepts and is unique

  5. Security training with interactive laser-video-disk technology

    International Nuclear Information System (INIS)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest that detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life

  6. Protein intrinsic disorder in plants.

    Science.gov (United States)

    Pazos, Florencio; Pietrosemoli, Natalia; García-Martín, Juan A; Solano, Roberto

    2013-09-12

    To some extent contradicting the classical paradigm of the relationship between protein 3D structure and function, now it is clear that large portions of the proteomes, especially in higher organisms, lack a fixed structure and still perform very important functions. Proteins completely or partially unstructured in their native (functional) form are involved in key cellular processes underlain by complex networks of protein interactions. The intrinsic conformational flexibility of these disordered proteins allows them to bind multiple partners in transient interactions of high specificity and low affinity. In concordance, in plants this type of proteins has been found in processes requiring these complex and versatile interaction networks. These include transcription factor networks, where disordered proteins act as integrators of different signals or link different transcription factor subnetworks due to their ability to interact (in many cases simultaneously) with different partners. Similarly, they also serve as signal integrators in signaling cascades, such as those related to response to external stimuli. Disordered proteins have also been found in plants in many stress-response processes, acting as protein chaperones or protecting other cellular components and structures. In plants, it is especially important to have complex and versatile networks able to quickly and efficiently respond to changing environmental conditions since these organisms cannot escape and have no other choice than adapting to them. Consequently, protein disorder can play an especially important role in plants, providing them with a fast mechanism to obtain complex, interconnected and versatile molecular networks.

  7. Elements of the Competitive Situation That Affect Intrinsic Motivation.

    Science.gov (United States)

    Reeve, Johnmarshall; Deci, Edward L.

    1996-01-01

    Explores the effects of three elements of the competitive situation (competitive set, competitive outcome, and interpersonal context) on intrinsic motivation in a sample of college students (n=100). Competitive outcome and interpersonal context affected intrinsic motivation: winning increased intrinsic motivation, while pressured interpersonal…

  8. A radioisotope dilution assay for unlabelled vitamin B12-intrinsic factor complex employing the binding intrinsic factor antibody: probable evidence for two types of binding antibody

    International Nuclear Information System (INIS)

    Jacob, E.; O'Brien, H.A.W.; Mollin, D.L.

    1977-01-01

    A new radioisotope dilution assay for vitamin B 12 -intrinsic factor complex is described. The method is based on the use of the binding type intrinsic antibody (the binding reagent), which when combined with the intrinsic factor-vitamin B 12 complex (labelled ligand), is quantitatively adsorbed onto zirconium phosphate gel pH 6.25. The new assay has been shown to provide a measure of intrinsic factor comparable with other intrinsic factor assays, but it has the important advantage of being able to measure the unlabelled vitamin B 12 -intrinsic factor complex (unlabelled ligand), and will, therefore, be valuable in the study of physiological events in the gastrointestinal tract. During the study, it was found that there is some evidence for at least two types of binding intrinsic factor antibody: One which combines preferentially with the intrinsic factor-vitamin B 12 complex and one which combines equally well with this complex or with free intrinsic factor. (author)

  9. Characterization of altered intrinsic excitability in hippocampal CA1 pyramidal cells of the Aβ-overproducing PDAPP mouse☆

    Science.gov (United States)

    Kerrigan, T.L.; Brown, J.T.; Randall, A.D.

    2014-01-01

    Transgenic mice that accumulate Aβ peptides in the CNS are commonly used to interrogate functional consequences of Alzheimer's disease-associated amyloidopathy. In addition to changes to synaptic function, there is also growing evidence that changes to intrinsic excitability of neurones can arise in these models of amyloidopathy. Furthermore, some of these alterations to intrinsic properties may occur relatively early within the age-related progression of experimental amyloidopathy. Here we report a detailed comparison between the intrinsic excitability properties of hippocampal CA1 pyramidal neurones in wild-type (WT) and PDAPP mice. The latter is a well-established model of Aβ accumulation which expresses human APP harbouring the Indiana (V717F) mutation. At the age employed in this study (9–10 months) CNS Abeta was elevated in PDAPP mice but significant plaque pathology was absent. PDAPP mice exhibited no differences in subthreshold intrinsic properties including resting potential, input resistance, membrane time constant and sag. When CA1 cells of PDAPP mice were given depolarizing stimuli of various amplitudes they initially fired at a higher frequency than WT cells. Commensurate with this, PDAPP cells exhibited a larger fast afterdepolarizing potential. PDAPP mice had narrower spikes but action potential threshold, rate of rise and peak were not different. Thus not all changes seen in our previous studies of amyloidopathy models were present in PDAPP mice; however, narrower spikes, larger ADPs and the propensity to fire at higher frequencies were consistent with our prior work and thus may represent robust, cross-model, indices of amyloidopathy. This article is part of a Special Issue entitled ‘Neurodevelopment Disorder’. PMID:24055500

  10. A Secure Network Coding Based on Broadcast Encryption in SDN

    Directory of Open Access Journals (Sweden)

    Yue Chen

    2016-01-01

    Full Text Available By allowing intermediate nodes to encode the received packets before sending them out, network coding improves the capacity and robustness of multicast applications. But it is vulnerable to the pollution attacks. Some signature schemes were proposed to thwart such attacks, but most of them need to be homomorphic that the keys cannot be generated and managed easily. In this paper, we propose a novel fast and secure switch network coding multicast (SSNC on the software defined networks (SDN. In our scheme, the complicated secure multicast management was separated from the fast data transmission based on the SDN. Multiple multicasts will be aggregated to one multicast group according to the requirements of services and the network status. Then, the controller will route aggregated multicast group with network coding; only the trusted switch will be allowed to join the network coding by using broadcast encryption. The proposed scheme can use the traditional cryptography without homomorphy, which greatly reduces the complexity of the computation and improves the efficiency of transmission.

  11. Optimization of radiation sensors for a passive terahertz video camera for security applications

    NARCIS (Netherlands)

    Zieger, G.J.M.

    2014-01-01

    A passive terahertz video camera allows for fast security screenings from distances of several meters. It avoids irradiation or the impressions of nakedness, which oftentimes cause embarrassment and trepidation of the concerned persons. This work describes the optimization of highly sensitive

  12. Predicting Intrinsic Motivation

    Science.gov (United States)

    Martens, Rob; Kirschner, Paul A.

    2004-01-01

    Intrinsic motivation can be predicted from participants' perceptions of the social environment and the task environment (Ryan & Deci, 2000)in terms of control, relatedness and competence. To determine the degree of independence of these factors 251 students in higher vocational education (physiotherapy and hotel management) indicated the…

  13. Individualistic vs. Competitive Participation: The Effect on Intrinsic Motivation.

    Science.gov (United States)

    Jones, Brent M.; And Others

    Studies investigating intrinsic motivation and competition have supported the view that competition decreases intrinsic motivation. More recent studies suggest that the specific outcome of a competition (a win or a loss) differentially affects intrinsic motivation by highlighting the informational rather than the controlling aspect of the reward…

  14. Data backup security in cloud storage system

    OpenAIRE

    Атаян, Борис Геннадьевич; Национальный политехнический университет Армении; Багдасарян, Татевик Араевна; Национальный политехнический университет Армении

    2016-01-01

    Cloud backup system is proposed, which provides means for effective creation, secure storage and restore of backups inCloud. For data archiving new efficient SGBP file format is being used in the system, which is based on DEFLATE compressionalgorithm. Proposed format provides means for fast archive creation, which can contain significant amounts of data. Modernapproaches of backup archive protection are described in the paper. Also the SGBP format is compared to heavily used ZIP format(both Z...

  15. Hidden Structural Codes in Protein Intrinsic Disorder.

    Science.gov (United States)

    Borkosky, Silvia S; Camporeale, Gabriela; Chemes, Lucía B; Risso, Marikena; Noval, María Gabriela; Sánchez, Ignacio E; Alonso, Leonardo G; de Prat Gay, Gonzalo

    2017-10-17

    Intrinsic disorder is a major structural category in biology, accounting for more than 30% of coding regions across the domains of life, yet consists of conformational ensembles in equilibrium, a major challenge in protein chemistry. Anciently evolved papillomavirus genomes constitute an unparalleled case for sequence to structure-function correlation in cases in which there are no folded structures. E7, the major transforming oncoprotein of human papillomaviruses, is a paradigmatic example among the intrinsically disordered proteins. Analysis of a large number of sequences of the same viral protein allowed for the identification of a handful of residues with absolute conservation, scattered along the sequence of its N-terminal intrinsically disordered domain, which intriguingly are mostly leucine residues. Mutation of these led to a pronounced increase in both α-helix and β-sheet structural content, reflected by drastic effects on equilibrium propensities and oligomerization kinetics, and uncovers the existence of local structural elements that oppose canonical folding. These folding relays suggest the existence of yet undefined hidden structural codes behind intrinsic disorder in this model protein. Thus, evolution pinpoints conformational hot spots that could have not been identified by direct experimental methods for analyzing or perturbing the equilibrium of an intrinsically disordered protein ensemble.

  16. Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network

    Directory of Open Access Journals (Sweden)

    Gianluca Dini

    2012-02-01

    Full Text Available Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles—AUVs respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach. The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011.

  17. Intrinsic motivation and sportsmanship: mediating role of interpersonal relationships.

    Science.gov (United States)

    Núñez, Juan L; Martín-Albo, José; Navarro, José G; Sánchez, Juana M; González-Cutre, David

    2009-06-01

    This study analyzed the mediating role of interpersonal relations between intrinsic motivation and sportsmanship. Athletes (98 men, 97 women), ages 11 to 43 years, completed measures of intrinsic motivation toward sports, self-concept of social and family relations, and sportsmanship orientation. A structural equation model indicated that self-concept of interpersonal relations mediated the relation between intrinsic motivation and sportsmanship. Also, intrinsic motivation was directly and positively associated with self-concept of interpersonal relations, which, in turn, was positively and significantly related to sportsmanship. Variances explained by self-concept of interpersonal relations and by sportsmanship were 32 and 56%, respectively. The motivational interaction between the context of interpersonal relations and the sports context proposed in the hierarchical model of intrinsic and extrinsic motivation was discussed.

  18. Intrinsic bursting of AII amacrine cells underlies oscillations in the rd1 mouse retina.

    Science.gov (United States)

    Choi, Hannah; Zhang, Lei; Cembrowski, Mark S; Sabottke, Carl F; Markowitz, Alexander L; Butts, Daniel A; Kath, William L; Singer, Joshua H; Riecke, Hermann

    2014-09-15

    In many forms of retinal degeneration, photoreceptors die but inner retinal circuits remain intact. In the rd1 mouse, an established model for blinding retinal diseases, spontaneous activity in the coupled network of AII amacrine and ON cone bipolar cells leads to rhythmic bursting of ganglion cells. Since such activity could impair retinal and/or cortical responses to restored photoreceptor function, understanding its nature is important for developing treatments of retinal pathologies. Here we analyzed a compartmental model of the wild-type mouse AII amacrine cell to predict that the cell's intrinsic membrane properties, specifically, interacting fast Na and slow, M-type K conductances, would allow its membrane potential to oscillate when light-evoked excitatory synaptic inputs were withdrawn following photoreceptor degeneration. We tested and confirmed this hypothesis experimentally by recording from AIIs in a slice preparation of rd1 retina. Additionally, recordings from ganglion cells in a whole mount preparation of rd1 retina demonstrated that activity in AIIs was propagated unchanged to elicit bursts of action potentials in ganglion cells. We conclude that oscillations are not an emergent property of a degenerated retinal network. Rather, they arise largely from the intrinsic properties of a single retinal interneuron, the AII amacrine cell. Copyright © 2014 the American Physiological Society.

  19. Best-Practice Criteria for Practical Security of Self-Differencing Avalanche Photodiode Detectors in Quantum Key Distribution

    Science.gov (United States)

    Koehler-Sidki, A.; Dynes, J. F.; Lucamarini, M.; Roberts, G. L.; Sharpe, A. W.; Yuan, Z. L.; Shields, A. J.

    2018-04-01

    Fast-gated avalanche photodiodes (APDs) are the most commonly used single photon detectors for high-bit-rate quantum key distribution (QKD). Their robustness against external attacks is crucial to the overall security of a QKD system, or even an entire QKD network. We investigate the behavior of a gigahertz-gated, self-differencing (In,Ga)As APD under strong illumination, a tactic Eve often uses to bring detectors under her control. Our experiment and modeling reveal that the negative feedback by the photocurrent safeguards the detector from being blinded through reducing its avalanche probability and/or strengthening the capacitive response. Based on this finding, we propose a set of best-practice criteria for designing and operating fast-gated APD detectors to ensure their practical security in QKD.

  20. An Elastic Charging Service Fee-Based Load Guiding Strategy for Fast Charging Stations

    Directory of Open Access Journals (Sweden)

    Shu Su

    2017-05-01

    Full Text Available Compared with the traditional slow charging loads, random integration of large scale fast charging loads will exert more serious impacts on the security of power network operation. Besides, to maximize social benefits, effective scheduling strategies guiding fast charging behaviors should be formulated rather than simply increasing infrastructure construction investments on the power grid. This paper first analyzes the charging users’ various responses to an elastic charging service fee, and introduces the index of charging balance degree to a target region by considering the influence of fast charging loads on the power grid. Then, a multi-objective optimization model of the fast charging service fee is constructed, whose service fee can be further optimized by employing a fuzzy programming method. Therefore, both users’ satisfaction degree and the equilibrium of charging loads can be maintained simultaneously by reasonably guiding electric vehicles (EVs to different fast charging stations. The simulation results demonstrate the effectiveness of the proposed dynamic charging service pricing and the corresponding fast charging load guidance strategy.

  1. Evaluation of nuclear energy in the context of energy security

    International Nuclear Information System (INIS)

    Irie, Kazutomo; Kanda, Keiji

    2002-01-01

    This paper analyzes the view expressed by the Japanese government on the role of nuclear energy for energy security through scrutiny of Japan's policy documents. The analysis revealed that the contribution by nuclear energy to Japan's energy security has been defined in two ways. Nuclear energy improves short-term energy security with its characteristics such as political stability in exporting countries of uranium, easiness of stockpiling of nuclear fuels, stability in power generation cost, and reproduction of plutonium and other fissile material for use by reprocessing of spent fuel. Nuclear energy also contributes to medium- and long-term energy security through its characteristics that fissile material can be reproduced (multiplied in the case of breeder reactor) from spent fuels. Further contribution can be expected by nuclear fusion. Japan's energy security can be strengthened not only by expanding the share of nuclear energy in total energy supply, but also by improving nuclear energy's characteristics which are related to energy security. Policy measures to be considered for such improvement will include (a) policy dialogue with exporting countries of uranium, (b) government assistance to development of uranium mines, (c) nuclear fuel stockpiling, (d) reprocessing and recycling of spent fuels, (e) development of fast breeder reactor, and (f) research of nuclear fusion. (author)

  2. Algebraic description of intrinsic modes in nuclei

    International Nuclear Information System (INIS)

    Leviatan, A.

    1989-01-01

    We present a procedure for extracting normal modes in algebraic number-conserving systems of interacting bosons relevant for collective states in even-even nuclei. The Hamiltonian is resolved into intrinsic (bandhead related) and collective (in-band related) parts. Shape parameters are introduced through non-spherical boson bases. Intrinsic modes decoupled from the spurious modes are obtained from the intinsic part of the Hamiltonian in the limit of large number of bosons. Intrinsic states are constructed and serve to evaluate electromagnetic transition rates. The method is illustrated for systems with one type of boson as well as with proton-neutron bosons. 28 refs., 1 fig

  3. It's about time: Earlier rewards increase intrinsic motivation.

    Science.gov (United States)

    Woolley, Kaitlin; Fishbach, Ayelet

    2018-06-01

    Can immediate (vs. delayed) rewards increase intrinsic motivation? Prior research compared the presence versus absence of rewards. By contrast, this research compared immediate versus delayed rewards, predicting that more immediate rewards increase intrinsic motivation by creating a perceptual fusion between the activity and its goal (i.e., the reward). In support of the hypothesis, framing a reward from watching a news program as more immediate (vs. delayed) increased intrinsic motivation to watch the program (Study 1), and receiving more immediate bonus (vs. delayed, Study 2; and vs. delayed and no bonus, Study 3) increased intrinsic motivation in an experimental task. The effect of reward timing was mediated by the strength of the association between an activity and a reward, and was specific to intrinsic (vs. extrinsic) motivation-immediacy influenced the positive experience of an activity, but not perceived outcome importance (Study 4). In addition, the effect of the timing of rewards was independent of the effect of the magnitude of the rewards (Study 5). (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  4. Photovoltaic device comprising compositionally graded intrinsic photoactive layer

    Science.gov (United States)

    Hoffbauer, Mark A; Williamson, Todd L

    2013-04-30

    Photovoltaic devices and methods of making photovoltaic devices comprising at least one compositionally graded photoactive layer, said method comprising providing a substrate; growing onto the substrate a uniform intrinsic photoactive layer having one surface disposed upon the substrate and an opposing second surface, said intrinsic photoactive layer consisting essentially of In.sub.1-xA.sub.xN,; wherein: i. 0.ltoreq.x.ltoreq.1; ii. A is gallium, aluminum, or combinations thereof; and iii. x is at least 0 on one surface of the intrinsic photoactive layer and is compositionally graded throughout the layer to reach a value of 1 or less on the opposing second surface of the layer; wherein said intrinsic photoactive layer is isothermally grown by means of energetic neutral atom beam lithography and epitaxy at a temperature of 600.degree. C. or less using neutral nitrogen atoms having a kinetic energy of from about 1.0 eV to about 5.0 eV, and wherein the intrinsic photoactive layer is grown at a rate of from about 5 nm/min to about 100 nm/min.

  5. Management Control, Intrinsic Motivation and Creativity

    DEFF Research Database (Denmark)

    Godt Gregersen, Mikkel

    This thesis consists of a cape and three papers. The overall research question is: How can intrinsic motivation and management control coexist in a creative environment and how can coordination be possible in such a context? The cape ties together the research done in the three papers....... It is divided into six sections. The first section introduces the concepts of intrinsic motivation, creativity and management control. This is followed by a section on management control in a creative context. These two sections frame the thesis and introduce the setting in which the research has been done...... of the conclusion is that intrinsic motivation and management control can coexist under the conditions that all three basic needs, i.e. autonomy, competence and relatedness, are supported. This can happen when control takes point of departure in the individual employee. The second part of the conclusion...

  6. Intrinsic Losses Based on Information Geometry and Their Applications

    Directory of Open Access Journals (Sweden)

    Yao Rong

    2017-08-01

    Full Text Available One main interest of information geometry is to study the properties of statistical models that do not depend on the coordinate systems or model parametrization; thus, it may serve as an analytic tool for intrinsic inference in statistics. In this paper, under the framework of Riemannian geometry and dual geometry, we revisit two commonly-used intrinsic losses which are respectively given by the squared Rao distance and the symmetrized Kullback–Leibler divergence (or Jeffreys divergence. For an exponential family endowed with the Fisher metric and α -connections, the two loss functions are uniformly described as the energy difference along an α -geodesic path, for some α ∈ { − 1 , 0 , 1 } . Subsequently, the two intrinsic losses are utilized to develop Bayesian analyses of covariance matrix estimation and range-spread target detection. We provide an intrinsically unbiased covariance estimator, which is verified to be asymptotically efficient in terms of the intrinsic mean square error. The decision rules deduced by the intrinsic Bayesian criterion provide a geometrical justification for the constant false alarm rate detector based on generalized likelihood ratio principle.

  7. Intrinsic and Extrinsic Neuromodulation of Olfactory Processing.

    Science.gov (United States)

    Lizbinski, Kristyn M; Dacks, Andrew M

    2017-01-01

    Neuromodulation is a ubiquitous feature of neural systems, allowing flexible, context specific control over network dynamics. Neuromodulation was first described in invertebrate motor systems and early work established a basic dichotomy for neuromodulation as having either an intrinsic origin (i.e., neurons that participate in network coding) or an extrinsic origin (i.e., neurons from independent networks). In this conceptual dichotomy, intrinsic sources of neuromodulation provide a "memory" by adjusting network dynamics based upon previous and ongoing activation of the network itself, while extrinsic neuromodulators provide the context of ongoing activity of other neural networks. Although this dichotomy has been thoroughly considered in motor systems, it has received far less attention in sensory systems. In this review, we discuss intrinsic and extrinsic modulation in the context of olfactory processing in invertebrate and vertebrate model systems. We begin by discussing presynaptic modulation of olfactory sensory neurons by local interneurons (LNs) as a mechanism for gain control based on ongoing network activation. We then discuss the cell-class specific effects of serotonergic centrifugal neurons on olfactory processing. Finally, we briefly discuss the integration of intrinsic and extrinsic neuromodulation (metamodulation) as an effective mechanism for exerting global control over olfactory network dynamics. The heterogeneous nature of neuromodulation is a recurring theme throughout this review as the effects of both intrinsic and extrinsic modulation are generally non-uniform.

  8. Power deposition by neutral beam injected fast ions in field-reversed configurations

    International Nuclear Information System (INIS)

    Takahashi, Toshiki; Kato, Takayuki; Kondoh, Yoshiomi; Iwasaka, Naotaka

    2004-04-01

    Effects of Coulomb collisions on neutral beam (NB) injected fast ions into Field-Reversed Configuration (FRC) plasmas are investigated by calculating the single particle orbits, where the ions are subject to the slowing down and pitch angle collisions. The Monte-Carlo method is used for the pitch angle scattering, and the friction term is added to the equation of motion to show effects of slowing down collision such as the deposited power profile. Calculation parameters used are relevant to the NB injection on the FRC Injection Experiment (FIX) device. It is found that the dominant local power deposition occurs in the open field region between the X-point and the mirror point because of a concentration of fast ions and a longer duration travel at the mirror reflection point. In the present calculation, the maximum deposited power to the FRC plasma is about 10% of the injected power. Although the pitch angle scattering by Coulomb collision destroys the mirror confinement of NB injected fast ions, this effect is found negligible. The loss mechanism due to non-adiabatic fast ion motion, which is intrinsic in non-uniform FRC plasmas, affects much greater than the pitch angle scattering by Coulomb collision. (author)

  9. Employment Security of Nurses: Baseline for a Strategic Human Resource Direction

    Directory of Open Access Journals (Sweden)

    Dr. Renante A. Egcas

    2017-11-01

    Full Text Available This study is anchored on Herzberg’s Two-Factor Theory which suggests that satisfaction of employees is related to motivation (e.g. achievement, recognition, advancement, growth, and responsibility and dissatisfaction is related to hygiene factors (e.g. company policy and administration, supervision, interpersonal relationships, working conditions, pay, status, and job security. This study aimed to determine the level and predictors of employment security of nurses in both private and government hospitals in Negros Occidental, Philippines. The level of employment security was categorized into economic security, professional security, personal security, and workplace security. Specifically, this study examined the nurserespondents’ profile in terms of types of hospital employed to, sex, civil status, number of dependents, educational attainment, rank, employment status, salary grade, net income, and length of service. This study also determined the significant differences on the level of employment security of nurses when assessed at different categories and when the respondents are grouped according to their profile. This is a descriptive study which surveyed and interviewed nurses (n=318 from 18 government hospitals, 3 infirmaries and 4 private hospitals which signified intention to participate in the study. The study used the stratified random sampling to insure representativeness of the nurse-respondents.Results revealed that the nurse-respondents expressed moderate security in economic aspect, low security in professional aspect, high security in personal aspect and moderate security in workplace aspect. Highly significant differences were noted between professional security and workplace security. Results also revealed that types of hospital, civil status, rank, employment status are predictors of employment security of the nurse-respondents. Hence, the results implied that fast turnover and migration of Philippine nurses are not mainly

  10. Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations

    Directory of Open Access Journals (Sweden)

    Gill R. Tsouri

    2009-01-01

    Full Text Available A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in space to secure OFDM with low overheads on encryption, decryption, and key distribution. These properties make it a good alternative to traditional software-based information security algorithms in systems where the costs associated with such algorithms are an implementation obstacle. A necessary and sufficient condition for achieving information theoretic security in accordance with channel and system parameters is derived. Security by complexity is assessed for cases where the condition for information theoretic security is not satisfied. In addition, practical means for implementing the method are derived including generating robust joint constellations, decoding data with low complexity, and mitigating the effects of imperfections due to mobility, power control errors, and synchronization errors.

  11. Some chaotic features of intrinsically coupled Josephson junctions

    International Nuclear Information System (INIS)

    Kolahchi, M.R.; Shukrinov, Yu.M.; Hamdipour, M.; Botha, A.E.; Suzuki, M.

    2013-01-01

    Highlights: ► Intrinsically coupled Josephson junctions model a high-T c superconductor. ► Intrinsically coupled Josephson junctions can act as a chaotic nonlinear system. ► Chaos could be due to resonance overlap. ► Avoiding parameters that lead to chaos is important for the design of resonators. -- Abstract: We look for chaos in an intrinsically coupled system of Josephson junctions. This study has direct applications for the high-T c resonators which require coherence amongst the junctions

  12. Characterization of the intrinsic density profiles for liquid surfaces

    International Nuclear Information System (INIS)

    Chacon, Enrique; Tarazona, Pedro

    2005-01-01

    This paper presents recent advances in the characterization of the intrinsic structures in computer simulations of liquid surfaces. The use of operational definitions for the intrinsic surface, associated with each molecular configuration of a liquid slab, gives direct access to the intrinsic profile and to the wavevector dependent surface tension. However, the characteristics of these functions depend on the definition used for the intrinsic surface. We discuss the pathologies associated with a local Gibbs dividing surface definition, and consider the alternative definition of a minimal area surface, going though a set of surface pivots, self-consistently chosen to represent the first liquid layer

  13. Fast thermal annealing of implantation defects in silicon. Solid phase epitaxy and residual imperfection recovery

    International Nuclear Information System (INIS)

    Adekoya, O.A.

    1987-06-01

    Basic processes ruling the crystal reconstitution in solid phase during fast thermal annealing are studied; the role of electronic and thermodynamic effects at the interface is precised, following the implantations of a donor element (p + ), an acceptor element (B + ) and an intrinsic element (Ge + ). Then, after recrystallization, the electric role of residual point defects is shown together with the possibility of total recovery and an important electric activation of the doping [fr

  14. Separating intrinsic from extrinsic fluctuations in dynamic biological systems.

    Science.gov (United States)

    Hilfinger, Andreas; Paulsson, Johan

    2011-07-19

    From molecules in cells to organisms in ecosystems, biological populations fluctuate due to the intrinsic randomness of individual events and the extrinsic influence of changing environments. The combined effect is often too complex for effective analysis, and many studies therefore make simplifying assumptions, for example ignoring either intrinsic or extrinsic effects to reduce the number of model assumptions. Here we mathematically demonstrate how two identical and independent reporters embedded in a shared fluctuating environment can be used to identify intrinsic and extrinsic noise terms, but also how these contributions are qualitatively and quantitatively different from what has been previously reported. Furthermore, we show for which classes of biological systems the noise contributions identified by dual-reporter methods correspond to the noise contributions predicted by correct stochastic models of either intrinsic or extrinsic mechanisms. We find that for broad classes of systems, the extrinsic noise from the dual-reporter method can be rigorously analyzed using models that ignore intrinsic stochasticity. In contrast, the intrinsic noise can be rigorously analyzed using models that ignore extrinsic stochasticity only under very special conditions that rarely hold in biology. Testing whether the conditions are met is rarely possible and the dual-reporter method may thus produce flawed conclusions about the properties of the system, particularly about the intrinsic noise. Our results contribute toward establishing a rigorous framework to analyze dynamically fluctuating biological systems.

  15. Compact Neutron Generators for Medical Home Land Security and Planetary Exploration

    International Nuclear Information System (INIS)

    Reijonen, J.

    2005-01-01

    The Plasma and Ion Source Technology Group at Lawrence Berkeley National Laboratory has developed various types of advanced D-D (neutron energy 2.5 MeV), D-T (14 MeV) and T-T (0-9 MeV) neutron generators for wide range of applications. These applications include medical (Boron Neutron Capture Therapy), homeland security (Prompt Gamma Activation Analysis, Fast Neutron Activation Analysis and Pulsed Fast Neutron Transmission Spectroscopy) and planetary exploration with a sub-surface material characterization on Mars. These neutron generators utilize RF induction discharge to ionize the deuterium/tritium gas. This discharge method provides high plasma density for high output current, high atomic species from molecular gases, long life operation and versatility for various discharge chamber geometries. Four main neutron generator developments are discussed here: high neutron output co-axial neutron generator for BNCT applications, point neutron generator for security applications, compact and sub-compact axial neutron generator for elemental analysis applications. Current status of the neutron generator development with experimental data will be presented

  16. Neutron Generators Developed at LBNL for Homeland Security and Imaging Applications

    International Nuclear Information System (INIS)

    Reijonen, Jani

    2006-01-01

    The Plasma and Ion Source Technology Group at Lawrence Berkeley National Laboratory has developed various types of advanced D-D (neutron energy 2.5 MeV), D-T (14 MeV) and T-T (0-9 MeV) neutron generators for wide range of applications. These applications include medical (Boron Neutron Capture Therapy), homeland security (Prompt Gamma Activation Analysis, Fast Neutron Activation Analysis and Pulsed Fast Neutron Transmission Spectroscopy) and planetary exploration with a sub-surface material characterization on Mars. These neutron generators utilize RF induction discharge to ionize the deuterium/tritium gas. This discharge method provides high plasma density for high output current, high atomic species from molecular gases, long life operation and versatility for various discharge chamber geometries. Four main neutron generator developments are discussed here: high neutron output co-axial neutron generator for BNCT applications, point neutron generator for security applications, compact and sub-compact axial neutron generator for elemental analysis applications. Current status of the neutron generator development with experimental data will be presented

  17. Distinct molecular signatures of mild extrinsic and intrinsic atopic dermatitis

    DEFF Research Database (Denmark)

    Martel, Britta Cathrina; Litman, Thomas; Hald, Andreas

    2016-01-01

    Atopic dermatitis (AD) is a common inflammatory skin disease with underlying defects in epidermal function and immune responses. In this study, we used microarray analysis to investigate differences in gene expression in lesional skin from patients with mild extrinsic or intrinsic AD compared...... with mild extrinsic and intrinsic AD similar to previous reports for severe AD. Interestingly, expression of genes involved in inflammatory responses in intrinsic AD resembled that of psoriasis more than that of extrinsic AD. Overall, differences in expression of inflammation-associated genes found among...... patients with mild intrinsic and extrinsic AD correlated with previous findings for patients with severe intrinsic and extrinsic AD....

  18. Management Control, Intrinsic Motivation and Creativity

    OpenAIRE

    Gregersen, Mikkel Godt

    2017-01-01

    This thesis consists of a cape and three papers. The overall research question is: How can intrinsic motivation and management control coexist in a creative environment and how can coordination be possible in such a context? The cape ties together the research done in the three papers. It is divided into six sections. The first section introduces the concepts of intrinsic motivation, creativity and management control. This is followed by a section on management control in a ...

  19. Fast neutron detection at near-core location of a research reactor with a SiC detector

    Science.gov (United States)

    Wang, Lei; Jarrell, Josh; Xue, Sha; Tan, Chuting; Blue, Thomas; Cao, Lei R.

    2018-04-01

    The measurable charged-particle produced from the fast neutron interactions with the Si and C nucleuses can make a wide bandgap silicon carbide (SiC) sensor intrinsically sensitive to neutrons. The 4H-SiC Schottky detectors have been fabricated and tested at up to 500 °C, presenting only a slightly degraded energy resolution. The response spectrum of the SiC detectors were also obtained by exposing the detectors to external neutron beam irradiation and at a near-core location where gamma-ray field is intense. The fast neutron flux of these two locations are ∼ 4 . 8 × 104cm-2 ṡs-1 and ∼ 2 . 2 × 107cm-2 ṡs-1, respectively. At the external beam location, a Si detector was irradiated side-by-side with SiC detector to disjoin the neutron response from Si atoms. The contribution of gamma ray, neutron scattering, and charged-particles producing reactions in the SiC was discussed. The fast neutron detection efficiencies were determined to be 6 . 43 × 10-4 for the external fast neutron beam irradiation and 6 . 13 × 10-6 for the near-core fast neutron irradiation.

  20. Protein intrinsic disorder in plants

    Directory of Open Access Journals (Sweden)

    Florencio ePazos

    2013-09-01

    Full Text Available To some extent contradicting the classical paradigm of the relationship between protein 3D structure and function, now it is clear that large portions of the proteomes, especially in higher organisms, lack a fixed structure and still perform very important functions. Proteins completely or partially unstructured in their native (functional form are involved in key cellular processes underlain by complex networks of protein interactions. The intrinsic conformational flexibility of these disordered proteins allows them to bind multiple partners in transient interactions of high specificity and low affinity. In concordance, in plants this type of proteins has been found in processes requiring these complex and versatile interaction networks. These include transcription factor networks, where disordered proteins act as integrators of different signals or link different transcription factor subnetworks due to their ability to interact (in many cases simultaneously with different partners. Similarly, they also serve as signal integrators in signalling cascades, such as those related to response to external stimuli. Disordered proteins have also been found in plants in many stress-response processes, acting as protein chaperones or protecting other cellular components and structures. In plants, it is especially important to have complex and versatile networks able to quickly and efficiently respond to changing environmental conditions since these organisms can not escape and have no other choice than adapting to them. Consequently, protein disorder can play an especially important role in plants, providing them with a fast mechanism to obtain complex, interconnected and versatile molecular networks.

  1. Critical theory as an approach to the ethics of information security.

    Science.gov (United States)

    Stahl, Bernd Carsten; Doherty, Neil F; Shaw, Mark; Janicke, Helge

    2014-09-01

    Information security can be of high moral value. It can equally be used for immoral purposes and have undesirable consequences. In this paper we suggest that critical theory can facilitate a better understanding of possible ethical issues and can provide support when finding ways of addressing them. The paper argues that critical theory has intrinsic links to ethics and that it is possible to identify concepts frequently used in critical theory to pinpoint ethical concerns. Using the example of UK electronic medical records the paper demonstrates that a critical lens can highlight issues that traditional ethical theories tend to overlook. These are often linked to collective issues such as social and organisational structures, which philosophical ethics with its typical focus on the individual does not tend to emphasise. The paper suggests that this insight can help in developing ways of researching and innovating responsibly in the area of information security.

  2. A dynamic birth-death model via Intrinsic Linkage

    Directory of Open Access Journals (Sweden)

    Robert Schoen

    2013-05-01

    Full Text Available BACKGROUND Dynamic population models, or models with changing vital rates, are only beginning to receive serious attention from mathematical demographers. Despite considerable progress, there is still no general analytical solution for the size or composition of a population generated by an arbitrary sequence of vital rates. OBJECTIVE The paper introduces a new approach, Intrinsic Linkage, that in many cases can analytically determine the birth trajectory of a dynamic birth-death population. METHODS Intrinsic Linkage assumes a weighted linear relationship between (i the time trajectory of proportional increases in births in a population and (ii the trajectory of the intrinsic rates of growth of the projection matrices that move the population forward in time. Flexibility is provided through choice of the weighting parameter, w, that links these two trajectories. RESULTS New relationships are found linking implied intrinsic and observed population patterns of growth. Past experience is "forgotten" through a process of simple exponential decay. When the intrinsic growth rate trajectory follows a polynomial, exponential, or cyclical pattern, the population birth trajectory can be expressed analytically in closed form. Numerical illustrations provide population values and relationships in metastable and cyclically stable models. Plausible projection matrices are typically found for a broad range of values of w, although w appears to vary greatly over time in actual populations. CONCLUSIONS The Intrinsic Linkage approach extends current techniques for dynamic modeling, revealing new relationships between population structures and the changing vital rates that generate them.

  3. Exploring the link between intrinsic motivation and quality

    Science.gov (United States)

    Christy, Steven M.

    1992-12-01

    This thesis proposes that it is workers' intrinsic motivation that leads them to produce quality work. It reviews two different types of evidence- expert opinion and empirical studies--to attempt to evaluate a link between intrinsic motivation and work quality. The thesis reviews the works of Total Quality writers and behavioral scientists for any connection they might have made between intrinsic motivation and quality. The thesis then looks at the works of Deming and his followers in an attempt to establish a match between Deming's motivational assumptions and the four task rewards in the Thomas/Tymon model of intrinsic motivation: choice, competence, meaningfulness, and progress. Based upon this analysis, it is proposed that the four Thomas/Tymon task rewards are a promising theoretical foundation for explaining the motivational basis of quality for workers in Total Quality organizations.

  4. Personality traits associated with intrinsic academic motivation in medical students.

    Science.gov (United States)

    Tanaka, Masaaki; Mizuno, Kei; Fukuda, Sanae; Tajima, Seiki; Watanabe, Yasuyoshi

    2009-04-01

    Motivation is one of the most important psychological concepts in education and is related to academic outcomes in medical students. In this study, the relationships between personality traits and intrinsic academic motivation were examined in medical students. The study group consisted of 119 Year 2 medical students at Osaka City University Graduate School of Medicine. They completed questionnaires dealing with intrinsic academic motivation (the Intrinsic Motivation Scale toward Learning) and personality (the Temperament and Character Inventory [TCI]). On simple regression analyses, the TCI dimensions of persistence, self-directedness, co-operativeness and self-transcendence were positively associated with intrinsic academic motivation. On multiple regression analysis adjusted for age and gender, the TCI dimensions of persistence, self-directedness and self-transcendence were positively associated with intrinsic academic motivation. The temperament dimension of persistence and the character dimensions of self-directedness and self-transcendence are associated with intrinsic academic motivation in medical students.

  5. Sources of intrinsic rotation in the low-flow ordering

    International Nuclear Information System (INIS)

    Parra, Felix I.; Barnes, Michael; Catto, Peter J.

    2011-01-01

    A low flow, δf gyrokinetic formulation to obtain the intrinsic rotation profiles is presented. The momentum conservation equation in the low-flow ordering contains new terms, neglected in previous first-principles formulations, that may explain the intrinsic rotation observed in tokamaks in the absence of external sources of momentum. The intrinsic rotation profile depends on the density and temperature profiles and on the up-down asymmetry.

  6. Fast ghost imaging and ghost encryption based on the discrete cosine transform

    International Nuclear Information System (INIS)

    Tanha, Mehrdad; Ahmadi-Kandjani, Sohrab; Kheradmand, Reza

    2013-01-01

    We introduce the discrete cosine transform as an advanced compression tool for images in computational ghost imaging. A novel approach to fast imaging and encryption, the discrete cosine transform, promotes the security level of ghost images and reduces the image retrieval time. To discuss the advantages of this technique we compare experimental outcomes with simulated ones. (paper)

  7. Cooperative motion of intrinsic and actuated semiflexible swimmers

    NARCIS (Netherlands)

    Llopis, I.; Pagonabarraga, I.; Lagomarsino, M.C.; Lowe, C.P.

    2013-01-01

    We examine the phenomenon of hydrodynamic-induced cooperativity for pairs of flagellated micro-organism swimmers, of which spermatozoa cells are an example. We consider semiflexible swimmers, where inextensible filaments are driven by an internal intrinsic force and torque-free mechanism (intrinsic

  8. Intrinsic rotation produced by ion orbit loss and X-loss

    Energy Technology Data Exchange (ETDEWEB)

    Stacey, W. M. [Georgia Institute of Technology, Atlanta, Georgia 30332 (United States); Boedo, J. A. [University of California - San Diego, San Diego, California 92093 (United States); Evans, T. E.; Groebner, R. J. [General Atomics, San Diego, California 92186 (United States); Grierson, B. A. [Princeton Plasma Physics Laboratory, Princeton, New Jersey 08453 (United States)

    2012-11-15

    A practical calculation model for the intrinsic rotation imparted to the edge plasma by the directionally preferential loss of ions on orbits that cross the last closed flux surface is presented and applied to calculate intrinsic rotation in several DIII-D [J. Luxon, Nucl. Fusion 42, 614 (2002)] discharges. The intrinsic rotation produced by ion loss is found to be sensitive to the edge temperature and radial electric field profiles, which has implications for driving intrinsic rotation in future large tokamaks.

  9. Fast encryption of image data using chaotic Kolmogorov flows

    Science.gov (United States)

    Scharinger, Josef

    1998-04-01

    To guarantee security and privacy in image and video archival applications, efficient bulk encryption techniques are necessary which are easily implementable in soft- and hardware and are able to cope with the vast amounts of data involved. Experience has shown that block-oriented symmetric product ciphers constitute an adequate design paradigm for resolving this task, since they can offer a very high level of security as well as very high encryption rates. In this contribution we introduce a new product cipher which encrypts large blocks of plain text by repeated intertwined application of substitution and permutation operations. While almost all of the current product ciphers use fixed permutation operations on small data blocks, our approach involves parametrizable permutations on large data blocks induced by specific chaotic systems. By combining these highly unstable dynamics with an adaption of a very fast shift register based pseudo-random number generator, we obtain a new class of computationally secure product ciphers which offer many features that make them superior to contemporary bulk encryption systems when aiming at efficient image and video data encryption.

  10. Differential scanning microcalorimetry of intrinsically disordered proteins.

    Science.gov (United States)

    Permyakov, Sergei E

    2012-01-01

    Ultrasensitive differential scanning calorimetry (DSC) is an indispensable thermophysical technique enabling to get direct information on enthalpies accompanying heating/cooling of dilute biopolymer solutions. The thermal dependence of protein heat capacity extracted from DSC data is a valuable source of information on intrinsic disorder level of a protein. Application details and limitations of DSC technique in exploration of protein intrinsic disorder are described.

  11. Functional Anthology of Intrinsic Disorder. III. Ligands, Postranslational Modifications and Diseases Associated with Intrinsically Disordered Proteins

    Science.gov (United States)

    Xie, Hongbo; Vucetic, Slobodan; Iakoucheva, Lilia M.; Oldfield, Christopher J.; Dunker, A. Keith; Obradovic, Zoran; Uversky, Vladimir N.

    2008-01-01

    Currently, the understanding of the relationships between function, amino acid sequence and protein structure continues to represent one of the major challenges of the modern protein science. As much as 50% of eukaryotic proteins are likely to contain functionally important long disordered regions. Many proteins are wholly disordered but still possess numerous biologically important functions. However, the number of experimentally confirmed disordered proteins with known biological functions is substantially smaller than their actual number in nature. Therefore, there is a crucial need for novel bioinformatics approaches that allow projection of the current knowledge from a few experimentally verified examples to much larger groups of known and potential proteins. The elaboration of a bioinformatics tool for the analysis of functional diversity of intrinsically disordered proteins and application of this data mining tool to >200,000 proteins from Swiss-Prot database, each annotated with at least one of the 875 functional keywords was described in the first paper of this series (Xie H., Vucetic S., Iakoucheva L.M., Oldfield C.J., Dunker A.K., Obradovic Z., Uversky V.N. (2006) Functional anthology of intrinsic disorder. I. Biological processes and functions of proteins with long disordered regions. J. Proteome Res.). Using this tool, we have found that out of the 711 Swiss-Prot functional keywords associated with at least 20 proteins, 262 were strongly positively correlated with long intrinsically disordered regions, and 302 were strongly negatively correlated. Illustrative examples of functional disorder or order were found for the vast majority of keywords showing strongest positive or negative correlation with intrinsic disorder, respectively. Some 80 Swiss-Prot keywords associated with disorder- and order-driven biological processes and protein functions were described in the first paper (Xie H., Vucetic S., Iakoucheva L.M., Oldfield C.J., Dunker A.K., Obradovic

  12. Fast focus estimation using frequency analysis in digital holography.

    Science.gov (United States)

    Oh, Seungtaik; Hwang, Chi-Young; Jeong, Il Kwon; Lee, Sung-Keun; Park, Jae-Hyeung

    2014-11-17

    A novel fast frequency-based method to estimate the focus distance of digital hologram for a single object is proposed. The focus distance is computed by analyzing the distribution of intersections of smoothed-rays. The smoothed-rays are determined by the directions of energy flow which are computed from local spatial frequency spectrum based on the windowed Fourier transform. So our method uses only the intrinsic frequency information of the optical field on the hologram and therefore does not require any sequential numerical reconstructions and focus detection techniques of conventional photography, both of which are the essential parts in previous methods. To show the effectiveness of our method, numerical results and analysis are presented as well.

  13. Security Issues Model on Cloud Computing: A Case of Malaysia

    OpenAIRE

    Komeil Raisian; Jamaiah Yahaya

    2015-01-01

    By developing the cloud computing, viewpoint of many people regarding the infrastructure architectures, software distribution and improvement model changed significantly. Cloud computing associates with the pioneering deployment architecture, which could be done through grid calculating, effectiveness calculating and autonomic calculating. The fast transition towards that, has increased the worries regarding a critical issue for the effective transition of cloud computing. From the security v...

  14. The intrinsic stochasticity of near-integrable Hamiltonian systems

    Energy Technology Data Exchange (ETDEWEB)

    Krlin, L [Ceskoslovenska Akademie Ved, Prague (Czechoslovakia). Ustav Fyziky Plazmatu

    1989-09-01

    Under certain conditions, the dynamics of near-integrable Hamiltonian systems appears to be stochastic. This stochasticity (intrinsic stochasticity, or deterministic chaos) is closely related to the Kolmogorov-Arnold-Moser (KAM) theorem of the stability of near-integrable multiperiodic Hamiltonian systems. The effect of the intrinsic stochasticity attracts still growing attention both in theory and in various applications in contemporary physics. The paper discusses the relation of the intrinsic stochasticity to the modern ergodic theory and to the KAM theorem, and describes some numerical experiments on related astrophysical and high-temperature plasma problems. Some open questions are mentioned in conclusion. (author).

  15. Informationally administered reward enhances intrinsic motivation in schizophrenia.

    Science.gov (United States)

    Lee, Hyeon-Seung; Jang, Seon-Kyeong; Lee, Ga-Young; Park, Seon-Cheol; Medalia, Alice; Choi, Kee-Hong

    2017-10-01

    Even when individuals with schizophrenia have an intact ability to enjoy rewarding moments, the means to assist them to translate rewarding experiences into goal-directed behaviors is unclear. The present study sought to determine whether informationally administered rewards enhance intrinsic motivation to foster goal-directed behaviors in individuals with schizophrenia (SZ) and healthy controls (HCs). Eighty-four participants (SZ=43, HCs=41) were randomly assigned to conditions involving either a performance-contingent reward with an informationally administered reward or a task-contingent reward with no feedback. Participants were asked to play two cognitive games of equalized difficulty. Accuracy, self-reported intrinsic motivation, free-choice intrinsic motivation (i.e., game play during a free-choice observation period), and perceived competency were measured. Intrinsic motivation and perceived competency in the cognitive games were similar between the two participant groups. The informationally administered reward significantly enhanced self-reported intrinsic motivation and perceived competency in both the groups. The likelihood that individuals with schizophrenia would play the game during the free-choice observation period was four times greater in the informationally administered reward condition than that in the no-feedback condition. Our findings suggest that, in the context of cognitive remediation, individuals with schizophrenia would benefit from informationally administered rewards. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  17. Fast forward for the United Nations. Human security becomes a unifying force

    International Nuclear Information System (INIS)

    Annan, Kofi

    2005-01-01

    This paper speaks about the author's vision of a safer world and a better United Nations. The global threats of our age include terrorism, deadly weapons, genocide, infectious disease, poverty, environmental degradation and organized crime. They will not wait for States to sort out their differences. That is why we must act now to strengthen our collective defences. We must unite to master today's threats, and not allow them to divide and master us. And I submit that the only universal instrument that can bring States together in such a global effort is the United Nations. One must acknowledge that the United Nations is not perfect. At times, it shows its age. But our world will not easily find a better instrument for forging a sustained, global response to today's threats. We must use it to unite around common priorities - and act on them. And we must agree on a plan to reform the United Nations - and get on with the job of implementing it. This message lies at the heart of the recent report, A More Secure World: Our Shared Responsibility. It is the work of the Panel of 16 men and women from around the world I appointed last year. The report contains a powerful vision of collective security. Whether the threat is terrorism or AIDS, a threat to one is a threat to all. Our defences are only as strong as their weakest link. We will be safest if we work together

  18. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  19. The effects of extrinsic rewards on children's intrinsic motivation

    OpenAIRE

    大槻, 千秋

    1981-01-01

    An experiment was conducted with preschool children to test whether a person's intrinsic motivation in an activity may be decreased by extrinsic salient rewards in Japan like in America. Children solved some jigsaw puzzles and received assorted candies, then they were observed how long they did other jigsaw puzzles. The results showed that the effects of extrinsic rewards on intrinsic motivation in an activity varied with the subject's social background. In uptown children's intrinsic motivat...

  20. Self-perception of intrinsic and extrinsic motivation.

    Science.gov (United States)

    Calder, B J; Staw, B M

    1975-04-01

    Self-perception theory predicts that intrinsic and extrinsic motivation do not combine additively but rather interact. To test this predicted interaction, intrinsic and extrinsic motivation were both manipulated as independent variables. The results revealed a significant interaction for task satisfaction and a trend for the interaction on a behavioral measure. These results are discussed in terms of a general approach to the self-perception of motivation.

  1. Do people differentiate between intrinsic and extrinsic goals for physical activity?

    Science.gov (United States)

    McLachlan, Sarah; Hagger, Martin S

    2011-04-01

    The distinction between intrinsic and extrinsic goals, and between goal pursuit for intrinsically and extrinsically motivated reasons, is a central premise of self-determination theory. Proponents of the theory have proposed that the pursuit of intrinsic goals and intrinsically motivated goal striving each predict adaptive psychological and behavioral outcomes relative to the pursuit of extrinsic goals and extrinsically motivated goal striving. Despite evidence to support these predictions, research has not explored whether individuals naturally differentiate between intrinsic and extrinsic goals. Two studies tested whether people make this differentiation when recalling goals for leisure-time physical activity. Using memory-recall methods, participants in Study 1 were asked to freely generate physical activity goals. A subsample (N = 43) was asked to code their freely generated goals as intrinsic or extrinsic. In Study 2, participants were asked to recall intrinsic and extrinsic goals after making a decision regarding their future physical activity. Results of these studies revealed that individuals' goal generation and recall exhibited significant clustering by goal type. Participants encountered some difficulties when explicitly coding goals. Findings support self-determination theory and indicate that individuals discriminate between intrinsic and extrinsic goals.

  2. Research activities on fast reactors in Switzerland

    International Nuclear Information System (INIS)

    Brogli, R.; Dones, R.; Hudina, M.; Pelloni, S.

    1996-01-01

    The current domestic Swiss electricity supply is primarily based on hydro power (approximately 61%) and nuclear power (about 37%). The contribution of fossil systems is, consequently, minimal (the remaining 2%). In addition, long-term (but limited in time) contracts exist, securing imports of electricity of nuclear origin from France. During the last two years, the electricity consumption has been almost stagnant, although the 80s recorded an average annual increase rate of 2.7%. The future development of the electricity demand is a complex function of several factors with possibly competing effects, like increased efficiency of applications, changes in the industrial structure of the country, increase of population, further automation of industrial processes and services. Due to decommissioning of the currently operating nuclear power plants and expiration of long-term electricity import contracts there will eventually open a gap between the postulated electricity demand and the base supply. The assumed projected demand cases, high and low, as well as the secured yearly electric energy supply are shown. The physics aspects of plutonium burning fast reactor configurations are described including first results of the CIRANO experimental program. Swiss research related to residual heat removal in fast breeder reactors is presented. It consists of experimental ana analytic investigations on the mixing between two horizontal fluid layers of different velocities and temperatures. Development of suitable computer codes for mixing layer calculation are aimed to accurately predict the flow and temperature distribution in the pools. A satisfactory codes validation based on experimental data should be done

  3. Discrimination of acoustic communication signals by grasshoppers (Chorthippus biguttulus): temporal resolution, temporal integration, and the impact of intrinsic noise.

    Science.gov (United States)

    Ronacher, Bernhard; Wohlgemuth, Sandra; Vogel, Astrid; Krahe, Rüdiger

    2008-08-01

    A characteristic feature of hearing systems is their ability to resolve both fast and subtle amplitude modulations of acoustic signals. This applies also to grasshoppers, which for mate identification rely mainly on the characteristic temporal patterns of their communication signals. Usually the signals arriving at a receiver are contaminated by various kinds of noise. In addition to extrinsic noise, intrinsic noise caused by stochastic processes within the nervous system contributes to making signal recognition a difficult task. The authors asked to what degree intrinsic noise affects temporal resolution and, particularly, the discrimination of similar acoustic signals. This study aims at exploring the neuronal basis for sexual selection, which depends on exploiting subtle differences between basically similar signals. Applying a metric, by which the similarities of spike trains can be assessed, the authors investigated how well the communication signals of different individuals of the same species could be discriminated and correctly classified based on the responses of auditory neurons. This spike train metric yields clues to the optimal temporal resolution with which spike trains should be evaluated. (c) 2008 APA, all rights reserved

  4. Self-Determination Theory: Intrinsic Motivation and Behavioral Change.

    Science.gov (United States)

    Flannery, Marie

    2017-03-01

    Motivation is a central concept in behavioral change. This article reviews the self-determination theory with an emphasis on "intrinsic motivation," which is facilitated when three basic psychological needs (autonomy, competence, and relatedness) are met. Intrinsic motivation is associated with improved well-being and sustained behavioral change.

  5. A model of intrinsic symmetry breaking

    International Nuclear Information System (INIS)

    Ge, Li; Li, Sheng; George, Thomas F.; Sun, Xin

    2013-01-01

    Different from the symmetry breaking associated with a phase transition, which occurs when the controlling parameter is manipulated across a critical point, the symmetry breaking presented in this Letter does not need parameter manipulation. Instead, the system itself suddenly undergoes symmetry breaking at a certain time during its evolution, which is intrinsic symmetry breaking. Through a polymer model, it is revealed that the origin of the intrinsic symmetry breaking is nonlinearity, which produces instability at the instance when the evolution crosses an inflexion point, where this instability breaks the original symmetry

  6. Ethnic Stigma, Academic Anxiety, and Intrinsic Motivation in Middle Childhood

    Science.gov (United States)

    Gillen-O’Neel, Cari; Ruble, Diane N.; Fuligni, Andrew J.

    2011-01-01

    Previous research addressing the dynamics of stigma and academics has focused on African-American adolescents and adults. The present study examined stigma awareness, academic anxiety, and intrinsic motivation among 451 young (ages 6–11) and diverse (African-American, Chinese, Dominican, Russian, and European-American) students. Results indicated that ethnic-minority children reported higher stigma awareness than European-American children. For all children, stigma awareness was associated with higher academic anxiety and lower intrinsic motivation. Despite these associations, ethnic-minority children reported higher levels of intrinsic motivation than their European-American peers. A significant portion of the higher intrinsic motivation among Dominican students was associated with their higher levels of school belonging, suggesting that supportive school environments may be important sources of intrinsic motivation among some ethnic-minority children. PMID:21883152

  7. Extrinsic and intrinsic regulation of axon regeneration at a crossroads.

    Science.gov (United States)

    Kaplan, Andrew; Ong Tone, Stephan; Fournier, Alyson E

    2015-01-01

    Repair of the injured spinal cord is a major challenge in medicine. The limited intrinsic regenerative response mounted by adult central nervous system (CNS) neurons is further hampered by astrogliosis, myelin debris and scar tissue that characterize the damaged CNS. Improved axon regeneration and recovery can be elicited by targeting extrinsic factors as well as by boosting neuron-intrinsic growth regulators. Our knowledge of the molecular basis of intrinsic and extrinsic regulators of regeneration has expanded rapidly, resulting in promising new targets to promote repair. Intriguingly certain neuron-intrinsic growth regulators are emerging as promising targets to both stimulate growth and relieve extrinsic inhibition of regeneration. This crossroads between the intrinsic and extrinsic aspects of spinal cord injury is a promising target for effective therapies for this unmet need.

  8. Motivating crowding theory - opening the black box of intrinsic motivation

    DEFF Research Database (Denmark)

    Jacobsen, Christian Bøtcher

    2010-01-01

    Public employees work for many other reasons than because they are paid for it. In other words, intrinsic motivation is an important determinant for their performance. Nonetheless, public sector organizations increasingly rely on extrinsic motivation factors such as monetary incentives to motivate...... employees. Motivation crowding theory claims that this may be at the expense of intrinsic motivation, if the extrinsic motivation factor is perceived to be controlling. On the other hand, intrinsic motivation will be enhanced (crowded in), if the extrinsic motivation factor is perceived to be supportive......, monetary incentives are found to cause different crowding effects for these different types of intrinsic motivation. The results call for more theoretical work on the drivers of motivation crowding effects and for practitioners to pay more attention to what type of intrinsic motivation is at stake, when...

  9. Intrinsic and extrinsic motivation for stereotypic and repetitive behavior.

    Science.gov (United States)

    Joosten, Annette V; Bundy, Anita C; Einfeld, Stewart L

    2009-03-01

    This study provides evidence for intrinsic and extrinsic motivators for stereotypical and repetitive behavior in children with autism and intellectual disability and children with intellectual disability alone. We modified the Motivation Assessment Scale (MAS) (1988b); dividing it into intrinsic and extrinsic measures and adding items to assess anxiety as an intrinsic motivator. Rasch analysis of data from 279 MASs (74 children) revealed that the items formed two unidimensional scales. Anxiety was a more likely intrinsic motivator than sensory seeking for children with dual diagnoses; the reverse was true for children with intellectual disability only. Escape and gaining a tangible object were the most common extrinsic motivators for those with dual diagnoses and attention and escape for children with intellectual disability.

  10. Extrinsic and intrinsic factors associated with non-contact injury in adult pace bowlers: a systematic review protocol.

    Science.gov (United States)

    Olivier, Benita; Stewart, Aimee; Taljaard, Tracy; Burger, Elaine; Brukner, Peter; Orchard, John; Gray, Janine; Botha, Nadine; Mckinon, Warrick

    2015-01-01

    Review question: which extrinsic and intrinsic factors are associated with non-contact injury in adult cricket pace bowlers?Review objective: the objective of this review is to determine the extrinsic and intrinsic factors associated with non-contact injury in adult pace bowlers. Cricket is generally considered to be a sport of low injury risk compared to other sports. In cricket, the pace bowler strives towards the adoption of a bowling technique with a relatively low injury threat that will, at the same time, allow for a fast (>120km/hr) and accurate delivery to the opposing batsman. However, of all the various roles of the cricket player, the pace bowler has the highest risk of injury, especially for low back and lower limb (lower quarter) injury. The reason for this high risk of injury is due to the inherent, high-load biomechanical nature of the pace bowling action. The high prevalence of injury amongst pace bowlers highlights the great need for research into factors associated with injury.Both extrinsic and intrinsic factors work in combination to predispose the bowler to injury. Extrinsic or environment-related factors include bowling workload (the numbers of overs a bowler bowls), player position (first, second or third change) and time of play (morning or afternoon). A high bowling workload has been linked with a higher risk of injury in pace bowlers. Foster et al. found in an observational study that bowling too many overs in a single spell or bowling too many spells may increase the pace bowler's risk of sustaining a low back injury. In another observational study, Dennis et al. found that an exceptionally high bowling workload as well as an uncommonly low bowling workload is associated with injury risk. The major extrinsic factors for bowling injury identified by Orchard et al. are a high number of match overs bowled in the previous week, number of days of play and bowling second (batting first) in a match. Extrinsic factors are known to make the bowler

  11. Personalizing Sample Databases with Facebook Information to Increase Intrinsic Motivation

    Science.gov (United States)

    Marzo, Asier; Ardaiz, Oscar; Sanz de Acedo, María Teresa; Sanz de Acedo, María Luisa

    2017-01-01

    Motivation is fundamental for students to achieve successful and complete learning. Motivation can be extrinsic, i.e., driven by external rewards, or intrinsic, i.e., driven by internal factors. Intrinsic motivation is the most effective and must be inspired by the task at hand. Here, a novel strategy is presented to increase intrinsic motivation…

  12. Power deposition by neutral beam injected fast ions in field-reversed configurations

    International Nuclear Information System (INIS)

    Takahashi, Toshiki; Kato, Takayuki; Kondoh, Yoshiomi; Iwasawa, Naotaka

    2004-01-01

    The effects of Coulomb collisions on neutral beam (NB) injected fast ions into field-reversed configuration (FRC) plasmas are investigated by calculating the single particle orbits, where the ions are subject to the slowing-down and pitch-angle collisions. The Monte Carlo method is used for the pitch-angle scattering, and the friction term is added to the equation of motion to show the effects of the slowing-down collision, such as the deposited power profile. The calculation parameters used are relevant to the NB injection on the FRC injection experiment device [T. Asai, Y. Suzuki, T. Yoneda, F. Kodera, M. Okubo, and S. Goto, Phys. Plasmas 7, 2294 (2000)]. It is found that the dominant local power deposition occurs in the open field region between the X point and the mirror point because of a concentration of fast ions and a longer duration travel at the mirror reflection point. In the present calculation, the maximum deposited power to the FRC plasma is about 10% of the injected power. Although the pitch-angle scattering by Coulomb collision destroys the mirror confinement of NB injected fast ions, this effect is found to be negligible. The loss mechanism due to nonadiabatic fast ion motion, which is intrinsic in nonuniform FRC plasmas, has a much greater effect than the pitch-angle scattering by Coulomb collision

  13. Hamiltonian analysis of fast wave current drive in tokamak plasmas

    Energy Technology Data Exchange (ETDEWEB)

    Becoulet, A; Fraboulet, D; Giruzzi, G; Moreau, D; Saoutic, B [Association Euratom-CEA, Centre d` Etudes de Cadarache, 13 - Saint-Paul-lez-Durance (France). Dept. de Recherches sur la Fusion Controlee; Chinardet, J [CISI Ingenierie, Centre d` Etudes de Cadarache, 13 - Saint-Paul-lez-Durance (France)

    1993-12-01

    The Hamiltonian formalism is used to analyze the direct resonant interaction between the fast magnetosonic wave and the electrons in a tokamak plasma. The intrinsic stochasticity of the electron phase space trajectories is derived, and together with extrinsic de-correlation processes, assesses the validity of the quasilinear approximation for the kinetic studies of fast wave current drive (FWCD). A full-wave resolution of the Maxwell-Vlasov set of equations provides the exact pattern of the wave fields in a complete tokamak geometry, for a realistic antenna spectrum. The local quasilinear diffusion tensor is derived from the wave fields, and is used for a computation of the driven current and deposited power profiles, the current drive efficiency, including possible non-linear effects in the kinetic equation. Several applications of FWCD on existing and future machines are given, as well as results concerning combination of FWCD with other non inductive current drive methods. An analytical expression for the current drive efficiency is given in the high single-pass absorption regimes. (authors). 20 figs., 1 tab., 26 refs.

  14. Hamiltonian analysis of fast wave current drive in tokamak plasmas

    International Nuclear Information System (INIS)

    Becoulet, A.; Fraboulet, D.; Giruzzi, G.; Moreau, D.; Saoutic, B.

    1993-12-01

    The Hamiltonian formalism is used to analyze the direct resonant interaction between the fast magnetosonic wave and the electrons in a tokamak plasma. The intrinsic stochasticity of the electron phase space trajectories is derived, and together with extrinsic de-correlation processes, assesses the validity of the quasilinear approximation for the kinetic studies of fast wave current drive (FWCD). A full-wave resolution of the Maxwell-Vlasov set of equations provides the exact pattern of the wave fields in a complete tokamak geometry, for a realistic antenna spectrum. The local quasilinear diffusion tensor is derived from the wave fields, and is used for a computation of the driven current and deposited power profiles, the current drive efficiency, including possible non-linear effects in the kinetic equation. Several applications of FWCD on existing and future machines are given, as well as results concerning combination of FWCD with other non inductive current drive methods. An analytical expression for the current drive efficiency is given in the high single-pass absorption regimes. (authors). 20 figs., 1 tab., 26 refs

  15. Intrinsic Density Matrices of the Nuclear Shell Model

    International Nuclear Information System (INIS)

    Deveikis, A.; Kamuntavichius, G.

    1996-01-01

    A new method for calculation of shell model intrinsic density matrices, defined as two-particle density matrices integrated over the centre-of-mass position vector of two last particles and complemented with isospin variables, has been developed. The intrinsic density matrices obtained are completely antisymmetric, translation-invariant, and do not employ a group-theoretical classification of antisymmetric states. They are used for exact realistic density matrix expansion within the framework of the reduced Hamiltonian method. The procedures based on precise arithmetic for calculation of the intrinsic density matrices that involve no numerical diagonalization or orthogonalization have been developed and implemented in the computer code. (author). 11 refs., 2 tabs

  16. Changes in Intrinsic Motivation as a Function of Negative Feedback and Threats.

    Science.gov (United States)

    Deci, Edward L.; Cascio, Wayne F.

    Recent studies have demonstrated that external rewards can affect intrinsic motivation to perform an activity. Money tends to decrease intrinsic motivation, whereas positive verbal reinforcements tend to increase intrinsic motivation. This paper presents evidence that negative feedback and threats of punishment also decrease intrinsic motivation.…

  17. Palatalization and Intrinsic Prosodic Vowel Features in Russian

    Science.gov (United States)

    Ordin, Mikhail

    2011-01-01

    The presented study is aimed at investigating the interaction of palatalization and intrinsic prosodic features of the vowel in CVC (consonant+vowel+consonant) syllables in Russian. The universal nature of intrinsic prosodic vowel features was confirmed with the data from the Russian language. It was found that palatalization of the consonants…

  18. Intrinsic respiratory gating in small-animal CT

    International Nuclear Information System (INIS)

    Bartling, Soenke H.; Dinkel, Julien; Kauczor, Hans-Ulrich; Stiller, Wolfram; Semmler, Wolfhard; Grasruck, Michael; Madisch, Ijad; Gupta, Rajiv; Kiessling, Fabian

    2008-01-01

    Gating in small-animal CT imaging can compensate artefacts caused by physiological motion during scanning. However, all published gating approaches for small animals rely on additional hardware to derive the gating signals. In contrast, in this study a novel method of intrinsic respiratory gating of rodents was developed and tested for mice (n=5), rats (n=5) and rabbits (n=2) in a flat-panel cone-beam CT system. In a consensus read image quality was compared with that of non-gated and retrospective extrinsically gated scans performed using a pneumatic cushion. In comparison to non-gated images, image quality improved significantly using intrinsic and extrinsic gating. Delineation of diaphragm and lung structure improved in all animals. Image quality of intrinsically gated CT was judged to be equivalent to extrinsically gated ones. Additionally 4D datasets were calculated using both gating methods. Values for expiratory, inspiratory and tidal lung volumes determined with the two gating methods were comparable and correlated well with values known from the literature. We could show that intrinsic respiratory gating in rodents makes additional gating hardware and preparatory efforts superfluous. This method improves image quality and allows derivation of functional data. Therefore it bears the potential to find wide applications in small-animal CT imaging. (orig.)

  19. VELOCITY EVOLUTION AND THE INTRINSIC COLOR OF TYPE Ia SUPERNOVAE

    International Nuclear Information System (INIS)

    Foley, Ryan J.; Sanders, Nathan E.; Kirshner, Robert P.

    2011-01-01

    To understand how best to use observations of Type Ia supernovae (SNe Ia) to obtain precise and accurate distances, we investigate the relations between spectra of SNe Ia and their intrinsic colors. Using a sample of 1630 optical spectra of 255 SNe, based primarily on data from the CfA Supernova Program, we examine how the velocity evolution and line strengths of Si II λ6355 and Ca II H and K are related to the B – V color at peak brightness. We find that the maximum-light velocity of Si II λ6355 and Ca II H and K and the maximum-light pseudo-equivalent width of Si II λ6355 are correlated with intrinsic color, with intrinsic color having a linear relation with the Si II λ6355 measurements. Ca II H and K does not have a linear relation with intrinsic color, but lower-velocity SNe tend to be intrinsically bluer. Combining the spectroscopic measurements does not improve intrinsic color inference. The intrinsic color scatter is larger for higher-velocity SNe Ia—even after removing a linear trend with velocity—indicating that lower-velocity SNe Ia are more 'standard crayons'. Employing information derived from SN Ia spectra has the potential to improve the measurements of extragalactic distances and the cosmological properties inferred from them.

  20. Application of learning from examples methods for on-line dynamic security assessment of electric power systems - state of the art

    Energy Technology Data Exchange (ETDEWEB)

    Pecas Lopes, J.A. [Universidade do Porto, Porto (Portugal). Faculdade de Engenharia] Hatziargyriou, Nikos D. [National Technical University of Athens, Athens (Greece)

    1994-12-31

    This paper provides an overview of the application of `learning from examples` techniques like pattern recognition, artificial neural networks and decision trees, when used for fast dynamic security assessment. Problems concerning the system security evaluation relatively to transient stability and voltage stability are addressed with more details and references to research works in this field are briefly described. (author) 44 refs., 3 tabs.

  1. Printable, scannable biometric templates for secure documents and materials

    Science.gov (United States)

    Cambier, James L.; Musgrave, Clyde

    2000-04-01

    Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.

  2. Integration of multispectral face recognition and multi-PTZ camera automated surveillance for security applications

    Science.gov (United States)

    Chen, Chung-Hao; Yao, Yi; Chang, Hong; Koschan, Andreas; Abidi, Mongi

    2013-06-01

    Due to increasing security concerns, a complete security system should consist of two major components, a computer-based face-recognition system and a real-time automated video surveillance system. A computerbased face-recognition system can be used in gate access control for identity authentication. In recent studies, multispectral imaging and fusion of multispectral narrow-band images in the visible spectrum have been employed and proven to enhance the recognition performance over conventional broad-band images, especially when the illumination changes. Thus, we present an automated method that specifies the optimal spectral ranges under the given illumination. Experimental results verify the consistent performance of our algorithm via the observation that an identical set of spectral band images is selected under all tested conditions. Our discovery can be practically used for a new customized sensor design associated with given illuminations for an improved face recognition performance over conventional broad-band images. In addition, once a person is authorized to enter a restricted area, we still need to continuously monitor his/her activities for the sake of security. Because pantilt-zoom (PTZ) cameras are capable of covering a panoramic area and maintaining high resolution imagery for real-time behavior understanding, researches in automated surveillance systems with multiple PTZ cameras have become increasingly important. Most existing algorithms require the prior knowledge of intrinsic parameters of the PTZ camera to infer the relative positioning and orientation among multiple PTZ cameras. To overcome this limitation, we propose a novel mapping algorithm that derives the relative positioning and orientation between two PTZ cameras based on a unified polynomial model. This reduces the dependence on the knowledge of intrinsic parameters of PTZ camera and relative positions. Experimental results demonstrate that our proposed algorithm presents substantially

  3. Fast modeling of flux trapping cascaded explosively driven magnetic flux compression generators.

    Science.gov (United States)

    Wang, Yuwei; Zhang, Jiande; Chen, Dongqun; Cao, Shengguang; Li, Da; Liu, Chebo

    2013-01-01

    To predict the performance of flux trapping cascaded flux compression generators, a calculation model based on an equivalent circuit is investigated. The system circuit is analyzed according to its operation characteristics in different steps. Flux conservation coefficients are added to the driving terms of circuit differential equations to account for intrinsic flux losses. To calculate the currents in the circuit by solving the circuit equations, a simple zero-dimensional model is used to calculate the time-varying inductance and dc resistance of the generator. Then a fast computer code is programmed based on this calculation model. As an example, a two-staged flux trapping generator is simulated by using this computer code. Good agreements are achieved by comparing the simulation results with the measurements. Furthermore, it is obvious that this fast calculation model can be easily applied to predict performances of other flux trapping cascaded flux compression generators with complex structures such as conical stator or conical armature sections and so on for design purpose.

  4. Challenges and countermeasures of China’s energy security

    International Nuclear Information System (INIS)

    Cao, Wensheng; Bluth, Christoph

    2013-01-01

    China is now a major consumer and importer of energy, and its choices and policies will increasingly affect the rest of the world. This paper analyses the key features of China’s energy policy as it faces the prospect of possible challenges to its energy security given the increasing reliance on fuel imports and the need to transform its energy to meet the requirements of a modern, fast-growing economy. The paper examines whether the current energy mix is appropriate and sustainable, and considers the China’s policymakers new emphasis on energy efficiency, conservation, renewable energy and the shift to natural gas the primary energy source. It examines the internal and external constraints on China’s energy policy and considers the strategic dilemmas arising from China’s increasing involvement in international energy markets. It concludes that both the domestic and international implications of China’s search for energy security will confront policymakers with hard choices that will affect not only energy policy, but also China’s geopolitical grand strategy. - Highlights: ► Conception of energy security and energy policy in China’s grand strategy are expatiated. ► Challenges China is facing are analyzed from 4 aspects. ► New strategic thoughts of China including 6 capability enhancements are raised. ► Major tasks of safeguarding energy security contain 3 measures of improvement.

  5. Network Security: Policies and Guidelines for Effective Network Management

    Directory of Open Access Journals (Sweden)

    Jonathan Gana KOLO

    2008-12-01

    Full Text Available Network security and management in Information and Communication Technology (ICT is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password.This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data.

  6. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  7. Food Security and Diet Among American Indians in the Midwest.

    Science.gov (United States)

    Berryhill, Kelly; Hale, Jason; Chase, Brian; Clark, Lauren; He, Jianghua; Daley, Christine M

    2018-04-05

    The purpose of this study was to determine levels of food security among American Indians (AI) living in the Midwest and possible correlations between food security levels and various health outcomes, diet, and demographic variables. This study used a cross-sectional design to determine health behaviors among AI. Participants (n = 362) were recruited by AI staff through various cultural community events in the Midwest, such as powwows and health fairs. Inclusion criteria included the following: age 18 years or older, self-identify as an AI, and willing to participate in the survey. Of all participants, 210 (58%) had either low or very low food security, with 96 in the very low category (26.5%). Participants with very low food security tended to have significantly more chronic conditions. Additional significant differences for very low food security existed by demographic variables, including having no insurance (p security levels and the consumption of fast food within the past week (p value = 0.0420), though no differences were found in fruit and vegetable consumption. AI in our sample had higher levels of food insecurity than those reported in the literature for other racial/ethnic groups. AI and non-Native health professionals should be aware of the gravity of food insecurity and the impact it has on overall health. Additional research is needed to determine specific aspects of food insecurity affecting different Native communities to develop appropriate interventions.

  8. Kinematical tests for the intrinsic shapes of galaxies

    International Nuclear Information System (INIS)

    Capaccioli, M.; Fasano, G.

    1984-01-01

    Determining the intrinsic shape of elliptical galaxies has been an illusive enterprise, but one fundamental to the understanding of their internal dynamics and formation. Here the problem is approached dynamically; noting that the velocity dispersion is largest when sighted down the longest axis, the correlations are derived of velocity dispersion with observed eccentricity expected, after the known trend of velocity dispersion with luminosity is removed. Using a compilation of published data, the relation between luminosity and velocity dispersion is determined more accurately. The residuals are examined as a function of axis ratio in order to construct a test for the intrinsic shape of galaxies. The effects of projection are modelled and possible intrinsic variations are examined. (author)

  9. Do intrinsic and extrinsic motivation relate differently to employee outcomes?

    OpenAIRE

    Kuvaas, Bard; Buch, Robert; Weibel, Antoinette; Dysvik, Anders; Nerstad, Christina

    2017-01-01

    In most theories that address how individual financial incentives affect work performance, researchers have assumed that two types of motivation—intrinsic and extrinsic—mediate the relationship between incentives and performance. Empirically, however, extrinsic motivation is rarely investigated. To explore the predictive validity of these theories of intrinsic and extrinsic motivation in work settings, we tested how both intrinsic and extrinsic motivation affected supervisor-ra...

  10. A symmetric image encryption scheme based on 3D chaotic cat maps

    International Nuclear Information System (INIS)

    Chen Guanrong; Mao Yaobin; Chui, Charles K.

    2004-01-01

    Encryption of images is different from that of texts due to some intrinsic features of images such as bulk data capacity and high redundancy, which are generally difficult to handle by traditional methods. Due to the exceptionally desirable properties of mixing and sensitivity to initial conditions and parameters of chaotic maps, chaos-based encryption has suggested a new and efficient way to deal with the intractable problem of fast and highly secure image encryption. In this paper, the two-dimensional chaotic cat map is generalized to 3D for designing a real-time secure symmetric encryption scheme. This new scheme employs the 3D cat map to shuffle the positions (and, if desired, grey values as well) of image pixels and uses another chaotic map to confuse the relationship between the cipher-image and the plain-image, thereby significantly increasing the resistance to statistical and differential attacks. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security and fast encryption speed of the new scheme

  11. Securing Digital Audio using Complex Quadratic Map

    Science.gov (United States)

    Suryadi, MT; Satria Gunawan, Tjandra; Satria, Yudi

    2018-03-01

    In This digital era, exchanging data are common and easy to do, therefore it is vulnerable to be attacked and manipulated from unauthorized parties. One data type that is vulnerable to attack is digital audio. So, we need data securing method that is not vulnerable and fast. One of the methods that match all of those criteria is securing the data using chaos function. Chaos function that is used in this research is complex quadratic map (CQM). There are some parameter value that causing the key stream that is generated by CQM function to pass all 15 NIST test, this means that the key stream that is generated using this CQM is proven to be random. In addition, samples of encrypted digital sound when tested using goodness of fit test are proven to be uniform, so securing digital audio using this method is not vulnerable to frequency analysis attack. The key space is very huge about 8.1×l031 possible keys and the key sensitivity is very small about 10-10, therefore this method is also not vulnerable against brute-force attack. And finally, the processing speed for both encryption and decryption process on average about 450 times faster that its digital audio duration.

  12. Intrinsically bent DNA in replication origins and gene promoters.

    Science.gov (United States)

    Gimenes, F; Takeda, K I; Fiorini, A; Gouveia, F S; Fernandez, M A

    2008-06-24

    Intrinsically bent DNA is an alternative conformation of the DNA molecule caused by the presence of dA/dT tracts, 2 to 6 bp long, in a helical turn phase DNA or with multiple intervals of 10 to 11 bp. Other than flexibility, intrinsic bending sites induce DNA curvature in particular chromosome regions such as replication origins and promoters. Intrinsically bent DNA sites are important in initiating DNA replication, and are sometimes found near to regions associated with the nuclear matrix. Many methods have been developed to localize bent sites, for example, circular permutation, computational analysis, and atomic force microscopy. This review discusses intrinsically bent DNA sites associated with replication origins and gene promoter regions in prokaryote and eukaryote cells. We also describe methods for identifying bent DNA sites for circular permutation and computational analysis.

  13. Congenital hypertrophy of multiple intrinsic muscles of the foot.

    Science.gov (United States)

    Shiraishi, Tomohiro; Park, Susam; Niu, Atushi; Hasegawa, Hiromi

    2014-12-01

    Congenital hypertrophy of a single intrinsic muscle of the foot is rare, and as far as we know, only six cases have been reported. We describe a case of congenital anomaly that showed hypertrophy of multiple intrinsic muscles of the foot; the affected muscles were all the intrinsic muscles of the foot except the extensor digitorum brevis or extensor hallucis. Other tissues such as adipose tissue, nervous tissue, or osseous tissue showed no abnormalities. To reduce the volume of the foot we removed parts of the enlarged muscles.

  14. Fast and slow light generated by surface plasmon wave and gold grating coupling effects

    Science.gov (United States)

    Amiri, Iraj S.; Ariannejad, M. M.; Tajdidzadeh, M.; Sorger, Volker J.; Ling, Xi; Yupapin, P.

    2018-01-01

    We present here the results of a simulation of the effect of gold and graphene coatings on silicon micro-ring resonators. We studied the effect of different radii of graphene on the time delay, from which one an interesting aspect of light pulse behaviors, such as fast light, was numerically investigated. The obtained results indicate that the time delay can be varied, which is in good agreement with theoretical predictions. Fast and slow light pulse trains can be obtained by modifying the throughput port, which forms the gold grating length. The temporal gaps between the fast and slow light in the used graphene and gold are 140 and 168 fs, respectively, which can be tuned by varying the radius or grating length. The obtained results show that such a device may be useful in applications requiring fast and slow light pulse train pairs, such as optical switching, sensors, communications, and security applications.

  15. FAST-PT II: an algorithm to calculate convolution integrals of general tensor quantities in cosmological perturbation theory

    Energy Technology Data Exchange (ETDEWEB)

    Fang, Xiao; Blazek, Jonathan A.; McEwen, Joseph E.; Hirata, Christopher M., E-mail: fang.307@osu.edu, E-mail: blazek@berkeley.edu, E-mail: mcewen.24@osu.edu, E-mail: hirata.10@osu.edu [Center for Cosmology and AstroParticle Physics, Department of Physics, The Ohio State University, 191 W Woodruff Ave, Columbus OH 43210 (United States)

    2017-02-01

    Cosmological perturbation theory is a powerful tool to predict the statistics of large-scale structure in the weakly non-linear regime, but even at 1-loop order it results in computationally expensive mode-coupling integrals. Here we present a fast algorithm for computing 1-loop power spectra of quantities that depend on the observer's orientation, thereby generalizing the FAST-PT framework (McEwen et al., 2016) that was originally developed for scalars such as the matter density. This algorithm works for an arbitrary input power spectrum and substantially reduces the time required for numerical evaluation. We apply the algorithm to four examples: intrinsic alignments of galaxies in the tidal torque model; the Ostriker-Vishniac effect; the secondary CMB polarization due to baryon flows; and the 1-loop matter power spectrum in redshift space. Code implementing this algorithm and these applications is publicly available at https://github.com/JoeMcEwen/FAST-PT.

  16. Symmetry in Social Construction during ERP Implementation: A Systems Security Perspective

    Directory of Open Access Journals (Sweden)

    Kennedy Njenga

    2014-03-01

    Full Text Available The principle of symmetry in enterprise resource planning (ERP systems implementation holds that the researcher should deploy impartial explanation in cases of success as in cases of failure. This article examines the symmetry intrinsic in social construction within the various stages of the ERP development life cycle, from initiation to implementation. Discourse on symmetry focuses on whether social constructs are able to influence ERP implementation positively (success or negatively (failure and whether this exposes ERP systems to information security risk. The theoretical lens of social construction of technology (SCOT theory, a theory premised on social interaction between agents and technology artefacts, is applied for this purpose. The research was quantitative with a survey having been conducted on information technology (IT and information security (IS practitioners. Results of the study highlight the significant role social construction plays because of the direct linkage it has with the implementation of information security controls in ERP systems.  The research delineated five social constructs, namely positional influence, reward influence, coercive influence, expert influence and referent influence. For purposes of this research and on the sampling criteria applied, the construct ‘expert influence’, a typology of social construction, is shown to be more domineering than other typologies of social construction and is seen as providing symmetrical balance between governing ERP security (success and risk (failure. Implications of these results for theory and practice are discussed in the main article.

  17. The Emerging Neuroscience of Intrinsic Motivation: A New Frontier in Self-Determination Research

    Science.gov (United States)

    Di Domenico, Stefano I.; Ryan, Richard M.

    2017-01-01

    Intrinsic motivation refers to people’s spontaneous tendencies to be curious and interested, to seek out challenges and to exercise and develop their skills and knowledge, even in the absence of operationally separable rewards. Over the past four decades, experimental and field research guided by self-determination theory (SDT; Ryan and Deci, 2017) has found intrinsic motivation to predict enhanced learning, performance, creativity, optimal development and psychological wellness. Only recently, however, have studies begun to examine the neurobiological substrates of intrinsic motivation. In the present article, we trace the history of intrinsic motivation research, compare and contrast intrinsic motivation to closely related topics (flow, curiosity, trait plasticity), link intrinsic motivation to key findings in the comparative affective neurosciences, and review burgeoning neuroscience research on intrinsic motivation. We review converging evidence suggesting that intrinsically motivated exploratory and mastery behaviors are phylogenetically ancient tendencies that are subserved by dopaminergic systems. Studies also suggest that intrinsic motivation is associated with patterns of activity across large-scale neural networks, namely, those that support salience detection, attentional control and self-referential cognition. We suggest novel research directions and offer recommendations for the application of neuroscience methods in the study of intrinsic motivation. PMID:28392765

  18. The Emerging Neuroscience of Intrinsic Motivation: A New Frontier in Self-Determination Research.

    Science.gov (United States)

    Di Domenico, Stefano I; Ryan, Richard M

    2017-01-01

    Intrinsic motivation refers to people's spontaneous tendencies to be curious and interested, to seek out challenges and to exercise and develop their skills and knowledge, even in the absence of operationally separable rewards. Over the past four decades, experimental and field research guided by self-determination theory (SDT; Ryan and Deci, 2017) has found intrinsic motivation to predict enhanced learning, performance, creativity, optimal development and psychological wellness. Only recently, however, have studies begun to examine the neurobiological substrates of intrinsic motivation. In the present article, we trace the history of intrinsic motivation research, compare and contrast intrinsic motivation to closely related topics (flow, curiosity, trait plasticity), link intrinsic motivation to key findings in the comparative affective neurosciences, and review burgeoning neuroscience research on intrinsic motivation. We review converging evidence suggesting that intrinsically motivated exploratory and mastery behaviors are phylogenetically ancient tendencies that are subserved by dopaminergic systems. Studies also suggest that intrinsic motivation is associated with patterns of activity across large-scale neural networks, namely, those that support salience detection, attentional control and self-referential cognition. We suggest novel research directions and offer recommendations for the application of neuroscience methods in the study of intrinsic motivation.

  19. Discovery of Intrinsic Primitives on Triangle Meshes

    KAUST Repository

    Solomon, Justin

    2011-04-01

    The discovery of meaningful parts of a shape is required for many geometry processing applications, such as parameterization, shape correspondence, and animation. It is natural to consider primitives such as spheres, cylinders and cones as the building blocks of shapes, and thus to discover parts by fitting such primitives to a given surface. This approach, however, will break down if primitive parts have undergone almost-isometric deformations, as is the case, for example, for articulated human models. We suggest that parts can be discovered instead by finding intrinsic primitives, which we define as parts that posses an approximate intrinsic symmetry. We employ the recently-developed method of computing discrete approximate Killing vector fields (AKVFs) to discover intrinsic primitives by investigating the relationship between the AKVFs of a composite object and the AKVFs of its parts. We show how to leverage this relationship with a standard clustering method to extract k intrinsic primitives and remaining asymmetric parts of a shape for a given k. We demonstrate the value of this approach for identifying the prominent symmetry generators of the parts of a given shape. Additionally, we show how our method can be modified slightly to segment an entire surface without marking asymmetric connecting regions and compare this approach to state-of-the-art methods using the Princeton Segmentation Benchmark. © 2011 The Author(s).

  20. Intrinsically radiolabelled [59Fe]-SPIONs for dual MRI/radionuclide detection

    OpenAIRE

    Hoffman, David; Sun, Minghao; Yang, Likun; McDonagh, Philip R; Corwin, Frank; Sundaresan, Gobalakrishnan; Wang, Li; Vijayaragavan, Vimalan; Thadigiri, Celina; Lamichhane, Narottam; Zweit, Jamal

    2014-01-01

    Towards the development of iron oxide nanoparticles with intrinsically incorporated radionuclides for dual Positron Emission Tomography/Magnetic Resonance Imaging (PET/MRI) and more recently of Single Photon Emission Computed Tomography/Magnetic Resonance Imaging (SPECT/MRI), we have developed intrinsically radiolabeled [59Fe]-superparamagnetic iron oxide nanoparticles ([59Fe]-SPIONs) as a proof of concept for an intrinsic dual probe strategy. 59Fe was incorporated into Fe3O4 nanoparticle cry...

  1. Public support for restrictions on fast food company sponsorship of community events.

    Science.gov (United States)

    Pettigrew, Simone; Pescud, Melanie; Rosenberg, Michael; Ferguson, Renee; Houghton, Stephen

    2012-01-01

    This study investigated community attitudes to fast food companies' sponsorship of community events. The aim was to inform future efforts to introduce greater restrictions on these marketing activities to reduce child obesity. While previous research has focused on the sponsorship of sporting events, the present study included all community events and gauged public support for fast food company sponsorships in general as well as specific sponsorship activities such as securing event naming rights, advertising on event premises, and distributing free items to children in the form of food and redeemable vouchers. A large and diverse sample of Western Australian adults (n=2,005) responded to a community attitudes telephone survey that included questions relating to event sponsorship. Almost half of the respondents reported that the promotion of fast foods is inappropriate at community events, and only a third considered it appropriate at events where children are likely to be present. Around two-thirds agreed that promoting fast foods at such events sends contradictory messages to children and just a quarter of respondents considered it acceptable for free fast food to be distributed at events or for children to be rewarded for participation with fast food vouchers. The results suggest that efforts to reduce child obesity that involve restrictions on the sponsorship of community events by organisations promoting unhealthy foods may be supported by a substantial proportion of the population.

  2. Genome-Wide Identification of Antimicrobial Intrinsic Resistance Determinants in Staphylococcus aureus

    DEFF Research Database (Denmark)

    Vestergaard, Martin; Leng, Bingfeng; Haaber, Jakob

    2016-01-01

    The emergence of antimicrobial resistance severely threatens our ability to treat bacterial infections. While acquired resistance has received considerable attention, relatively little is known of intrinsic resistance that allows bacteria to naturally withstand antimicrobials. Gene products...... that confer intrinsic resistance to antimicrobial agents may be explored for alternative antimicrobial therapies, by potentiating the efficacy of existing antimicrobials. In this study, we identified the intrinsic resistome to a broad spectrum of antimicrobials in the human pathogen, Staphylococcus aureus. We...... with the atpA mutant compared to wild type cells with gentamicin at a clinically relevant concentration. Our results demonstrate that many gene products contribute to the intrinsic antimicrobial resistance of S. aureus. Knowledge of these intrinsic resistance determinants provides alternative targets...

  3. From sniffer dogs to emerging sniffer devices for airport security: an opportunity to rethink privacy implications?

    Science.gov (United States)

    Bonfanti, Matteo E

    2014-09-01

    Dogs are known for their incredible ability to detect odours, extracting them from a "complex" environment and recognising them. This makes sniffer dogs precious assets in a broad variety of security applications. However, their use is subject to some intrinsic restrictions. Dogs can only be trained to a limited set of applications, get tired after a relatively short period, and thus require a high turnover. This has sparked a drive over the past decade to develop artificial sniffer devices-generally known as "chemical sniffers" or "electronic noses"-able to complement and possibly replace dogs for some security applications. Such devices have been already deployed, or are intended to be deployed, at borders, airports and other critical installation security checkpoints. Similarly to dogs, they are adopted for detecting residual traces that indicate either the presence of, or recent contact with, substances like drugs and explosives. It goes without saying that, as with sniffer dogs, the use of artificial sniffer devices raises many sensitive issues. Adopting an ethical and legal perspective, the present paper discusses the privacy and data protection implications of the possible deployment of a hand-held body scanning sniffer for screening passengers at EU airport security checkpoints.

  4. Increased intrinsic mitochondrial function in humans with mitochondrial haplogroup H

    DEFF Research Database (Denmark)

    Larsen, Steen; Díez-Sánchez, Carmen; Rabøl, Rasmus

    2014-01-01

    and determined their mitochondrial haplogroup, mitochondrial oxidative phosphorylation capacity (OXPHOS), mitochondrial content (citrate synthase (CS)) and VO2max. Intrinsic mitochondrial function is calculated as mitochondrial OXPHOS capacity divided by mitochondrial content (CS). Haplogroup H showed a 30......% higher intrinsic mitochondrial function compared with the other haplo group U. There was no relationship between haplogroups and VO2max. In skeletal muscle from men with mitochondrial haplogroup H, an increased intrinsic mitochondrial function is present....

  5. The action of fast neutrons on Walker tumor chromatin in rats treated with thiotepa and lomustine cytostatics and with estradiol hormone

    International Nuclear Information System (INIS)

    Radu, L.; Constantinescu, B.; Gostian, O.

    1994-01-01

    Wistar rats bearing Walker carcinosarcoma were treated with thiotepa (1 mg) and lomustine (3 mg) cytostatics and with each of these cytostatics associated with estradiol hormone (0.15 mg). The extracted chromatins were subjected to fast neutrons (d(13 MeV)+Be thick target) at 30-100 Gy doses. The parameters estimated at chromatin samples were: the tyrosine and tryptophan intrinsic fluorescence, the fluorescence of chromatin - ethidium bromide complexes and thermal transition. A different and specific susceptibility to fast neutrons was observed in treated chromatin samples, when compared with controls. The chromatin acidic proteins destruction was greater in the case of estradiol - thiotepa association. (Author)

  6. Elderly Taiwanese's Intrinsic Risk Factors for Fall-related Injuries

    Directory of Open Access Journals (Sweden)

    In-Fun Li

    2016-09-01

    Conclusion: Elderly Taiwanese inpatients with existing intrinsic conditions of cancer, vertigo, and lower leg weakness were at high risk of falling, resulting in severe injuries. Additional research including controlled trials is necessary to further identify treatable, causal intrinsic risk factors for this elderly group.

  7. IEC-based neutron generator for security inspection system

    International Nuclear Information System (INIS)

    Miley, G.H.; Wu, L.; Kim, H.J.

    2005-01-01

    Use of a combined X-ray and neutron source for security inspections based on Inertial Electrostatic Confinement (IEC) fusion is discussed. Current inspection systems typically use X-ray techniques, but thermal neutron analysis (TNA) and fast neutron analysis (FNA), allow expanded detection of certain types of explosives. The integrated unit proposed here uses three separate IEC sources producing 14 and 2.45 MeV neutrons plus soft X-rays. This combination allows multiple detection methods with the composite signal analysis being done by a fuzzy logic system, significantly reducing false signals. (author)

  8. Physics of Intrinsic Rotation in Flux-Driven ITG Turbulence

    International Nuclear Information System (INIS)

    Ku, S.; Abiteboul, J.; Dimond, P.H.; Dif-Pradalier, G.; Kwon, J.M.; Sarazin, Y.; Hahm, T.S.; Garbet, X.; Chang, C.S.; Latu, G.; Yoon, E.S.; Ghendrih, Ph.; Yi, S.; Strugarek, A.; Solomon, W.; Grandgirard, V.

    2012-01-01

    Global, heat flux-driven ITG gyrokinetic simulations which manifest the formation of macroscopic, mean toroidal flow profiles with peak thermal Mach number 0.05, are reported. Both a particle-in-cell (XGC1p) and a semi-Lagrangian (GYSELA) approach are utilized without a priori assumptions of scale-separation between turbulence and mean fields. Flux-driven ITG simulations with different edge flow boundary conditions show in both approaches the development of net unidirectional intrinsic rotation in the co-current direction. Intrinsic torque is shown to scale approximately linearly with the inverse scale length of the ion temperature gradient. External momentum input is shown to effectively cancel the intrinsic rotation profile, thus confirming the existence of a local residual stress and intrinsic torque. Fluctuation intensity, intrinsic torque and mean flow are demonstrated to develop inwards from the boundary. The measured correlations between residual stress and two fluctuation spectrum symmetry breakers, namely E x B shear and intensity gradient, are similar. Avalanches of (positive) heat flux, which propagate either outwards or inwards, are correlated with avalanches of (negative) parallel momentum flux, so that outward transport of heat and inward transport of parallel momentum are correlated and mediated by avalanches. The probability distribution functions of the outward heat flux and the inward momentum flux show strong structural similarity

  9. Investigation of intrinsic toroidal rotation scaling in KSTAR

    Science.gov (United States)

    Yoo, J. W.; Lee, S. G.; Ko, S. H.; Seol, J.; Lee, H. H.; Kim, J. H.

    2017-07-01

    The behaviors of an intrinsic toroidal rotation without any external momentum sources are investigated in KSTAR. In these experiments, pure ohmic discharges with a wide range of plasma parameters are carefully selected and analyzed to speculate an unrevealed origin of toroidal rotation excluding any unnecessary heating sources, magnetic perturbations, and strong magneto-hydrodynamic activities. The measured core toroidal rotation in KSTAR is mostly in the counter-current direction and its magnitude strongly depends on the ion temperature divided by plasma current (Ti/IP). Especially the core toroidal rotation in the steady-state is well fitted by Ti/IP scaling with a slope of ˜-23, and the possible explanation of the scaling is compared with various candidates. As a result, the calculated offset rotation could not explain the measured core toroidal rotation since KSTAR has an extremely low intrinsic error field. For the stability conditions for ion and electron turbulences, it is hard to determine a dominant turbulence mode in this study. In addition, the intrinsic toroidal rotation level in ITER is estimated based on the KSTAR scaling since the intrinsic rotation plays an important role in stabilizing resistive wall modes for future reference.

  10. Intrinsically Passive Handling and Grasping

    NARCIS (Netherlands)

    Stramigioli, Stefano; Scherpen, Jacquelien M.A.; Khodabandehloo, Koorosh

    2000-01-01

    The paper presents a control philosophy called Intrinsically Passive Control, which has the feature to properly behave during interaction with any passive objects. The controlled robot will never become unstable due to the physical structure of the controller.

  11. When fast is better: protein folding fundamentals and mechanisms from ultrafast approaches.

    Science.gov (United States)

    Muñoz, Victor; Cerminara, Michele

    2016-09-01

    Protein folding research stalled for decades because conventional experiments indicated that proteins fold slowly and in single strokes, whereas theory predicted a complex interplay between dynamics and energetics resulting in myriad microscopic pathways. Ultrafast kinetic methods turned the field upside down by providing the means to probe fundamental aspects of folding, test theoretical predictions and benchmark simulations. Accordingly, experimentalists could measure the timescales for all relevant folding motions, determine the folding speed limit and confirm that folding barriers are entropic bottlenecks. Moreover, a catalogue of proteins that fold extremely fast (microseconds) could be identified. Such fast-folding proteins cross shallow free energy barriers or fold downhill, and thus unfold with minimal co-operativity (gradually). A new generation of thermodynamic methods has exploited this property to map folding landscapes, interaction networks and mechanisms at nearly atomic resolution. In parallel, modern molecular dynamics simulations have finally reached the timescales required to watch fast-folding proteins fold and unfold in silico All of these findings have buttressed the fundamentals of protein folding predicted by theory, and are now offering the first glimpses at the underlying mechanisms. Fast folding appears to also have functional implications as recent results connect downhill folding with intrinsically disordered proteins, their complex binding modes and ability to moonlight. These connections suggest that the coupling between downhill (un)folding and binding enables such protein domains to operate analogically as conformational rheostats. © 2016 The Author(s).

  12. Development of a fresh plutonium fuel container for a prototype fast breeder reactor

    International Nuclear Information System (INIS)

    Ohtake, T.; Takahashi, S.; Mishima, T.; Kurakami, J.; Yamamoto, Y.; Ohuchi, Y.

    1989-01-01

    Japan gives a good deal of encouragement to development of a fast breeder reactor (which is considered as the most likely candidate for nuclear power generation) to secure long-term energy source. And, following an experimental fast breeder reactor Joyo, a prototype fast breeder reactor Monju is now under vigorous construction. Related to development of the prototype fast breeder reactor, it is necessary and important to develop transport container which is used for transporting fresh fuel assemblies from Plutonium Fuel Production Facility to the Monju power plant. Therefore, the container is now being developed by Power Reactor and Nuclear Fuel Development Corporation (PNC). Currently, shipment and vibration tests, handling performance tests, shielding performance tests and prototype container tests are executed with prototype containers fabricated according to a final design, in order to experimentally confirm soundness of transport container and its contents, and propriety of design technique. This paper describes the summary of general specifications and structures of this container and the summary of preliminary safety analysis of package

  13. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  14. A series of intrinsically chiral gold nanocage structures.

    Science.gov (United States)

    Liu, X J; Hamilton, I P

    2017-07-27

    We present a series of intrinsically chiral gold nanocage structures, Au 9n+6 , which are stable for n ≥ 2. These structures consist of an Au 9n tube which is capped with Au 3 units at each end. Removing the Au 3 caps, we obtain a series of intrinsically chiral gold nanotube structures, Au 9n , which are stable for n ≥ 4. The intrinsic chirality of these structures results from the helicity of the gold strands which form the tube and not because an individual Au atom is a chiral center. The symmetry of these structures is C 3 and substructures of gold hexagons with a gold atom in the middle are particularly prominent. We focus on the properties of Au 42 (C 3 ) and Au 105 (C 3 ) which are the two smallest gold nanocage structures to be completely tiled by these Au 7 "golden-eye" substructures. Our main focus is on Au 42 (C 3 ) since gold clusters in the 40-50 atom regime are currently being investigated in gas phase experiments. We show that the intrinsically chiral Au 42 cage structure is energetically comparable with previously reported achiral cage and compact Au 42 structures. Cage structures are of particular interest because species can be encapsulated (and stabilized) inside the cage and we provide strong evidence that Au 6 @Au 42 (C 3 ) is the global minimum Au 48 structure. The intrinsically chiral gold nanocage structures, which exhibit a range of size-related properties, have potential applications in chiral catalysis and as components in nanostructured devices.

  15. New Ways to Determine Plant Nutrient Deficiences Using Fast Spectroscopy

    DEFF Research Database (Denmark)

    van Maarschalkerweerd, Marie

    In a global perspective, the agricultural sector is right now facing its biggest challenge ever. The world population is rapidly increasing, and food production has to grow at the same, or higher, speed to be able to feed everyone. At the same time, the effect on environmental and natural resources...... must be limited. Over-fertilization must be stopped to secure aquatic environments and to reduce greenhouse gas emissions, caused by production and use of inorganic fertilizers. For production of P fertilizer, furthermore a non-renewable natural resource is used, which is expected to be exhausted...... for soil and plant analysis are described and the usability of each technique is discussed. Focus is put particularly on the newest methods for plant analysis based on fast spectroscopy, such as visual and near-infrared (Vis-NIR) reflectance and chlorophyll a fluorescence. These methods enable easy, fast...

  16. Exploiting intrinsic fluctuations to identify model parameters.

    Science.gov (United States)

    Zimmer, Christoph; Sahle, Sven; Pahle, Jürgen

    2015-04-01

    Parameterisation of kinetic models plays a central role in computational systems biology. Besides the lack of experimental data of high enough quality, some of the biggest challenges here are identification issues. Model parameters can be structurally non-identifiable because of functional relationships. Noise in measured data is usually considered to be a nuisance for parameter estimation. However, it turns out that intrinsic fluctuations in particle numbers can make parameters identifiable that were previously non-identifiable. The authors present a method to identify model parameters that are structurally non-identifiable in a deterministic framework. The method takes time course recordings of biochemical systems in steady state or transient state as input. Often a functional relationship between parameters presents itself by a one-dimensional manifold in parameter space containing parameter sets of optimal goodness. Although the system's behaviour cannot be distinguished on this manifold in a deterministic framework it might be distinguishable in a stochastic modelling framework. Their method exploits this by using an objective function that includes a measure for fluctuations in particle numbers. They show on three example models, immigration-death, gene expression and Epo-EpoReceptor interaction, that this resolves the non-identifiability even in the case of measurement noise with known amplitude. The method is applied to partially observed recordings of biochemical systems with measurement noise. It is simple to implement and it is usually very fast to compute. This optimisation can be realised in a classical or Bayesian fashion.

  17. Diffusion in Intrinsic and Highly Doped III-V Semiconductors

    CERN Multimedia

    Stolwijk, N

    2002-01-01

    %title\\\\ \\\\Diffusion plays a key role in the fabrication of semiconductor devices. The diffusion of atoms in crystals is mediated by intrinsic point defects. Investigations of the diffusion behaviour of self- and solute atoms on the Ga sublattice of gallium arsenide led to the conclusion that in intrinsic and n-type material charged Ga vacancies are involved in diffusion processes whereas in p-type material diffusion if governed by charged Ga self-interstitials. Concerning the As sublattice of gallium arsenide there is a severe lack of reliable diffusion data. The few available literature data on intrinsic GaAs are not mutually consistent. A systematic study of the doping dependence of diffusion is completely missing. The most basic diffusion process - self-diffusion of As and its temperature and doping dependence - is practically not known. For GaP a similar statement holds.\\\\ \\\\The aim of the present project is to perform a systematic diffusion study of As diffusion in intrinsic and doped GaAs and in GaP. P...

  18. Neighborhood fast food availability and fast food consumption.

    Science.gov (United States)

    Oexle, Nathalie; Barnes, Timothy L; Blake, Christine E; Bell, Bethany A; Liese, Angela D

    2015-09-01

    Recent nutritional and public health research has focused on how the availability of various types of food in a person's immediate area or neighborhood influences his or her food choices and eating habits. It has been theorized that people living in areas with a wealth of unhealthy fast-food options may show higher levels of fast-food consumption, a factor that often coincides with being overweight or obese. However, measuring food availability in a particular area is difficult to achieve consistently: there may be differences in the strict physical locations of food options as compared to how individuals perceive their personal food availability, and various studies may use either one or both of these measures. The aim of this study was to evaluate the association between weekly fast-food consumption and both a person's perceived availability of fast-food and an objective measure of fast-food presence - Geographic Information Systems (GIS) - within that person's neighborhood. A randomly selected population-based sample of eight counties in South Carolina was used to conduct a cross-sectional telephone survey assessing self-report fast-food consumption and perceived availability of fast food. GIS was used to determine the actual number of fast-food outlets within each participant's neighborhood. Using multinomial logistic regression analyses, we found that neither perceived availability nor GIS-based presence of fast-food was significantly associated with weekly fast-food consumption. Our findings indicate that availability might not be the dominant factor influencing fast-food consumption. We recommend using subjective availability measures and considering individual characteristics that could influence both perceived availability of fast food and its impact on fast-food consumption. If replicated, our findings suggest that interventions aimed at reducing fast-food consumption by limiting neighborhood fast-food availability might not be completely effective

  19. Serum Lipid Profile: Fasting or Non-fasting?

    OpenAIRE

    Nigam, P. K.

    2010-01-01

    Serum lipid profile has now become almost a routine test. It is usually done in fasting state due to certain limitations in non-fasting serum sample. In the recent past efforts have been made to simplify blood sampling by replacing fasting lipid profile with non-fasting lipid profile. However, fasting specimen is preferred if cardiovascular risk assessment is based on total cholesterol, LDL cholesterol or non-HDL cholesterol. A lot has yet to be done in this area. Till then we have to believe...

  20. Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography

    International Nuclear Information System (INIS)

    Branciard, Cyril; Gisin, Nicolas; Scarani, Valerio

    2008-01-01

    The differential-phase-shift (DPS) and the coherent-one-way (COW) are among the most practical protocols for quantum cryptography, and are therefore the object of fast-paced experimental developments. The assessment of their security is also a challenge for theorists: the existing tools, that allow to prove security against the most general attacks, do not apply to these two protocols in any straightforward way. We present new upper bounds for their security in the limit of large distances (d∼>50 km with typical values in optical fibers) by considering a large class of collective attacks, namely those in which the adversary attaches ancillary quantum systems to each pulse or to each pair of pulses. We introduce also two modified versions of the COW protocol, which may prove more robust than the original one

  1. INTRINSIC AND EXTRINSIC MOTIVATION - AN INVESTIGATION OF PERFORMANCE CORRELATION

    Directory of Open Access Journals (Sweden)

    Abrudan Maria-Madela

    2011-07-01

    Full Text Available A series of research untaken in the last decade have revealed some interesting aspects regarding the effects of different types of motivation on performance. Among the researchers who have shown interest in this field we can number: Richard Ryan, Edward Deci, Sam Glucksberg, Dan Ariely, Robert Eisenhower, Linda Shanock, analysts from London School of Economics, and others. Their findings suggest that extrinsic incentives may have a negative impact on overall performance, but a general agreement in this respect has not been reached. In this paper we intend to shed some light upon the relationship between intrinsic and extrinsic motivation and performance. Experts define intrinsic motivation as being the execution of a task or activity because of the inherent satisfaction arising from it rather than due to some separate outcome. In contrast with intrinsic motivation, we speak of extrinsic motivation whenever an activity is done in order to attain some separable outcome. With the purpose of contributing to the clarification of the links between concepts, we initiated and conducted an explanatory research. The research is based on the analysis of the relations between the results obtained by third year students and their predominant type of motivation. For this, we formulated and tested four work hypotheses using a combination of quantitative methods (investigation and qualitative methods (focus group. After the validation of the questionnaires, the respondents were divided into four categories: intrinsically motivated, extrinsically motivated, both intrinsically and extrinsically motivated and unmotivated. To analyze the collected data, we made use of Excel and SPSS. Some of the primary conclusions of the research are as follows: as the average increases, the percent of individuals having both extrinsic and intrinsic motivation is decreasing; the highest percentage of unmotivated students is concentrated in the highest average category; Female

  2. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  3. Functional anthology of intrinsic disorder. 3. Ligands, post-translational modifications, and diseases associated with intrinsically disordered proteins.

    Science.gov (United States)

    Xie, Hongbo; Vucetic, Slobodan; Iakoucheva, Lilia M; Oldfield, Christopher J; Dunker, A Keith; Obradovic, Zoran; Uversky, Vladimir N

    2007-05-01

    Currently, the understanding of the relationships between function, amino acid sequence, and protein structure continues to represent one of the major challenges of the modern protein science. As many as 50% of eukaryotic proteins are likely to contain functionally important long disordered regions. Many proteins are wholly disordered but still possess numerous biologically important functions. However, the number of experimentally confirmed disordered proteins with known biological functions is substantially smaller than their actual number in nature. Therefore, there is a crucial need for novel bionformatics approaches that allow projection of the current knowledge from a few experimentally verified examples to much larger groups of known and potential proteins. The elaboration of a bioinformatics tool for the analysis of functional diversity of intrinsically disordered proteins and application of this data mining tool to >200 000 proteins from the Swiss-Prot database, each annotated with at least one of the 875 functional keywords, was described in the first paper of this series (Xie, H.; Vucetic, S.; Iakoucheva, L. M.; Oldfield, C. J.; Dunker, A. K.; Obradovic, Z.; Uversky, V.N. Functional anthology of intrinsic disorder. 1. Biological processes and functions of proteins with long disordered regions. J. Proteome Res. 2007, 5, 1882-1898). Using this tool, we have found that out of the 710 Swiss-Prot functional keywords associated with at least 20 proteins, 262 were strongly positively correlated with long intrinsically disordered regions, and 302 were strongly negatively correlated. Illustrative examples of functional disorder or order were found for the vast majority of keywords showing strongest positive or negative correlation with intrinsic disorder, respectively. Some 80 Swiss-Prot keywords associated with disorder- and order-driven biological processes and protein functions were described in the first paper (see above). The second paper of the series was

  4. Intrinsic Risk Factors of Falls in Elderly

    Directory of Open Access Journals (Sweden)

    Yasmin Amatullah

    2016-09-01

    Full Text Available Background: Falls are common geriatric problems. The risk factors of falls are the intrinsic and extrinsic risk factors. Studies on falls are scarcely conducted in Indonesia, especially in Bandung. Therefore, this study was conducted to identify the intrinsic risk factors of falls among elderly. Methods: A descriptive study was carried out from August to October 2013 at the Geriatric Clinic of Dr. Hasan Sadikin General Hospital Bandung. Fifty three participants were selected according to the inclusion and exclusion criteria using consecutive sampling. The determined variables in this study were classification of the risk of falls, demographic profile, history of falls, disease, and medications. After the selection, the participants were tested by Timed up-and-go test (TUGT. Moreover, an interview and analysis of medical records were carried out to discover the risk factors of falls. The collected data were analyzed and presented in the form of percentages shown in tables. Results: From 53 patients, women (35.66% were considered to have higher risk of fall than men (18.34%. The majority of patients (66% with the risk of fall were from the age group 60–74 years. The major diseases suffered by patients were hypertension, osteoarthritis and diabetes mellitus. Drugs that were widely used were antihypertensive drugs; analgesic and antipyretic drugs and antidiabetic drugs. Conclusions: There are various intrinsic risk factors of falls in elderly and each of the elderly has more than one intrinsic risk factor of falls.

  5. College Student Intrinsic and/or Extrinsic Motivation and Learning.

    Science.gov (United States)

    Lin, Yi-Guang; McKeachie, Wilbert J.

    This paper investigates the joint effects of intrinsic and extrinsic goals on college students' learning in an introductory psychology course, a biology course, and several social science courses. The study questioned whether higher levels of motivation lead to better student performance. College students were surveyed using the Intrinsic Goal…

  6. Intrinsic and Extrinsic Motivation for Stereotypic and Repetitive Behavior

    Science.gov (United States)

    Joosten, Annette V.; Bundy, Anita C.; Einfeld, Stewart L.

    2009-01-01

    This study provides evidence for intrinsic and extrinsic motivators for stereotypical and repetitive behavior in children with autism and intellectual disability and children with intellectual disability alone. We modified the Motivation Assessment Scale (MAS) (1988b); dividing it into intrinsic and extrinsic measures and adding items to assess…

  7. Leadership style and employees' intrinsic job satisfaction in the ...

    African Journals Online (AJOL)

    This study investigates the impact of leadership style on employees' intrinsic job satisfaction in the Cross River State Newspaper Corporation, Calabar, Nigeria. The study examined the problem of dissatisfaction in the work place as far as intrinsic factors of job satisfaction are concerned. Structured questionnaire was used ...

  8. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  9. Characterization of FBK SiPMs under illumination with very fast light pulses

    Energy Technology Data Exchange (ETDEWEB)

    Tarolli, A., E-mail: tarolli@fbk.e [Fondazione Bruno Kessler (FBK), Trento (Italy); Dalla Betta, G.-F. [University of Trento and INFN, Trento (Italy); Melchiorri, M.; Piazza, A.; Pancheri, L.; Piemonte, C.; Zorzi, N. [Fondazione Bruno Kessler (FBK), Trento (Italy)

    2010-05-21

    A characterization of the response of SiPMs and SPADs produced at FBK-IRST Trento stimulated with fast laser pulses is presented. The tests were aimed at studying both the intrinsic timing proprieties (of SiPMs and SPADs) using the time-correlated single-photon counting technique and the dynamic range (of SiPMs). Measurements were carried out on devices with different cell size, namely, from 40x40 to 100x100 {mu}m{sup 2}. Concerning the timing resolution, all the devices exhibit a value less than 150 psec FWHM. The dynamic range of SiPMs shows a response linearity which is in line with the theory describing these devices.

  10. Characterization of FBK SiPMs under illumination with very fast light pulses

    International Nuclear Information System (INIS)

    Tarolli, A.; Dalla Betta, G.-F.; Melchiorri, M.; Piazza, A.; Pancheri, L.; Piemonte, C.; Zorzi, N.

    2010-01-01

    A characterization of the response of SiPMs and SPADs produced at FBK-IRST Trento stimulated with fast laser pulses is presented. The tests were aimed at studying both the intrinsic timing proprieties (of SiPMs and SPADs) using the time-correlated single-photon counting technique and the dynamic range (of SiPMs). Measurements were carried out on devices with different cell size, namely, from 40x40 to 100x100 μm 2 . Concerning the timing resolution, all the devices exhibit a value less than 150 psec FWHM. The dynamic range of SiPMs shows a response linearity which is in line with the theory describing these devices.

  11. Extrinsic and intrinsic blood supply to the optic chiasm.

    Science.gov (United States)

    Salaud, Céline; Ploteau, Stéphane; Blery, Pauline; Pilet, Paul; Armstrong, Olivier; Hamel, Antoine

    2018-04-01

    Although there have been many studies of the arterial cerebral blood supply, only seven have described the optic chiasm (OC) blood supply and their results are contradictory. The aim of this study was to analyze the extrinsic and intrinsic OC blood supply on cadaveric specimens using dissections and microcomputer tomography (Micro-CT). Thirteen human specimens were dissected and the internal or common carotid arteries were injected with red latex, China Ink with gelatin or barium sulfate. Three Micro-CTs were obtained to reveal the intrinsic blood supply to the OC. The superior hypophyseal arteries (SupHypA) (13/13) and posterior communicating artery (PCoA) (12/13) supplied the pial network on the inferior side of the OC. The first segment of the anterior cerebral artery (ACA) (10/10), SupHypA (7/10), the anterior communicating artery (ACoA) (9/10), and PComA (1/10) supplied the pial network of its superior side. The intrinsic OC blood supply was divided into three networks (two lateral and one central). Capillaries entering the OC originated principally from the inferior pial network. The lateral network capillaries had the same orientation as the visual lateral pathways, but the central network was not correlated with the nasal fibers crossing into the OC. There was no anastomosis in the pial or intrinsic networks. Only SupHypA, PCoA, ACoA, and ACA were involved in the OC blood supply. Because there was no extrinsic or intrinsic anastomosis, all arteries should be preserved. Tumor compression of the inferior intrinsic arterial network could contribute to visual defects. Clin. Anat. 31:432-440, 2018. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  12. Intrinsic cardiac nervous system in tachycardia induced heart failure.

    Science.gov (United States)

    Arora, Rakesh C; Cardinal, Rene; Smith, Frank M; Ardell, Jeffrey L; Dell'Italia, Louis J; Armour, J Andrew

    2003-11-01

    The purpose of this study was to test the hypothesis that early-stage heart failure differentially affects the intrinsic cardiac nervous system's capacity to regulate cardiac function. After 2 wk of rapid ventricular pacing in nine anesthetized canines, cardiac and right atrial neuronal function were evaluated in situ in response to enhanced cardiac sensory inputs, stimulation of extracardiac autonomic efferent neuronal inputs, and close coronary arterial administration of neurochemicals that included nicotine. Right atrial neuronal intracellular electrophysiological properties were then evaluated in vitro in response to synaptic activation and nicotine. Intrinsic cardiac nicotine-sensitive, neuronally induced cardiac responses were also evaluated in eight sham-operated, unpaced animals. Two weeks of rapid ventricular pacing reduced the cardiac index by 54%. Intrinsic cardiac neurons of paced hearts maintained their cardiac mechano- and chemosensory transduction properties in vivo. They also responded normally to sympathetic and parasympathetic preganglionic efferent neuronal inputs, as well as to locally administered alpha-or beta-adrenergic agonists or angiotensin II. The dose of nicotine needed to modify intrinsic cardiac neurons was 50 times greater in failure compared with normal preparations. That dose failed to alter monitored cardiovascular indexes in failing preparations. Phasic and accommodating neurons identified in vitro displayed altered intracellular membrane properties compared with control, including decreased membrane resistance, indicative of reduced excitability. Early-stage heart failure differentially affects the intrinsic cardiac nervous system's capacity to regulate cardiodynamics. While maintaining its capacity to transduce cardiac mechano- and chemosensory inputs, as well as inputs from extracardiac autonomic efferent neurons, intrinsic cardiac nicotine-sensitive, local-circuit neurons differentially remodel such that their capacity to

  13. Quantifying intrinsic and extrinsic variability in stochastic gene expression models.

    Science.gov (United States)

    Singh, Abhyudai; Soltani, Mohammad

    2013-01-01

    Genetically identical cell populations exhibit considerable intercellular variation in the level of a given protein or mRNA. Both intrinsic and extrinsic sources of noise drive this variability in gene expression. More specifically, extrinsic noise is the expression variability that arises from cell-to-cell differences in cell-specific factors such as enzyme levels, cell size and cell cycle stage. In contrast, intrinsic noise is the expression variability that is not accounted for by extrinsic noise, and typically arises from the inherent stochastic nature of biochemical processes. Two-color reporter experiments are employed to decompose expression variability into its intrinsic and extrinsic noise components. Analytical formulas for intrinsic and extrinsic noise are derived for a class of stochastic gene expression models, where variations in cell-specific factors cause fluctuations in model parameters, in particular, transcription and/or translation rate fluctuations. Assuming mRNA production occurs in random bursts, transcription rate is represented by either the burst frequency (how often the bursts occur) or the burst size (number of mRNAs produced in each burst). Our analysis shows that fluctuations in the transcription burst frequency enhance extrinsic noise but do not affect the intrinsic noise. On the contrary, fluctuations in the transcription burst size or mRNA translation rate dramatically increase both intrinsic and extrinsic noise components. Interestingly, simultaneous fluctuations in transcription and translation rates arising from randomness in ATP abundance can decrease intrinsic noise measured in a two-color reporter assay. Finally, we discuss how these formulas can be combined with single-cell gene expression data from two-color reporter experiments for estimating model parameters.

  14. Comprehensive large-scale assessment of intrinsic protein disorder.

    Science.gov (United States)

    Walsh, Ian; Giollo, Manuel; Di Domenico, Tomás; Ferrari, Carlo; Zimmermann, Olav; Tosatto, Silvio C E

    2015-01-15

    Intrinsically disordered regions are key for the function of numerous proteins. Due to the difficulties in experimental disorder characterization, many computational predictors have been developed with various disorder flavors. Their performance is generally measured on small sets mainly from experimentally solved structures, e.g. Protein Data Bank (PDB) chains. MobiDB has only recently started to collect disorder annotations from multiple experimental structures. MobiDB annotates disorder for UniProt sequences, allowing us to conduct the first large-scale assessment of fast disorder predictors on 25 833 different sequences with X-ray crystallographic structures. In addition to a comprehensive ranking of predictors, this analysis produced the following interesting observations. (i) The predictors cluster according to their disorder definition, with a consensus giving more confidence. (ii) Previous assessments appear over-reliant on data annotated at the PDB chain level and performance is lower on entire UniProt sequences. (iii) Long disordered regions are harder to predict. (iv) Depending on the structural and functional types of the proteins, differences in prediction performance of up to 10% are observed. The datasets are available from Web site at URL: http://mobidb.bio.unipd.it/lsd. Supplementary data are available at Bioinformatics online. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  15. Intrinsic viscosity of a suspension of cubes

    KAUST Repository

    Mallavajula, Rajesh K.

    2013-11-06

    We report on the viscosity of a dilute suspension of cube-shaped particles. Irrespective of the particle size, size distribution, and surface chemistry, we find empirically that cubes manifest an intrinsic viscosity [η]=3.1±0.2, which is substantially higher than the well-known value for spheres, [η]=2.5. The orientation-dependent intrinsic viscosity of cubic particles is determined theoretically using a finite-element solution of the Stokes equations. For isotropically oriented cubes, these calculations show [η]=3.1, in excellent agreement with our experimental observations. © 2013 American Physical Society.

  16. Intrinsic and Extrinsic Motivations: Classic Definitions and New Directions.

    Science.gov (United States)

    Ryan; Deci

    2000-01-01

    Intrinsic and extrinsic types of motivation have been widely studied, and the distinction between them has shed important light on both developmental and educational practices. In this review we revisit the classic definitions of intrinsic and extrinsic motivation in light of contemporary research and theory. Intrinsic motivation remains an important construct, reflecting the natural human propensity to learn and assimilate. However, extrinsic motivation is argued to vary considerably in its relative autonomy and thus can either reflect external control or true self-regulation. The relations of both classes of motives to basic human needs for autonomy, competence and relatedness are discussed. Copyright 2000 Academic Press.

  17. Beyond job security and money: driving factors of motivation for government doctors in India.

    Science.gov (United States)

    Purohit, Bhaskar; Bandyopadhyay, Tathagata

    2014-02-21

    Despite many efforts from government to address the shortage of medical officers (MOs) in rural areas, rural health centres continue to suffer from severe shortage of MOs. Lack of motivation to join and continue service in rural areas is a major reason for such shortage. In the present study, we aimed to assess and rank the driving factors of motivation important for in-service MOs in their current job. The study participants included ninety two in-service government MOs from three states in India. The study participants were required to rank 14 factors of motivation important for them in their current job. The factors for the study were selected using Herzberg's two-factor theory of motivation and the data were collected using an instrument that has an established reliability and validity. Test of Kendall's coefficient of concordance (W) was carried out to assess the agreement in ranks assigned by participants to various motivation factors. Next, we studied the distributions of ranks of different motivating factors using standard descriptive statistics and box plots, which gave us interesting insights into the strength of agreement of the MOs in assigning ranks to various factors. And finally to assess whether MOs are more intrinsically motivated or extrinsically motivated, we used Kolmogorov-Smirnov test. The (W) test indicated statistically significant (P factors than to extrinsic factors. The study results indicate that job security was the most important factor related to motivation, closely followed by interesting work and respect and recognition. Among the top five preferred factors, three were intrinsic factors indicating a great importance given by MOs to factors beyond money and job security. To address the issue of motivation, the health departments need to pay close attention to devising management strategies that address not only extrinsic but also intrinsic factors of motivation. The study results may be useful to understand the complicated issue of

  18. Incentives and intrinsic motivation in healthcare

    Directory of Open Access Journals (Sweden)

    Mikel Berdud

    2016-11-01

    Conclusions: The conclusions could act as a guide to support the optimal design of incentive policies and schemes within health organisations when healthcare professionals are intrinsically motivated.

  19. A security architecture for interconnecting health information systems.

    Science.gov (United States)

    Gritzalis, Dimitris; Lambrinoudakis, Costas

    2004-03-31

    Several hereditary and other chronic diseases necessitate continuous and complicated health care procedures, typically offered in different, often distant, health care units. Inevitably, the medical records of patients suffering from such diseases become complex, grow in size very fast and are scattered all over the units involved in the care process, hindering communication of information between health care professionals. Web-based electronic medical records have been recently proposed as the solution to the above problem, facilitating the interconnection of the health care units in the sense that health care professionals can now access the complete medical record of the patient, even if it is distributed in several remote units. However, by allowing users to access information from virtually anywhere, the universe of ineligible people who may attempt to harm the system is dramatically expanded, thus severely complicating the design and implementation of a secure environment. This paper presents a security architecture that has been mainly designed for providing authentication and authorization services in web-based distributed systems. The architecture has been based on a role-based access scheme and on the implementation of an intelligent security agent per site (i.e. health care unit). This intelligent security agent: (a). authenticates the users, local or remote, that can access the local resources; (b). assigns, through temporary certificates, access privileges to the authenticated users in accordance to their role; and (c). communicates to other sites (through the respective security agents) information about the local users that may need to access information stored in other sites, as well as about local resources that can be accessed remotely.

  20. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  1. Evaluating the attractiveness of nuclear material for proliferation-resistance and nuclear security

    International Nuclear Information System (INIS)

    Choi, Jor-Shan; Ikegame, Kou; Kuno, Yusuke

    2011-01-01

    The attractiveness of nuclear material, defined as a function of the isotopic composition of the nuclear material in formulas expressing the material's intrinsic properties, is of considerably debate in recent developments of proliferation-resistance measures of a nuclear energy system. A reason for such debate arises from the fact that the concept of nuclear material attractiveness can be confusing because the desirability of a material for nuclear explosive use depends on many tangible and intangible factors including the intent and capability of the adversary. In addition, a material that is unattractive to an advanced nation (in the case of proliferation) may be very attractive to a terrorist (in the case of physical protection and nuclear security). Hence, the concept of 'Nuclear Material Attractiveness' for different nuclear materials must be considered in the context of safeguards and security. The development of a ranking scheme on the attractiveness of nuclear materials could be a useful concept to start-off the strategies for safeguards and security on a new footing (i.e., why and how nuclear material is attractive, and what are the quantifiable basis). Japan may benefit from such concept regarding the attractiveness of nuclear materials when recovering nuclear materials from the damaged cores in Fukushima because safety, security, and safeguards (3S) would be a prominent consideration for the recovery operation, and it would be the first time such operation is performed in a non-nuclear weapons state. (author)

  2. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  3. Perceived Motivational Climate as a Predictor of Intrinsic Motivation in Medical Students

    Directory of Open Access Journals (Sweden)

    Saiideh Norouzi

    2016-06-01

    Full Text Available Introduction: Motivational climate is the situational structure of goals through which success or failure is judged in the social environment. This study aimed at examining the relationship between perceived motivational climate and intrinsic motivation of medical students. It was hypothesized that perceived mastery climate predicted medical students’ intrinsic motivation positively and perceived performance climate predicted it negatively. Methods: The design was a cross-sectional study. The Iranian version of two instruments for measuring intrinsic motivation and perceived motivational climate were completed by 232 medical students. In order to identify the predictability relationship between the research variables, structure equation modeling was adopted. Results: Investigations revealed that perceived mastery climate positively and meaningfully predicted medical students’ intrinsic motivation (0/85. Perceived performance climate negatively predicted medical students’ intrinsic motivation (-0/47. Conclusion: Building mastery climate in a learning environment promotes medicine students’ intrinsic motivation.

  4. Design and implementation of modular home security system with short messaging system

    Directory of Open Access Journals (Sweden)

    Budijono Santoso

    2014-03-01

    Full Text Available Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home. It is therefore the purpose of this design to provide home security device, which send fast information to user GSM (Global System for Mobile mobile device using SMS (Short Messaging System and also activate - deactivate system by SMS. The Modular design of this Home Security System make expandable their capability by add more sensors on that system. Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive Infra Red motion sensor as the primary sensor for motion detection, camera for capturing images, GSM module for sending and receiving SMS and buzzer for alarm. For software this system using Arduino IDE for Arduino and Putty for testing connection programming in GSM module. This Home Security System can monitor home area that surrounding by PIR sensor and sending SMS, save images capture by camera, and make people panic by turn on the buzzer when trespassing surrounding area that detected by PIR sensor. The Modular Home Security System has been tested and succeed detect human movement.

  5. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  6. Food security, wheat production and policy in South Africa: Reflections on food sustainability and challenges for a market economy

    Directory of Open Access Journals (Sweden)

    Francois de Wet

    2018-01-01

    Full Text Available The traditional concept of security has broadened over the past decades. Food security in South Africa is an imperative for human and non-human survival. In the contemporary political economy, there is a real nexus between globalisation, exploitation, the state, scarcity of resources, the market, peoples’ need to feel secure, notions of state responsibility and food production. Political economy and human security in theoretical debates and face-to-face politics are intrinsically linked. The notion of a ‘secure community’ changed. Food security and the right to quality living became a social imperative. Understanding current agricultural economics requires the ability to link security and access to food for all. In this case study, wheat production in South Africa is addressed against the interface of the global and the local including South Africa’s transition to a democratic and constitutional state with a Bill of Rights. The current security approach represents a more comprehensive understanding of what security is meant to be and include, amongst others, housing security, medical security, service delivery and food security, as set out in the Millennium Development Goals and the subsequent Sustainable Development Goals. The issue of food security is addressed here with particular reference to wheat production, related current government policies and the market economy. The authors chose to limit their socio-economic focus to a specific sector of the agricultural market, namely wheat, rather than discuss food security in South Africa in general. Wheat was chosen as a unit of analysis because as a crop, wheat used in bread is one of the staples for the majority of South Africans and given the current negative economic developments, wheat as a staple is likely to remain integral, if not increasing its status of dependability

  7. Intrinsic motivation as a predictor of work outcome after vocational rehabilitation in schizophrenia.

    Science.gov (United States)

    Saperstein, Alice M; Fiszdon, Joanna M; Bell, Morris D

    2011-09-01

    Intrinsic motivation is a construct commonly used in explaining goal-directed behavior. In people with schizophrenia, intrinsic motivation is usually subsumed as a feature of negative symptoms or underlying neurocognitive dysfunction. A growing literature reflects an interest in defining and measuring motivational impairment in schizophrenia and in delineating the specific role of intrinsic motivation as both an independent predictor and a mediator of psychosocial functioning. This cross-sectional study examined intrinsic motivation as a predictor of vocational outcomes for 145 individuals with schizophrenia and schizoaffective disorder participating in a 6-month work rehabilitation trial. Correlation and mediation analyses examined baseline intrinsic motivation and negative symptoms in relation to work hours and work performance. Data support a significant relationship between intrinsic motivation and negative symptoms and significant correlations with outcome variables, such that lower negative symptoms and greater intrinsic motivation were associated with better work functioning. Moreover, in this sample, intrinsic motivation fully mediated the relationships between negative symptoms, work productivity, and work performance. These results have significant implications on the design of work rehabilitation interventions for people with schizophrenia and support a role for targeting intrinsic motivation directly to influence vocational functioning. Future directions for research and intervention are discussed.

  8. Human phoneme recognition depending on speech-intrinsic variability.

    Science.gov (United States)

    Meyer, Bernd T; Jürgens, Tim; Wesker, Thorsten; Brand, Thomas; Kollmeier, Birger

    2010-11-01

    The influence of different sources of speech-intrinsic variation (speaking rate, effort, style and dialect or accent) on human speech perception was investigated. In listening experiments with 16 listeners, confusions of consonant-vowel-consonant (CVC) and vowel-consonant-vowel (VCV) sounds in speech-weighted noise were analyzed. Experiments were based on the OLLO logatome speech database, which was designed for a man-machine comparison. It contains utterances spoken by 50 speakers from five dialect/accent regions and covers several intrinsic variations. By comparing results depending on intrinsic and extrinsic variations (i.e., different levels of masking noise), the degradation induced by variabilities can be expressed in terms of the SNR. The spectral level distance between the respective speech segment and the long-term spectrum of the masking noise was found to be a good predictor for recognition rates, while phoneme confusions were influenced by the distance to spectrally close phonemes. An analysis based on transmitted information of articulatory features showed that voicing and manner of articulation are comparatively robust cues in the presence of intrinsic variations, whereas the coding of place is more degraded. The database and detailed results have been made available for comparisons between human speech recognition (HSR) and automatic speech recognizers (ASR).

  9. Social categories as markers of intrinsic interpersonal obligations.

    Science.gov (United States)

    Rhodes, Marjorie; Chalik, Lisa

    2013-06-01

    Social categorization is an early-developing feature of human social cognition, yet the role that social categories play in children's understanding of and predictions about human behavior has been unclear. In the studies reported here, we tested whether a foundational functional role of social categories is to mark people as intrinsically obligated to one another (e.g., obligated to protect rather than harm). In three studies, children (aged 3-9, N = 124) viewed only within-category harm as violating intrinsic obligations; in contrast, they viewed between-category harm as violating extrinsic obligations defined by explicit rules. These data indicate that children view social categories as marking patterns of intrinsic interpersonal obligations, suggesting that a key function of social categories is to support inferences about how people will relate to members of their own and other groups.

  10. Fast and simple high-capacity quantum cryptography with error detection.

    Science.gov (United States)

    Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Zhang, Jun; Pan, Lei; Li, Shudong; Orgun, Mehmet A

    2017-04-13

    Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth.

  11. Fast and simple high-capacity quantum cryptography with error detection

    Science.gov (United States)

    Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Zhang, Jun; Pan, Lei; Li, Shudong; Orgun, Mehmet A.

    2017-04-01

    Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth.

  12. Intrinsic and extrinsic motivation among adolescent ten-pin bowlers in kuala lumpur, malaysia.

    Science.gov (United States)

    Teo, Eng-Wah; Khoo, Selina; Wong, Rebecca; Wee, Eng-Hoe; Lim, Boon-Hooi; Rengasamy, Shabesan Sit

    2015-03-29

    Motivation has long been associated with sports engagement. However, to date no research has been performed to understand the domain of motivation among ten-pin bowlers. The purpose of this study was to investigate different types of motivation (i.e., intrinsic vs. extrinsic) based on self-determination theory from the perspective of gender and the bowler type (competitive vs. casual). A total of 240 bowlers (104 male, 136 female; 152 competitive, 88 casual) with a mean age of 16.61 ± 0.78 years were recruited in Kuala Lumpur. The Sport Motivation Scale, a 28-item self-report questionnaire measuring seven subscales (i.e., intrinsic motivation to know, intrinsic motivation to accomplish, intrinsic motivation to experience stimulation, extrinsic motivation to identify regulation, extrinsic motivation for introjection regulation, extrinsic motivation to external regulation, and amotivation) was administered. Results showed significant differences (t=10.43, df=239, p=0.01) between total scores of intrinsic and extrinsic motivation among ten-pin bowlers. There were significant gender differences with respect to intrinsic motivation to know, intrinsic motivation to accomplish, intrinsic motivation to experience stimulation, and extrinsic motivation to identify regulation. However, no significant bowler type differences were found for either the intrinsic (t=-1.15, df=238, p=0.25) or extrinsic (t=-0.51, df=238, p=0.61) motivation dimensions. In conclusion, our study demonstrated substantial intrinsic motivation for gender effects, but no bowler type effects among adolescent ten-pin bowlers.

  13. Intrinsic and Extrinsic Motivation Among Adolescent Ten-Pin Bowlers in Kuala Lumpur, Malaysia

    Directory of Open Access Journals (Sweden)

    Teo Eng-Wah

    2015-03-01

    Full Text Available Motivation has long been associated with sports engagement. However, to date no research has been performed to understand the domain of motivation among ten-pin bowlers. The purpose of this study was to investigate different types of motivation (i.e., intrinsic vs. extrinsic based on self-determination theory from the perspective of gender and the bowler type (competitive vs. casual. A total of 240 bowlers (104 male, 136 female; 152 competitive, 88 casual with a mean age of 16.61 ± 0.78 years were recruited in Kuala Lumpur. The Sport Motivation Scale, a 28-item self-report questionnaire measuring seven subscales (i.e., intrinsic motivation to know, intrinsic motivation to accomplish, intrinsic motivation to experience stimulation, extrinsic motivation to identify regulation, extrinsic motivation for introjection regulation, extrinsic motivation to external regulation, and amotivation was administered. Results showed significant differences (t=10.43, df=239, p=0.01 between total scores of intrinsic and extrinsic motivation among tenpin bowlers. There were significant gender differences with respect to intrinsic motivation to know, intrinsic motivation to accomplish, intrinsic motivation to experience stimulation, and extrinsic motivation to identify regulation. However, no significant bowler type differences were found for either the intrinsic (t=-1.15, df=238, p=0.25 or extrinsic (t=-0.51, df=238, p=0.61 motivation dimensions. In conclusion, our study demonstrated substantial intrinsic motivation for gender effects, but no bowler type effects among adolescent ten-pin bowlers.

  14. Intrinsic and Extrinsic Motivation Among Adolescent Ten-Pin Bowlers in Kuala Lumpur, Malaysia

    Science.gov (United States)

    Teo, Eng-Wah; Khoo, Selina; Wong, Rebecca; Wee, Eng-Hoe; Lim, Boon-Hooi; Rengasamy, Shabesan Sit

    2015-01-01

    Motivation has long been associated with sports engagement. However, to date no research has been performed to understand the domain of motivation among ten-pin bowlers. The purpose of this study was to investigate different types of motivation (i.e., intrinsic vs. extrinsic) based on self-determination theory from the perspective of gender and the bowler type (competitive vs. casual). A total of 240 bowlers (104 male, 136 female; 152 competitive, 88 casual) with a mean age of 16.61 ± 0.78 years were recruited in Kuala Lumpur. The Sport Motivation Scale, a 28-item self-report questionnaire measuring seven subscales (i.e., intrinsic motivation to know, intrinsic motivation to accomplish, intrinsic motivation to experience stimulation, extrinsic motivation to identify regulation, extrinsic motivation for introjection regulation, extrinsic motivation to external regulation, and amotivation) was administered. Results showed significant differences (t=10.43, df=239, p=0.01) between total scores of intrinsic and extrinsic motivation among ten-pin bowlers. There were significant gender differences with respect to intrinsic motivation to know, intrinsic motivation to accomplish, intrinsic motivation to experience stimulation, and extrinsic motivation to identify regulation. However, no significant bowler type differences were found for either the intrinsic (t=−1.15, df=238, p=0.25) or extrinsic (t=−0.51, df=238, p=0.61) motivation dimensions. In conclusion, our study demonstrated substantial intrinsic motivation for gender effects, but no bowler type effects among adolescent ten-pin bowlers. PMID:25964827

  15. THE LIMITED EFFECT OF COINCIDENT ORIENTATION ON THE CHOICE OF INTRINSIC AXIS (.).

    Science.gov (United States)

    Li, Jing; Su, Wei

    2015-06-01

    The allocentric system computes and represents general object-to-object spatial relationships to provide a spatial frame of reference other than the egocentric system. The intrinsic frame-of-reference system theory, which suggests people learn the locations of objects based upon an intrinsic axis, is important in research about the allocentric system. The purpose of the current study was to determine whether the effect of coincident orientation on the choice of intrinsic axis was limited. Two groups of participants (24 men, 24 women; M age = 24 yr., SD = 2) encoded different spatial layouts in which the objects shared the coincident orientation of 315° and 225° separately at learning perspective (0°). The response pattern of partial-scene-recognition task following learning reflected different strategies for choosing the intrinsic axis under different conditions. Under the 315° object-orientation condition, the objects' coincident orientation was as important as the symmetric axis in the choice of the intrinsic axis. However, participants were more likely to choose the symmetric axis as the intrinsic axis under the 225° object-orientation condition. The results suggest the effect of coincident orientation on the choice of intrinsic axis is limited.

  16. Securing XML Documents

    Directory of Open Access Journals (Sweden)

    Charles Shoniregun

    2004-11-01

    Full Text Available XML (extensible markup language is becoming the current standard for establishing interoperability on the Web. XML data are self-descriptive and syntax-extensible; this makes it very suitable for representation and exchange of semi-structured data, and allows users to define new elements for their specific applications. As a result, the number of documents incorporating this standard is continuously increasing over the Web. The processing of XML documents may require a traversal of all document structure and therefore, the cost could be very high. A strong demand for a means of efficient and effective XML processing has posed a new challenge for the database world. This paper discusses a fast and efficient indexing technique for XML documents, and introduces the XML graph numbering scheme. It can be used for indexing and securing graph structure of XML documents. This technique provides an efficient method to speed up XML data processing. Furthermore, the paper explores the classification of existing methods impact of query processing, and indexing.

  17. Evaluating whether nature's intrinsic value is an axiom of or anathema to conservation.

    Science.gov (United States)

    Vucetich, John A; Bruskotter, Jeremy T; Nelson, Michael Paul

    2015-04-01

    That at least some aspects of nature possess intrinsic value is considered by some an axiom of conservation. Others consider nature's intrinsic value superfluous or anathema. This range of views among mainstream conservation professionals potentially threatens the foundation of conservation. One challenge in resolving this disparity is that disparaging portrayals of nature's intrinsic value appear rooted in misconceptions and unfounded presumptions about what it means to acknowledge nature's intrinsic value. That acknowledgment has been characterized as vacuous, misanthropic, of little practical consequence to conservation, adequately accommodated by economic valuation, and not widely accepted in society. We reviewed the philosophical basis for nature's intrinsic value and the implications for acknowledging that value. Our analysis is rooted to the notion that when something possesses intrinsic value it deserves to be treated with respect for what it is, with concern for its welfare or in a just manner. From this basis, one can only conclude that nature's intrinsic value is not a vacuous concept or adequately accommodated by economic valuation. Acknowledging nature's intrinsic value is not misanthropic because concern for nature's welfare (aside from its influence on human welfare) does not in any way preclude also being concerned for human welfare. The practical import of acknowledging nature's intrinsic value rises from recognizing all the objects of conservation concern (e.g., many endangered species) that offer little benefit to human welfare. Sociological and cultural evidence indicates the belief that at least some elements of nature possess intrinsic value is widespread in society. Our reasoning suggests the appropriateness of rejecting the assertion that nature's intrinsic value is anathema to conservation and accepting its role as an axiom. © 2015 Society for Conservation Biology.

  18. A hierarchy of intrinsic timescales across primate cortex.

    Science.gov (United States)

    Murray, John D; Bernacchia, Alberto; Freedman, David J; Romo, Ranulfo; Wallis, Jonathan D; Cai, Xinying; Padoa-Schioppa, Camillo; Pasternak, Tatiana; Seo, Hyojung; Lee, Daeyeol; Wang, Xiao-Jing

    2014-12-01

    Specialization and hierarchy are organizing principles for primate cortex, yet there is little direct evidence for how cortical areas are specialized in the temporal domain. We measured timescales of intrinsic fluctuations in spiking activity across areas and found a hierarchical ordering, with sensory and prefrontal areas exhibiting shorter and longer timescales, respectively. On the basis of our findings, we suggest that intrinsic timescales reflect areal specialization for task-relevant computations over multiple temporal ranges.

  19. The intrinsic shape of bulges in the CALIFA survey

    Science.gov (United States)

    Costantin, L.; Méndez-Abreu, J.; Corsini, E. M.; Eliche-Moral, M. C.; Tapia, T.; Morelli, L.; Dalla Bontà, E.; Pizzella, A.

    2018-02-01

    Context. The intrinsic shape of galactic bulges in nearby galaxies provides crucial information to separate bulge types. Aims: We aim to derive accurate constraints to the intrinsic shape of bulges to provide new clues on their formation mechanisms and set new limitations for future simulations. Methods: We retrieved the intrinsic shape of a sample of CALIFA bulges using a statistical approach. Taking advantage of GalMer numerical simulations of binary mergers we estimated the reliability of the procedure. Analyzing the i-band mock images of resulting lenticular remnants, we studied the intrinsic shape of their bulges at different galaxy inclinations. Finally, we introduced a new (B/A, C/A) diagram to analyze possible correlations between the intrinsic shape and the properties of bulges. Results: We tested the method on simulated lenticular remnants, finding that for galaxies with inclinations of 25° ≤ θ ≤ 65° we can safely derive the intrinsic shape of their bulges. We found that our CALIFA bulges tend to be nearly oblate systems (66%), with a smaller fraction of prolate spheroids (19%), and triaxial ellipsoids (15%). The majority of triaxial bulges are in barred galaxies (75%). Moreover, we found that bulges with low Sérsic indices or in galaxies with low bulge-to-total luminosity ratios form a heterogeneous class of objects; additionally, bulges in late-type galaxies or in less massive galaxies have no preference for being oblate, prolate, or triaxial. On the contrary, bulges with high Sérsic index, in early-type galaxies, or in more massive galaxies are mostly oblate systems. Conclusions: We concluded that various evolutionary pathways may coexist in galaxies, with merging events and dissipative collapse being the main mechanisms driving the formation of the most massive oblate bulges and bar evolution reshaping the less massive triaxial bulges.

  20. Models for intrinsic and extrinsic elastico and plastico-mechanoluminescence of solids

    Energy Technology Data Exchange (ETDEWEB)

    Chandra, V.K. [Department of Electrical and Electronics Engineering, Chhatrapati Shivaji Institute of Technology, Shivaji Nagar, Kolihapuri, Durg, Chhattisgarh-491001 (India); Chandra, B.P., E-mail: bpchandra4@yahoo.co.in [Department of Postgraduate Studies and Research in Physics and Electronics, Rani Durgavati, University, Jabalpur, Madhya Pradesh-482001 (India); Jha, Piyush [Department of Postgraduate Studies and Research in Physics and Electronics, Rani Durgavati, University, Jabalpur, Madhya Pradesh-482001 (India)

    2013-06-15

    A large number of solids exhibit extrinsic elastico–mechanoluminescence (ML) and extrinsic plastico ML, only a few solids exhibit intrinsic elastico ML and intrinsic plastico ML. Whereas the elastico ML and plastico ML of a large number of solids are caused by the electron trapping and electron bombardment mechanisms, the elastico ML and plastico ML of only a few solids are caused by the chemiluminescence and other mechanisms. The elastico ML of rare earth doped strontium aluminate, rare earth doped strontium silicates and certain other crystals is so intense that it can be seen in day light with naked eye. For a long time, the detection of luminescence of metals was considered to be impossible; however, now-a-days, it has been found that the intrinsic ML in certain metals can be produced by their plastic deformation at fast rate. In an ultraviolet-irradiated CdS single crystal immersed in liquid nitrogen, the intrinsic elastico ML resembling edge emission can be produced simply by tapping it along its c-axis. Of the order of a 1000 flashes may be obtained from a well-stimulated crystal by tapping more or less uniformly over the whole surface. After the stimulation is exhausted, the crystal can be re-activated by a brief ultraviolet illumination, and the process of obtaining multiple flashes by tapping can be repeated. The spectra of the plastico ML of certain non-irradiated alkali halide crystals resemble the plastico ML spectra of the corresponding X- or γ-irradiated crystals. Such result can be understood on the basis of the formation of F-centres and hole centres during the intersection of the forest of immobile and mobile dislocations. Depending on the prevailing conditions, either the continuous plastico ML or pulsed plastico ML is observed in II–VI semiconductors and in certain non-irradiated alkali halide crystals. Whereas the spectra of elastico ML resemble the solid state luminescence spectra, depending on the solids the spectra of plastico ML

  1. Models for intrinsic and extrinsic elastico and plastico-mechanoluminescence of solids

    International Nuclear Information System (INIS)

    Chandra, V.K.; Chandra, B.P.; Jha, Piyush

    2013-01-01

    A large number of solids exhibit extrinsic elastico–mechanoluminescence (ML) and extrinsic plastico ML, only a few solids exhibit intrinsic elastico ML and intrinsic plastico ML. Whereas the elastico ML and plastico ML of a large number of solids are caused by the electron trapping and electron bombardment mechanisms, the elastico ML and plastico ML of only a few solids are caused by the chemiluminescence and other mechanisms. The elastico ML of rare earth doped strontium aluminate, rare earth doped strontium silicates and certain other crystals is so intense that it can be seen in day light with naked eye. For a long time, the detection of luminescence of metals was considered to be impossible; however, now-a-days, it has been found that the intrinsic ML in certain metals can be produced by their plastic deformation at fast rate. In an ultraviolet-irradiated CdS single crystal immersed in liquid nitrogen, the intrinsic elastico ML resembling edge emission can be produced simply by tapping it along its c-axis. Of the order of a 1000 flashes may be obtained from a well-stimulated crystal by tapping more or less uniformly over the whole surface. After the stimulation is exhausted, the crystal can be re-activated by a brief ultraviolet illumination, and the process of obtaining multiple flashes by tapping can be repeated. The spectra of the plastico ML of certain non-irradiated alkali halide crystals resemble the plastico ML spectra of the corresponding X- or γ-irradiated crystals. Such result can be understood on the basis of the formation of F-centres and hole centres during the intersection of the forest of immobile and mobile dislocations. Depending on the prevailing conditions, either the continuous plastico ML or pulsed plastico ML is observed in II–VI semiconductors and in certain non-irradiated alkali halide crystals. Whereas the spectra of elastico ML resemble the solid state luminescence spectra, depending on the solids the spectra of plastico ML

  2. Intrinsic honesty and the prevalence of rule violations across societies.

    Science.gov (United States)

    Gächter, Simon; Schulz, Jonathan F

    2016-03-24

    Deception is common in nature and humans are no exception. Modern societies have created institutions to control cheating, but many situations remain where only intrinsic honesty keeps people from cheating and violating rules. Psychological, sociological and economic theories suggest causal pathways to explain how the prevalence of rule violations in people's social environment, such as corruption, tax evasion or political fraud, can compromise individual intrinsic honesty. Here we present cross-societal experiments from 23 countries around the world that demonstrate a robust link between the prevalence of rule violations and intrinsic honesty. We developed an index of the 'prevalence of rule violations' (PRV) based on country-level data from the year 2003 of corruption, tax evasion and fraudulent politics. We measured intrinsic honesty in an anonymous die-rolling experiment. We conducted the experiments with 2,568 young participants (students) who, due to their young age in 2003, could not have influenced PRV in 2003. We find individual intrinsic honesty is stronger in the subject pools of low PRV countries than those of high PRV countries. The details of lying patterns support psychological theories of honesty. The results are consistent with theories of the cultural co-evolution of institutions and values, and show that weak institutions and cultural legacies that generate rule violations not only have direct adverse economic consequences, but might also impair individual intrinsic honesty that is crucial for the smooth functioning of society.

  3. Neural Basis of Intrinsic Motivation: Evidence from Event-Related Potentials.

    Science.gov (United States)

    Jin, Jia; Yu, Liping; Ma, Qingguo

    2015-01-01

    Human intrinsic motivation is of great importance in human behavior. However, although researchers have focused on this topic for decades, its neural basis was still unclear. The current study employed event-related potentials to investigate the neural disparity between an interesting stop-watch (SW) task and a boring watch-stop task (WS) to understand the neural mechanisms of intrinsic motivation. Our data showed that, in the cue priming stage, the cue of the SW task elicited smaller N2 amplitude than that of the WS task. Furthermore, in the outcome feedback stage, the outcome of the SW task induced smaller FRN amplitude and larger P300 amplitude than that of the WS task. These results suggested that human intrinsic motivation did exist and that it can be detected at the neural level. Furthermore, intrinsic motivation could be quantitatively indexed by the amplitude of ERP components, such as N2, FRN, and P300, in the cue priming stage or feedback stage. Quantitative measurements would also be convenient for intrinsic motivation to be added as a candidate social factor in the construction of a machine learning model.

  4. Semisupervised Support Vector Machines With Tangent Space Intrinsic Manifold Regularization.

    Science.gov (United States)

    Sun, Shiliang; Xie, Xijiong

    2016-09-01

    Semisupervised learning has been an active research topic in machine learning and data mining. One main reason is that labeling examples is expensive and time-consuming, while there are large numbers of unlabeled examples available in many practical problems. So far, Laplacian regularization has been widely used in semisupervised learning. In this paper, we propose a new regularization method called tangent space intrinsic manifold regularization. It is intrinsic to data manifold and favors linear functions on the manifold. Fundamental elements involved in the formulation of the regularization are local tangent space representations, which are estimated by local principal component analysis, and the connections that relate adjacent tangent spaces. Simultaneously, we explore its application to semisupervised classification and propose two new learning algorithms called tangent space intrinsic manifold regularized support vector machines (TiSVMs) and tangent space intrinsic manifold regularized twin SVMs (TiTSVMs). They effectively integrate the tangent space intrinsic manifold regularization consideration. The optimization of TiSVMs can be solved by a standard quadratic programming, while the optimization of TiTSVMs can be solved by a pair of standard quadratic programmings. The experimental results of semisupervised classification problems show the effectiveness of the proposed semisupervised learning algorithms.

  5. Intrinsic rewards and work engagement in the South African retail industry

    Directory of Open Access Journals (Sweden)

    Sara Jacobs

    2014-11-01

    Research purpose: The purpose of this research was to determine whether there is a relationship between intrinsic rewards and work engagement in the South African retail industry. Furthermore, it sought to validate an instrument to measure intrinsic rewards within the South African context. Motivation for the study: There is currently a paucity of research exploring intrinsic rewards, specifically their importance for work engagement. Furthermore, there is a lack of instruments validated in South Africa that can be used to measure intrinsic rewards. Research approach, design and method: This quantitative study was conducted using a cross-sectional design and non-probability sampling of 181 employees from a South African retail organisation. The questionnaire included a demographic section, the Utrecht Work Engagement Scale and the Work Engagement Profile. Main findings: Statistically significant, positive relationships were found between all subscales of the two instruments. There were significant differences in the means for intrinsic rewards and work engagement for gender and age. Notably, the exploratory factor analysis for both instruments did not support the factor structure indicated in the literature. Practical/managerial implications: South African retail organisations should create work environments that provide intrinsic rewards as part of their reward package, to encourage work engagement. Contribution/value-add: These findings add to the current body of literature regarding intrinsic rewards and work engagement and provide insight into variables that promote work engagement within the South African retail context.

  6. Representing Spatial Layout According to Intrinsic Frames of Reference.

    Science.gov (United States)

    Xie, Chaoxiang; Li, Shiyi; Tao, Weidong; Wei, Yiping; Sun, Hong-Jin

    2017-01-01

    Mou and McNamara have suggested that object locations are represented according to intrinsic reference frames. In three experiments, we investigated the limitations of intrinsic reference frames as a mean to represent object locations in spatial memory. Participants learned the locations of seven or eight common objects in a rectangular room and then made judgments of relative direction based on their memory of the layout. The results of all experiments showed that when all objects were positioned regularly, judgments of relative direction were faster or more accurate for novel headings that were aligned with the primary intrinsic structure than for other novel headings; however, when one irregularly positioned object was added to the layout, this advantage was eliminated. The experiments further indicated that with a single view at study, participants could represent the layout from either an egocentric orientation or a different orientation, according to experimental instructions. Together, these results suggest that environmental reference frames and intrinsic axes can influence performance for novel headings, but their role in spatial memory depends on egocentric experience, layout regularity, and instructions.

  7. Binding of intrinsic and extrinsic features in working memory.

    Science.gov (United States)

    Ecker, Ullrich K H; Maybery, Murray; Zimmer, Hubert D

    2013-02-01

    There is ongoing debate concerning the mechanisms of feature binding in working memory. In particular, there is controversy regarding the extent to which these binding processes are automatic. The present article demonstrates that binding mechanisms differ depending on whether the to-be-integrated features are perceived as forming a coherent object. We presented a series of experiments that investigated the binding of color and shape, whereby color was either an intrinsic feature of the shape or an extrinsic feature of the shape's background. Results show that intrinsic color affected shape recognition, even when it was incidentally studied and irrelevant for the recognition task. In contrast, extrinsic color did not affect shape recognition, even when the association of color and shape was encoded and retrievable on demand. This strongly suggests that binding of intrinsic intra-item information but not extrinsic contextual information is obligatory in visual working memory. We highlight links to perception as well as implicit and explicit long-term memory, which suggest that the intrinsic-extrinsic dimension is a principle relevant to multiple domains of human cognition. 2013 APA, all rights reserved

  8. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  9. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  10. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  11. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  12. Development of a LaBr3(Ce Fast-timing Array for FAIR

    Directory of Open Access Journals (Sweden)

    Roberts O.J.

    2013-12-01

    Full Text Available A γ-ray spectrometer with fast-timing capabilities, constructed of LaBr3(Ce:5% detectors, is under development for use at the future Facility for Anti-proton and Ion Research (FAIR. The physics aims of this device are to measure the half-lives of excited states in the region of ~50 ps to several ns, in exotic nuclei. Monte-Carlo simulations using the GEANT4 software package have determined the final design of this fast-timing array by calculating the full-energy peak efficiencies of several different detector geometries. The results of the simulated efficiencies for each configuration were used to calculate the timing precision. Consequently, an array of thirty six, ø3.8×5.1 cm cylindrical crystals was found to be the optimum configuration. The detectors were purchased and subsequently characterised, with each detector found to have intrinsic energy and timing resolutions of ~ 2.8 % (FWHM and ~ 210 ps (FWHM for the 1173 and 1332 keV decays from 60Co.

  13. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  14. The Fast-Casual Conundrum: Fast-Casual Restaurant Entrées Are Higher in Calories than Fast Food.

    Science.gov (United States)

    Schoffman, Danielle E; Davidson, Charis R; Hales, Sarah B; Crimarco, Anthony E; Dahl, Alicia A; Turner-McGrievy, Gabrielle M

    2016-10-01

    Frequently eating fast food has been associated with consuming a diet high in calories, and there is a public perception that fast-casual restaurants (eg, Chipotle) are healthier than traditional fast food (eg, McDonald's). However, research has not examined whether fast-food entrées and fast-casual entrées differ in calorie content. The purpose of this study was to determine whether the caloric content of entrées at fast-food restaurants differed from that found at fast-casual restaurants. This study was a cross-sectional analysis of secondary data. Calorie information from 2014 for lunch and dinner entrées for fast-food and fast-casual restaurants was downloaded from the MenuStat database. Mean calories per entrée between fast-food restaurants and fast-casual restaurants and the proportion of restaurant entrées that fell into different calorie ranges were assessed. A t test was conducted to test the hypothesis that there was no difference between the average calories per entrée at fast-food and fast-casual restaurants. To examine the difference in distribution of entrées in different calorie ranges between fast-food and fast-casual restaurants, χ(2) tests were used. There were 34 fast-food and 28 fast-casual restaurants included in the analysis (n=3,193 entrées). Fast-casual entrées had significantly more calories per entrée (760±301 kcal) than fast-food entrées (561±268; Prestaurants to determine whether the energy content or nutrient density of full meals (ie, entrées with sides and drinks) differs between fast-casual restaurants and fast-food restaurants. Calorie-conscious consumers should consider the calorie content of entrée items before purchase, regardless of restaurant type. Copyright © 2016 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.

  15. Guideline of Cyber Security Policy for Digital I and C Systems in Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Zeen; Kim, Jang Seong; Kim, Kwang Jo [Information and Communications University, Daejeon (Korea, Republic of); Kang, Young Doo; Kim, Dai Il; Jeong, Choong Heui [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2007-10-15

    Recently computers and communication systems have been developed very fast and applied to various areas in many applications. This development has raised new vulnerabilities that may endanger the critical systems for nuclear safety and physical protection at the facilities. In order to protect the critical infrastructures from these new cyber attacks, we clearly need deep considerations on the risks and threats through the cyberspace. Based on these needs, many organizations which related to nuclear power plants suggested various cyber security protection methods based on regulation or technical safeguard. Even if security countermeasures against various cyber attacks are important, it is required to establish the best practices of cyber security policy by the vendor and licensee. Based on the policy they can evaluate their activities against various cyber attacks throughout the whole life cycle. In this paper, we discuss how to establish the cyber security policy for digital instrumentation and control (I and C) systems in nuclear power plants.

  16. Guideline of Cyber Security Policy for Digital I and C Systems in Nuclear Power Plant

    International Nuclear Information System (INIS)

    Kim, Zeen; Kim, Jang Seong; Kim, Kwang Jo; Kang, Young Doo; Kim, Dai Il; Jeong, Choong Heui

    2007-01-01

    Recently computers and communication systems have been developed very fast and applied to various areas in many applications. This development has raised new vulnerabilities that may endanger the critical systems for nuclear safety and physical protection at the facilities. In order to protect the critical infrastructures from these new cyber attacks, we clearly need deep considerations on the risks and threats through the cyberspace. Based on these needs, many organizations which related to nuclear power plants suggested various cyber security protection methods based on regulation or technical safeguard. Even if security countermeasures against various cyber attacks are important, it is required to establish the best practices of cyber security policy by the vendor and licensee. Based on the policy they can evaluate their activities against various cyber attacks throughout the whole life cycle. In this paper, we discuss how to establish the cyber security policy for digital instrumentation and control (I and C) systems in nuclear power plants

  17. Intrinsic motivation, neurocognition and psychosocial functioning in schizophrenia: testing mediator and moderator effects.

    Science.gov (United States)

    Nakagami, Eri; Xie, Bin; Hoe, Maanse; Brekke, John S

    2008-10-01

    This study examined the nature of the relationships among neurocognition, intrinsic motivation, and psychosocial functioning for persons with schizophrenia. Hypotheses concerning both mediator and moderator mechanisms were tested. 120 individuals diagnosed with schizophrenia were recruited as they entered outpatient psychosocial rehabilitation programs. Measures of psychosocial functioning and intrinsic motivation were administered at baseline. Measures of neurocognition were administered at baseline by testers blind to scores on other study variables. Data were analyzed using latent construct modeling to test for mediator and moderator effects. There were strong bivariate relationships between neurocognition, intrinsic motivation, and psychosocial functioning. The results demonstrated that intrinsic motivation strongly mediated the relationship between neurocognition and psychosocial functioning. This mediation was evidenced by: (i) the direct path from neurocognition to functional outcome no longer being statistically significant after the introduction of motivation into the model, (ii) the statistical significance of the indirect path from neurocognition through motivation to functional outcome. There was no support for the two moderation hypotheses: the level of neurocognition did not influence the relationship between intrinsic motivation and psychosocial functioning, nor did the level of intrinsic motivation influence the relationship between neurocognition and psychosocial functioning. Neurocognition influences psychosocial functioning through its relationship with intrinsic motivation. Intrinsic motivation is a critical mechanism for explaining the relationship between neurocognition and psychosocial functioning. Implications for the theoretical understanding and psychosocial treatment of intrinsic motivation in schizophrenia are discussed.

  18. On intrinsic and extrinsic origin of plasmon peaks

    International Nuclear Information System (INIS)

    Takayama, Shoichi; Kawai, Jun

    2008-01-01

    The origin of the plasmon loss peaks in X-ray photoelectron spectra are discussed based on the (1) intrinsic, (2) extrinsic, (3) quantum interference between (1) and (2), and (4) mixture of (1) and (2). It was believed that the major part of plasmon was due to the extrinsic, the present analysis concludes the major part is intrinsic, depending the excitation energy. This analysis is based on the electron reflection spectra, but valid for X-ray photoelectron spectra. (author)

  19. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  20. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  1. Determination of Viscosity-Average Molecular Weight of Chitosan using Intrinsic Viscosity Measurement

    International Nuclear Information System (INIS)

    Norzita Yacob; Norhashidah Talip; Maznah Mahmud

    2011-01-01

    Molecular weight of chitosan can be determined by different techniques such as Gel Permeation Chromatography (GPC), Static Light Scattering (SLS) and intrinsic viscosity measurement. Determination of molecular weight by intrinsic viscosity measurement is a simple method for characterization of chitosan. Different concentrations of chitosan were prepared and measurement was done at room temperature. The flow time data was used to calculate the intrinsic viscosity by extrapolating the reduced viscosity to zero concentration. The value of intrinsic viscosity was then recalculated into the viscosity-average molecular weight using Mark-Houwink equation. (author)

  2. Ecological Divergence and the Origins of Intrinsic Postmating Isolation with Gene Flow

    Directory of Open Access Journals (Sweden)

    Aneil F. Agrawal

    2011-01-01

    Full Text Available The evolution of intrinsic postmating isolation has received much attention, both historically and in recent studies of speciation genes. Intrinsic isolation often stems from between-locus genetic incompatibilities, where alleles that function well within species are incompatible with one another when brought together in the genome of a hybrid. It can be difficult for such incompatibilities to originate when populations diverge with gene flow, because deleterious genotypic combinations will be created and then purged by selection. However, it has been argued that if genes underlying incompatibilities are themselves subject to divergent selection, then they might overcome gene flow to diverge between populations, resulting in the origin of incompatibilities. Nonetheless, there has been little explicit mathematical exploration of such scenarios for the origin of intrinsic incompatibilities during ecological speciation with gene flow. Here we explore theoretical models for the origin of intrinsic isolation where genes subject to divergent natural selection also affect intrinsic isolation, either directly or via linkage disequilibrium with other loci. Such genes indeed overcome gene flow, diverge between populations, and thus result in the evolution of intrinsic isolation. We also examine barriers to neutral gene flow. Surprisingly, we find that intrinsic isolation sometimes weakens this barrier, by impeding differentiation via ecologically based divergent selection.

  3. Pragmatic security metrics applying metametrics to information security

    CERN Document Server

    Brotby, W Krag

    2013-01-01

    Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to

  4. The Role of Intrinsic Motivations in Attention Allocation and Shifting

    Directory of Open Access Journals (Sweden)

    Dario edi Nocera

    2014-04-01

    Full Text Available The concepts of attention and intrinsic motivations are of great interest within adaptive robotic systems, and can be exploited in order to guide, activate, and coordinate multiple concurrent behaviors. Attention allocation strategies represent key capabilities of human beings, which are strictly connected with action selection and execution mechanisms, while intrinsic motivations directly affect the allocation of attentional resources. In this paper we propose a model of Reinforcement Learning (RL, where both these capabilities are involved. RL is deployed to learn how to allocate attentional resources in a behavior-based robotic system, while action selection is obtained as a side effect of the resulting motivated attentional behaviors. Moreover, the influence of intrinsic motivations in attention orientation is obtained by introducing rewards associated with curiosity drives. In this way, the learning process is affected not only by goal-specific rewards, but also by intrinsic motivations.

  5. Steady state security assessment in deregulated power systems

    Science.gov (United States)

    Manjure, Durgesh Padmakar

    outcome of the analysis. Also considering the large number of transactions occurring in the power market, and the massive sizes of transmission networks, the need for efficient analysis techniques is further highlighted. Thus on the whole, for present-day power systems, security assessment has acquired predominant importance. The primary emphasis of the work done in this dissertation is on development of techniques for fast assessment of the state of the transmission network following credible contingencies in traditional and deregulated power systems. In addition, methodologies for optimal correction strategies in the event of violation of security limits are also proposed. The work done can be enumerated as: (1) development of fast methods to assess the state of the transmission network from the point of view of loading margin and power flows, following increased loading conditions and line outages; (2) development of a comprehensive scheme to assess the impact of bilateral transactions on the operating state of the network; (3) optimal rescheduling of generation and curtailable loads for relieving the system of congestion and simultaneously maximizing the security margins.

  6. Fast determination of plasma parameters through function parametrization

    International Nuclear Information System (INIS)

    Braams, B.J.; Jilge, W.; Lackner, K.

    1985-09-01

    The method of function parametrization, developed by H. Wind for fast data evaluation in high energy physics, is demonstrated in the context of controlled fusion research. This method relies on a statistical analysis of a large data base of simulated experiments in order to obtain a functional representation for intrinsic physical parameters of a system in terms of the values of the measurements. Rapid determination of characteristic equilibrium parameters of a tokamak discharge is shown to be a particularly indicated application. The method is employed on the ASDEX experiment to determine the following parameters of the plasma: position of the magnetic axis, geometric center, and current center; minor radius, elongation, and area of the plasma column; a normalized safety factor at the plasma boundary; the Shafranov parameter βsub(p)+lsub(i)/2; the flux difference between the plasma boundary and an external reference value; the position of the lower and upper saddle points, and the intersections of the separatrix with the four divertor plates. The relevant measurements consist of three differential poloidal flux measurements, four poloidal field measurements, the current through the multipole shaping coils, and the total plasma current. Function parametrization supplies a very accurate interpretation of these data, which is now used for online data analysis, and is also sufficiently fast to be suitable for real-time control of the plasma. (orig.)

  7. Intrinsic Motivation in Physical Education

    Science.gov (United States)

    Davies, Benjamin; Nambiar, Nathan; Hemphill, Caroline; Devietti, Elizabeth; Massengale, Alexandra; McCredie, Patrick

    2015-01-01

    This article describes ways in which educators can use Harter's perceived competence motivation theory, the achievement goal theory, and self-determination theory to develop students' intrinsic motivation to maintain physical fitness, as demonstrated by the Sound Body Sound Mind curriculum and proven effective by the 2013 University of…

  8. WSES: HIGH SECURED DATA ENCRYPTION AND AUTHENTICATION USING WEAVING, ROTATION AND FLIPPING

    Directory of Open Access Journals (Sweden)

    A. Yesu Raj

    2015-12-01

    Full Text Available Data security is the very important part in the network data communication. Avoidance of the information hacking and steeling are very challenging part for network data communication. Now-a-days people are using many encryption and decryption techniques for data security. But all encryption and decryption techniques are having more time occupation or less security for the process. This paper proposed high level security approach to encryption and decryption for data security. Two levels of securities are used in this proposed method. First one is data encryption and the second one is hash value generation. The proposed Weaving based Superior Encryption Standard (WSES uses a novel weaving based approach. The weaving array generation is done by Elementary Number Theory Notation (ENTN method. The weaving array has multiple private keys for XOR encryption. After encryption the error value is extracted from the encrypted array and weaving array. This error value is sent to the other side. The novel approach for hash value generation uses the encrypted array. After encryption, the encrypted array is rotated into four degrees and each degree data are converted to vector format and arranged on by one under the vector. Finally a 2D Rotational Encryption Matrix (REM is obtained. After this process a REM copy is converted to mirror flip and it is need as Flipped Matrix (FM. The FM is concatenated under the REM and converted to vector using the zigzag operation. Finally this process gives two bytes hash value from the vector. This proposed method executes very fast and provide high security. This method is much reliable to small size applications and also used for any type of data security.

  9. Recollection and unitization in associating actors with extrinsic and intrinsic motions.

    Science.gov (United States)

    Kersten, Alan W; Earles, Julie L; Berger, Johanna D

    2015-04-01

    Four experiments provide evidence for a distinction between 2 different kinds of motion representations. Extrinsic motions involve the path of an object with respect to an external frame of reference. Intrinsic motions involve the relative motions of the parts of an object. This research suggests that intrinsic motions are represented conjointly with information about the identities of the actors who perform them, whereas extrinsic motions are represented separately from identity information. Experiment 1 demonstrated that participants remembered which actor had performed a particular intrinsic motion better than they remembered which actor had performed a particular extrinsic motion. Experiment 2 replicated this effect with incidental encoding of actor information, suggesting that encoding intrinsic motions leads one to automatically encode identity information. The results of Experiments 3 and 4 were fit by Yonelinas's (1999) source-memory model to quantify the contributions of familiarity and recollection to memory for the actors who carried out the intrinsic and extrinsic motions. Successful performance with extrinsic motion items in Experiment 3 required participants to remember in which scene contexts an actor had appeared, whereas successful performance in Experiment 4 required participants to remember the exact path taken by an actor in each scene. In both experiments, discrimination of old and new combinations of actors and extrinsic motions relied strongly on recollection, suggesting independent but associated representations of actors and extrinsic motions. In contrast, participants discriminated old and new combinations of actors and intrinsic motions primarily on the basis of familiarity, suggesting unitized representations of actors and intrinsic motions. (c) 2015 APA, all rights reserved).

  10. Cell Type-specific Intrinsic Perithreshold Oscillations in Hippocampal GABAergic Interneurons.

    Science.gov (United States)

    Kang, Young-Jin; Lewis, Hannah Elisabeth Smashey; Young, Mason William; Govindaiah, Gubbi; Greenfield, Lazar John; Garcia-Rill, Edgar; Lee, Sang-Hun

    2018-04-15

    The hippocampus plays a critical role in learning, memory, and spatial processing through coordinated network activity including theta and gamma oscillations. Recent evidence suggests that hippocampal subregions (e.g., CA1) can generate these oscillations at the network level, at least in part, through GABAergic interneurons. However, it is unclear whether specific GABAergic interneurons generate intrinsic theta and/or gamma oscillations at the single-cell level. Since major types of CA1 interneurons (i.e., parvalbumin-positive basket cells (PVBCs), cannabinoid type 1 receptor-positive basket cells (CB 1 BCs), Schaffer collateral-associated cells (SCAs), neurogliaform cells and ivy cells) are thought to play key roles in network theta and gamma oscillations in the hippocampus, we tested the hypothesis that these cells generate intrinsic perithreshold oscillations at the single-cell level. We performed whole-cell patch-clamp recordings from GABAergic interneurons in the CA1 region of the mouse hippocampus in the presence of synaptic blockers to identify intrinsic perithreshold membrane potential oscillations. The majority of PVBCs (83%), but not the other interneuron subtypes, produced intrinsic perithreshold gamma oscillations if the membrane potential remained above -45 mV. In contrast, CB 1 BCs, SCAs, neurogliaform cells, ivy cells, and the remaining PVBCs (17%) produced intrinsic theta, but not gamma, oscillations. These oscillations were prevented by blockers of persistent sodium current. These data demonstrate that the major types of hippocampal interneurons produce distinct frequency bands of intrinsic perithreshold membrane oscillations. Copyright © 2018 IBRO. Published by Elsevier Ltd. All rights reserved.

  11. Learning to learn - intrinsic plasticity as a metaplasticity mechanism for memory formation.

    Science.gov (United States)

    Sehgal, Megha; Song, Chenghui; Ehlers, Vanessa L; Moyer, James R

    2013-10-01

    "Use it or lose it" is a popular adage often associated with use-dependent enhancement of cognitive abilities. Much research has focused on understanding exactly how the brain changes as a function of experience. Such experience-dependent plasticity involves both structural and functional alterations that contribute to adaptive behaviors, such as learning and memory, as well as maladaptive behaviors, including anxiety disorders, phobias, and posttraumatic stress disorder. With the advancing age of our population, understanding how use-dependent plasticity changes across the lifespan may also help to promote healthy brain aging. A common misconception is that such experience-dependent plasticity (e.g., associative learning) is synonymous with synaptic plasticity. Other forms of plasticity also play a critical role in shaping adaptive changes within the nervous system, including intrinsic plasticity - a change in the intrinsic excitability of a neuron. Intrinsic plasticity can result from a change in the number, distribution or activity of various ion channels located throughout the neuron. Here, we review evidence that intrinsic plasticity is an important and evolutionarily conserved neural correlate of learning. Intrinsic plasticity acts as a metaplasticity mechanism by lowering the threshold for synaptic changes. Thus, learning-related intrinsic changes can facilitate future synaptic plasticity and learning. Such intrinsic changes can impact the allocation of a memory trace within a brain structure, and when compromised, can contribute to cognitive decline during the aging process. This unique role of intrinsic excitability can provide insight into how memories are formed and, more interestingly, how neurons that participate in a memory trace are selected. Most importantly, modulation of intrinsic excitability can allow for regulation of learning ability - this can prevent or provide treatment for cognitive decline not only in patients with clinical disorders but

  12. Revealing the functional neuroanatomy of intrinsic alertness using fMRI: methodological peculiarities.

    Science.gov (United States)

    Clemens, Benjamin; Zvyagintsev, Mikhail; Sack, Alexander T; Sack, Alexander; Heinecke, Armin; Willmes, Klaus; Sturm, Walter

    2011-01-01

    Clinical observations and neuroimaging data revealed a right-hemisphere fronto-parietal-thalamic-brainstem network for intrinsic alertness, and additional left fronto-parietal activity during phasic alertness. The primary objective of this fMRI study was to map the functional neuroanatomy of intrinsic alertness as precisely as possible in healthy participants, using a novel assessment paradigm already employed in clinical settings. Both the paradigm and the experimental design were optimized to specifically assess intrinsic alertness, while at the same time controlling for sensory-motor processing. The present results suggest that the processing of intrinsic alertness is accompanied by increased activity within the brainstem, thalamus, anterior cingulate gyrus, right insula, and right parietal cortex. Additionally, we found increased activation in the left hemisphere around the middle frontal gyrus (BA 9), the insula, the supplementary motor area, and the cerebellum. Our results further suggest that rather minute aspects of the experimental design may induce aspects of phasic alertness, which in turn might lead to additional brain activation in left-frontal areas not normally involved in intrinsic alertness. Accordingly, left BA 9 activation may be related to co-activation of the phasic alertness network due to the switch between rest and task conditions functioning as an external warning cue triggering the phasic alertness network. Furthermore, activation of the intrinsic alertness network during fixation blocks due to enhanced expectancy shortly before the switch to the task block might, when subtracted from the task block, lead to diminished activation in the typical right hemisphere intrinsic alertness network. Thus, we cautiously suggest that--as a methodological artifact--left frontal activations might show up due to phasic alertness involvement and intrinsic alertness activations might be weakened due to contrasting with fixation blocks, when assessing the

  13. Extrinsic and intrinsic motivation at 30: Unresolved scientific issues.

    Science.gov (United States)

    Reiss, Steven

    2005-01-01

    The undermining effect of extrinsic reward on intrinsic motivation remains unproven. The key unresolved issues are construct invalidity (all four definitions are unproved and two are illogical); measurement unreliability (the free-choice measure requires unreliable, subjective judgments to infer intrinsic motivation); inadequate experimental controls (negative affect and novelty, not cognitive evaluation, may explain "undermining" effects); and biased metareviews (studies with possible floor effects excluded, but those with possible ceiling effects included). Perhaps the greatest error with the undermining theory, however, is that it does not adequately recognize the multifaceted nature of intrinsic motivation (Reiss, 2004a). Advice to limit the use of applied behavior analysis based on "hidden" undermining effects is ideologically inspired and is unsupported by credible scientific evidence.

  14. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  15. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  16. Cosmological information in the intrinsic alignments of luminous red galaxies

    Energy Technology Data Exchange (ETDEWEB)

    Chisari, Nora Elisa [Department of Astrophysical Sciences, Princeton University, 4 Ivy Lane, Princeton, NJ 08544 (United States); Dvorkin, Cora, E-mail: nchisari@astro.princeton.edu, E-mail: cdvorkin@ias.edu [Institute for Advanced Study, School of Natural Sciences, Einstein Drive, Princeton, NJ 08540 (United States)

    2013-12-01

    The intrinsic alignments of galaxies are usually regarded as a contaminant to weak gravitational lensing observables. The alignment of Luminous Red Galaxies, detected unambiguously in observations from the Sloan Digital Sky Survey, can be reproduced by the linear tidal alignment model of Catelan, Kamionkowski and Blandford (2001) on large scales. In this work, we explore the cosmological information encoded in the intrinsic alignments of red galaxies. We make forecasts for the ability of current and future spectroscopic surveys to constrain local primordial non-Gaussianity and Baryon Acoustic Oscillations (BAO) in the cross-correlation function of intrinsic alignments and the galaxy density field. For the Baryon Oscillation Spectroscopic Survey, we find that the BAO signal in the intrinsic alignments is marginally significant with a signal-to-noise ratio of 1.8 and 2.2 with the current LOWZ and CMASS samples of galaxies, respectively, and increasing to 2.3 and 2.7 once the survey is completed. For the Dark Energy Spectroscopic Instrument and for a spectroscopic survey following the EUCLID redshift selection function, we find signal-to-noise ratios of 12 and 15, respectively. Local type primordial non-Gaussianity, parametrized by f{sub NL} = 10, is only marginally significant in the intrinsic alignments signal with signal-to-noise ratios < 2 for the three surveys considered.

  17. Intrinsic motivation and amotivation in first episode and prolonged psychosis.

    Science.gov (United States)

    Luther, Lauren; Lysaker, Paul H; Firmin, Ruth L; Breier, Alan; Vohs, Jenifer L

    2015-12-01

    The deleterious functional implications of motivation deficits in psychosis have generated interest in examining dimensions of the construct. However, there remains a paucity of data regarding whether dimensions of motivation differ over the course of psychosis. Therefore, this study examined two motivation dimensions, trait-like intrinsic motivation, and the negative symptom of amotivation, and tested the impact of illness phase on the 1) levels of these dimensions and 2) relationship between these dimensions. Participants with first episode psychosis (FEP; n=40) and prolonged psychosis (n=66) completed clinician-rated measures of intrinsic motivation and amotivation. Analyses revealed that when controlling for group differences in gender and education, the FEP group had significantly more intrinsic motivation and lower amotivation than the prolonged psychosis group. Moreover, intrinsic motivation was negatively correlated with amotivation in both FEP and prolonged psychosis, but the magnitude of the relationship did not statistically differ between groups. These findings suggest that motivation deficits are more severe later in the course of psychosis and that low intrinsic motivation may be partially independent of amotivation in both first episode and prolonged psychosis. Clinically, these results highlight the importance of targeting motivation in early intervention services. Copyright © 2015 Elsevier B.V. All rights reserved.

  18. The effect of homework choices on achievement and intrinsic motivation

    Science.gov (United States)

    Christensen, Emily Fast

    The purpose of this research was to test an intervention of choices in homework on the achievement and intrinsic motivation of seventh-grade science students at a middle school. The intervention was based on concepts from the cognitive evaluation theory of Edward L. Deci and Richard M. Ryan (1985). The subjects were sixteen heterogeneous classes of seventh-grade students, who were divided among four teachers. Two randomly chosen classes from each teacher received choices in their homework and the remaining two classes of each teacher received similar homework assignments without choices. Two hypotheses were developed for this study: (1) Seventh-grade science students given choices in their homework would show an increase in intrinsic motivation as measured on a motivation orientation measure, compared to students not given choices in their homework, and (2) Seventh-grade science students given choices in their homework would show an increase in achievement on an achievement measure, compared to students not given choices in their homework. Having choices in homework did not increase intrinsic motivation or achievement. However, students who did their homework did significantly better on the posttest, and students who were more intrinsically motivated did significantly better on the posttest. Just doing the homework was important for achievement, and intrinsic motivation was linked to achievement.

  19. Quarterly intrinsic disorder digest (January-February-March, 2014)

    OpenAIRE

    DeForte, Shelly; Reddy, Krishna D.; Uversky, Vladimir N.

    2016-01-01

    This is the 5th issue of the Digested Disorder series that represents a reader's digest of the scientific literature on intrinsically disordered proteins. We continue to use only 2 criteria for inclusion of a paper to this digest: The publication date (a paper should be published within the covered time frame) and the topic (a paper should be dedicated to any aspect of protein intrinsic disorder). The current digest issue covers papers published during the first quarter of 2014; i.e., during ...

  20. Freshwater fish for nutrition security in India: Evidence from FAO data

    Directory of Open Access Journals (Sweden)

    Nagesh Kumar Barik

    2017-08-01

    Full Text Available The nutritional dimension is integral to the concept of food security. A wide range of food commodities are required to fulfill nutritional security need of the people. Animal proteins which include milk, fish, meat and egg are essentially required for nutritionally balanced diets which are available from diverse food commodities. The fish in general and freshwater fish in particular are among the fast growing sectors with increasing contributions in the nutrition security of Indian consumers. The present paper analyses relative role of fish in the nutritional security of India based on the food balance sheet data of FAO available for the period 1961–2013. The apparent fish consumption per capita per year in India has increased primarily due to increase in freshwater fish availability from 0.7 kg/cap/year in 1961–3.48 kg/cap/year in 2013, enabling increase in the overall fish availability from 1.9 to 5.04 kg/cap/year during this period. During 1961–2013, contributions of freshwater fish to non-vegetarian protein, animal protein and total protein increased from 9.1 to 27.2, 3.3–8.7 and 0.4–1.7%, respectively

  1. Not All Ideals are Equal: Intrinsic and Extrinsic Ideals in Relationships.

    Science.gov (United States)

    Rodriguez, Lindsey M; Hadden, Benjamin W; Knee, C Raymond

    2015-03-01

    The ideal standards model suggests that greater consistency between ideal standards and actual perceptions of one's relationship predicts positive relationship evaluations; however, no research has evaluated whether this differs across types of ideals. A self-determination theory perspective was derived to test whether satisfaction of intrinsic ideals buffers the importance of extrinsic ideals. Participants (N=195) in committed relationships directly and indirectly reported the extent to which their partner met their ideal on two dimensions: intrinsic (e.g., warm, intimate) and extrinsic (e.g., attractive, successful). Relationship need fulfillment and relationship quality were also assessed. Hypotheses were largely supported, such that satisfaction of intrinsic ideals more strongly predicted relationship functioning, and satisfaction of intrinsic ideals buffered the relevance of extrinsic ideals for outcomes.

  2. First Clear-Cut Experimental Evidence of a Glass Transition in a Polymer with Intrinsic Microporosity: PIM-1.

    Science.gov (United States)

    Yin, Huajie; Chua, Yeong Zen; Yang, Bin; Schick, Christoph; Harrison, Wayne J; Budd, Peter M; Böhning, Martin; Schönhals, Andreas

    2018-04-19

    Polymers with intrinsic microporosity (PIMs) represent a novel, innovative class of materials with great potential in various applications from high-performance gas-separation membranes to electronic devices. Here, for the first time, for PIM-1, as the archetypal PIM, fast scanning calorimetry provides definitive evidence of a glass transition ( T g = 715 K, heating rate 3 × 10 4 K/s) by decoupling the time scales responsible for glass transition and decomposition. Because the rigid molecular structure of PIM-1 prevents any conformational changes, small-scale bend and flex fluctuations must be considered the origin of its glass transition. This result has strong implications for the fundamental understanding of the glass transition and for the physical aging of PIMs and other complex polymers, both topical problems of materials science.

  3. Microsoft Security Bible A Collection of Practical Security Techniques

    CERN Document Server

    Mullen, Timothy "Thor"

    2011-01-01

    Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications

  4. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  5. Intrinsic and extrinsic effects on image memorability.

    Science.gov (United States)

    Bylinskii, Zoya; Isola, Phillip; Bainbridge, Constance; Torralba, Antonio; Oliva, Aude

    2015-11-01

    Previous studies have identified that images carry the attribute of memorability, a predictive value of whether a novel image will be later remembered or forgotten. Here we investigate the interplay between intrinsic and extrinsic factors that affect image memorability. First, we find that intrinsic differences in memorability exist at a finer-grained scale than previously documented. Second, we test two extrinsic factors: image context and observer behavior. Building on prior findings that images that are distinct with respect to their context are better remembered, we propose an information-theoretic model of image distinctiveness. Our model can automatically predict how changes in context change the memorability of natural images. In addition to context, we study a second extrinsic factor: where an observer looks while memorizing an image. It turns out that eye movements provide additional information that can predict whether or not an image will be remembered, on a trial-by-trial basis. Together, by considering both intrinsic and extrinsic effects on memorability, we arrive at a more complete and fine-grained model of image memorability than previously available. Copyright © 2015 Elsevier Ltd. All rights reserved.

  6. Definition and discussion of the intrinsic efficiency of winglets

    Directory of Open Access Journals (Sweden)

    Dieter SCHOLZ

    2018-03-01

    Full Text Available Three simple equations are derived to define the “Intrinsic Aerodynamic Efficiency of Winglets” independent of the horizontal extension of the winglet and independent of the winglet’s (relative height. This Intrinsic Aerodynamic Efficiency allows a quick comparison of purely the aerodynamic shape of winglets independent of the selected size chosen for a certain aircraft installation. The Intrinsic Aerodynamic Efficiency is calculated in 3 steps: STEP 1: The relative total drag reduction due to the winglet is converted into an assumed contribution of the winglet only on the span efficiency factor. STEP 2: If the winglet also increases span, its performance is converted into one without the effect of span increase. STEP 3: The winglet’s reduction in induced drag is compared to a horizontal wing extension. If the winglet needs e.g. to be three times longer than the horizontal extension to achieve the same induced drag reduction, its Intrinsic Aerodynamic Efficiency is the inverse or 1/3. Winglet metrics as defined are calculated from literature inputs. In order to evaluate winglets further, the mass increase due to winglets is estimated in addition to the reduction of drag on aircraft level and fuel burn.

  7. A prototype empirical framework of intrinsic and extrinsic EERQI indicators

    NARCIS (Netherlands)

    Mooij, Ton

    2012-01-01

    The research question is: What do statistical analyses show us about the relationships between intrinsic and extrinsic indicators of quality and what does this mean when constructing a prototype EERQI framework? The pilot study involved the scoring on both intrinsic and extrinsic indica-tors for 177

  8. The Relations of Mothers' Controlling Vocalizations to Children's Intrinsic Motivation.

    Science.gov (United States)

    Deci, Edward L.; And Others

    1993-01-01

    Coded maternal vocalizations during videotaped play sessions of mothers and their six- or seven-year-old children. Children's intrinsic motivation was assessed by observing children's play when they were alone in a room. Found a negative relationship between maternal controlling vocalizations and children's intrinsic motivation. (MM)

  9. Digested disorder: Quarterly intrinsic disorder digest (January/February/March, 2013).

    Science.gov (United States)

    Uversky, Vladimir N

    2013-01-01

    The current literature on intrinsically disordered proteins is blooming. A simple PubMed search for "intrinsically disordered protein OR natively unfolded protein" returns about 1,800 hits (as of June 17, 2013), with many papers published quite recently. To keep interested readers up to speed with this literature, we are starting a "Digested Disorder" project, which will encompass a series of reader's digest type of publications aiming at the objective representation of the research papers and reviews on intrinsically disordered proteins. The only two criteria for inclusion in this digest are the publication date (a paper should be published within the covered time frame) and topic (a paper should be dedicated to any aspect of protein intrinsic disorder). The current digest covers papers published during the period of January, February and March of 2013. The papers are grouped hierarchically by topics they cover, and for each of the included paper a short description is given on its major findings.

  10. Functional Advantages of Conserved Intrinsic Disorder in RNA-Binding Proteins.

    Science.gov (United States)

    Varadi, Mihaly; Zsolyomi, Fruzsina; Guharoy, Mainak; Tompa, Peter

    2015-01-01

    Proteins form large macromolecular assemblies with RNA that govern essential molecular processes. RNA-binding proteins have often been associated with conformational flexibility, yet the extent and functional implications of their intrinsic disorder have never been fully assessed. Here, through large-scale analysis of comprehensive protein sequence and structure datasets we demonstrate the prevalence of intrinsic structural disorder in RNA-binding proteins and domains. We addressed their functionality through a quantitative description of the evolutionary conservation of disordered segments involved in binding, and investigated the structural implications of flexibility in terms of conformational stability and interface formation. We conclude that the functional role of intrinsically disordered protein segments in RNA-binding is two-fold: first, these regions establish extended, conserved electrostatic interfaces with RNAs via induced fit. Second, conformational flexibility enables them to target different RNA partners, providing multi-functionality, while also ensuring specificity. These findings emphasize the functional importance of intrinsically disordered regions in RNA-binding proteins.

  11. Functional Advantages of Conserved Intrinsic Disorder in RNA-Binding Proteins.

    Directory of Open Access Journals (Sweden)

    Mihaly Varadi

    Full Text Available Proteins form large macromolecular assemblies with RNA that govern essential molecular processes. RNA-binding proteins have often been associated with conformational flexibility, yet the extent and functional implications of their intrinsic disorder have never been fully assessed. Here, through large-scale analysis of comprehensive protein sequence and structure datasets we demonstrate the prevalence of intrinsic structural disorder in RNA-binding proteins and domains. We addressed their functionality through a quantitative description of the evolutionary conservation of disordered segments involved in binding, and investigated the structural implications of flexibility in terms of conformational stability and interface formation. We conclude that the functional role of intrinsically disordered protein segments in RNA-binding is two-fold: first, these regions establish extended, conserved electrostatic interfaces with RNAs via induced fit. Second, conformational flexibility enables them to target different RNA partners, providing multi-functionality, while also ensuring specificity. These findings emphasize the functional importance of intrinsically disordered regions in RNA-binding proteins.

  12. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  13. A comparison of South African and German extrinsic and intrinsic motivation

    Directory of Open Access Journals (Sweden)

    Robin Snelgar

    2017-04-01

    Aim: The main objective of this study was to investigate similarities and differences concerning extrinsic and intrinsic motivation in the workplace between German and South African cultures by examining individuals with working experience and tertiary education specifically. In addition, the research investigated differences in the motivation of respondents with regard to demographics such as gender, age and income. Setting: The setting took place in South Africa and Germany. Methods: In the study, exploratory factor analysis was utilised to prove validity of Cinar, Bektas and Aslan’s two-dimensional measure of extrinsic and intrinsic motivation. Moreover, analysis of variance and t-tests were used to show differences among demographic variables. Descriptive statistics such as means, central tendency and Cronbach’s alpha were also utilised. Results: The results revealed preferences for intrinsic motivational factors for the whole sample with higher levels of intrinsic motivation for the South African respondents compared to German respondents. Demographic characteristics played a minor role in determining levels of intrinsic motivation within individuals. Culture, however, played the biggest role in determining one’s levels of intrinsic or extrinsic motivation. Conclusion: These findings play an important role in explaining differences in motivation between the two countries Germany and South Africa. It highlights the important role that cultural differences play in shaping one’s form of motivation.

  14. Secure Automated Fabrication: an overview of remote breeder fuel fabrication

    International Nuclear Information System (INIS)

    Nyman, D.H.; Graham, R.A.

    1983-10-01

    The Secure Automated Fabrication (SAF) line is an automated, remotely controlled breeder fuel pin fabrication process which is to be installed in the Fuels and Materials Examination Facility (FMEF). The FMEF is presently under construction at Hanford and is scheduled for completion in 1984. The SAF line is scheduled for startup in 1987 and will produce mixed uranium-plutonium fuel pins for the Fast Flux Test Facility (FFTF) and the Clinch River Breeder Reactor Plant (CRBRP). The fabrication line and support systems are described

  15. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  16. Failure to label baboon milk intrinsically with iron

    International Nuclear Information System (INIS)

    Figueroa-Colon, R.; Elwell, J.H.; Jackson, E.; Osborne, J.W.; Fomon, S.J.

    1989-01-01

    The widely held belief that 50% of the iron in human milk is absorbed is based on studies that have used an extrinsic radioactive iron tag. To determine the validity of an extrinsic tag, it is necessary to label the milk intrinsically with one isotope and to compare absorption of this isotope with absorption of another isotope added as the extrinsic tag. We chose the baboon as a model and infused 59Fe intravenously. In each of three attempts we failed to label the milk intrinsically

  17. A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism

    Science.gov (United States)

    Chen, Jun-xin; Zhu, Zhi-liang; Fu, Chong; Yu, Hai; Zhang, Li-bo

    2015-03-01

    In recent years, a variety of chaos-based image cryptosystems have been investigated to meet the increasing demand for real-time secure image transmission. Most of them are based on permutation-diffusion architecture, in which permutation and diffusion are two independent procedures with fixed control parameters. This property results in two flaws. (1) At least two chaotic state variables are required for encrypting one plain pixel, in permutation and diffusion stages respectively. Chaotic state variables produced with high computation complexity are not sufficiently used. (2) The key stream solely depends on the secret key, and hence the cryptosystem is vulnerable against known/chosen-plaintext attacks. In this paper, a fast chaos-based image encryption scheme with a dynamic state variables selection mechanism is proposed to enhance the security and promote the efficiency of chaos-based image cryptosystems. Experimental simulations and extensive cryptanalysis have been carried out and the results prove the superior security and high efficiency of the scheme.

  18. Job characteristic perception and intrinsic motivation in medical record department staff.

    Science.gov (United States)

    Isfahani, Sakineh Saghaeiannejad; Bahrami, Soosan; Torki, Sedighe

    2013-01-01

    Human resources are key factors in service organizations like hospitals. Therefore, motivating human recourses to achieve the objectives of an organization is important. Job enrichment is a strategy used to increase job motivation in staffs. The goal of the current study is to determine the relationship between job characteristics and intrinsic motivation in medical record staff in hospitals related to Medical Science University in Isfahan in 2011-2012 academic year. The type of the study is descriptive and corelational of multi variables. The population of the study includes all the medical record staffs of medical record department working in Medical Science hospitals of Isfahan. One hundred twentyseven subjects were selected by conducting a census. In the present study, data collected by using two questionnaires of job characteristics devised by Hackman and Oldeham, and of intrinsic motivation. Content validity was confirmed by experts and its reliability was calculated through coefficient of Cronbach's alpha (r1 = 0.84- r2 = 0.94). The questionnaires completed were entered into SPSS(18) software; furthermore, statistical analysis done descriptively (frequency percent, mean, standard deviation, Pierson correlation coefficient,...) and inferentially (multiple regression, MANOVA, LSD). A significant relationship between job characteristics as well as its elements (skill variety, task identity, task significance, autonomy and feedback) and intrinsic motivation was noticed. (p intrinsic motivation was significant and job feedback had the most impact upon the intrinsic motivation. No significant difference was noticed among the mean amounts of job characteristic perception according to age, gender, level of education, and the kind of educational degree in hospitals. However, there was a significant difference among the mean amounts of job characteristic perception according to the unit of service and the years of servicein hospitals. The findings show that all job

  19. Fast Convolution Module (Fast Convolution Module)

    National Research Council Canada - National Science Library

    Bierens, L

    1997-01-01

    This report describes the design and realisation of a real-time range azimuth compression module, the so-called 'Fast Convolution Module', based on the fast convolution algorithm developed at TNO-FEL...

  20. The Intrinsic Dynamics of Psychological Process

    NARCIS (Netherlands)

    Vallacher, Robin R.; van Geert, Paul; Nowak, Andrzej

    2015-01-01

    Psychological processes unfold on various timescales in accord with internally generated patterns. The intrinsic dynamism of psychological process is difficult to investigate using traditional methods emphasizing cause–effect relations, however, and therefore is rarely incorporated into social

  1. Intrinsic space charge resonances and the space charge limit

    International Nuclear Information System (INIS)

    Parzen, G.

    1990-01-01

    A study has been done of the dependence of the space charge limit on the choice of ν-values using a simulation program. This study finds a strong dependence of the space charge limit on the location of the ν-values relative to the intrinsic space charge resonances, which are driven by the space charge forces due to the beam itself. Four accelerators were studied. For some of these accelerators the study suggest that the space charge limit can be increased by about a factor of 2 proper choice of the ν-values. The lower order 1/2 and 1/4 intrinsic resonances appear to be the important resonances. There is some evidence for effects due to the 1/6 and 1/8 intrinsic resonances, particularly for larger synchrotrons. 5 figs

  2. Intrinsic and extrinsic spin Hall effects of Dirac electrons

    International Nuclear Information System (INIS)

    Fukazawa, Takaaki; Kohno, Hiroshi; Fujimoto, Junji

    2017-01-01

    We investigate the spin Hall effect (SHE) of electrons described by the Dirac equation, which is used as an effective model near the L-points in bismuth. By considering short-range nonmagnetic impurities, we calculate the extrinsic as well as intrinsic contributions on an equal footing. The vertex corrections are taken into account within the ladder type and the so-called skew-scattering type. The intrinsic SHE which we obtain is consistent with that of Fuseya et al. It is found that the extrinsic contribution dominates the intrinsic one when the system is metallic. The extrinsic SHE due to the skew scattering is proportional to Δ/n i u, where 2Δ is the band gap, n i is the impurity concentration, and u is the strength of the impurity potential. (author)

  3. A Rotational Crofton Formula for Flagged Intrinsic Volumes of Sets of Positive Reach

    DEFF Research Database (Denmark)

    Auneau, Jeremy Michel

    A rotational Crofton formula is derived relating the flagged intrinsic volumes of a compact set of positive reach with the flagged intrinsic volumes measured on sections passing through a fixed point. In particular cases, the flagged intrinsic volumes defined in the present paper are identical...

  4. Remembering the real me: Nostalgia offers a window to the intrinsic self.

    Science.gov (United States)

    Baldwin, Matthew; Biernat, Monica; Landau, Mark J

    2015-01-01

    Seven studies reveal that nostalgia, a sentimental affection for the past, offers a window to the intrinsic self-concept-who people think they truly are. In Study 1, state nostalgia was associated with higher authenticity and lower extrinsic self-focus (concern with meeting extrinsic value standards). In Study 2, experimentally primed nostalgia increased perceived authenticity of the past self, which in turn predicted reduced current extrinsic self-focus. Study 3 showed that nostalgia increased the accessibility of the intrinsic self-concept but not the everyday self-concept. Study 4 provided evidence for a moderator suggested by our theoretical analysis: Recalling a nostalgic event increased felt nostalgia and positive affect, but this effect was attenuated if participants were prompted to recognize external factors controlling their behavior during that event. Next we treated nostalgia as an outcome variable and a moderator to test whether nostalgia is triggered by, and buffers against, threats to the intrinsic self. Using a mediation approach, Study 5 showed that participants primed to feel blocked in intrinsic self-expression responded with increased nostalgia. In Study 6, intrinsic self-threat reduced intrinsic self-expression and subjective well-being for participants who were not given an opportunity to respond with nostalgia but not for participants who were allowed to reflect on a nostalgic memory. In line with the experimental findings, correlational data from Study 7 indicated that dispositional nostalgia positively predicted intrinsic self-expression and well-being. Understanding nostalgia as a window to the intrinsic self points to new directions for research on nostalgia's antecedents, moderators, and consequences for well-being. (PsycINFO Database Record (c) 2015 APA, all rights reserved).

  5. Content of intrinsic disorder influences the outcome of cell-free protein synthesis.

    Science.gov (United States)

    Tokmakov, Alexander A; Kurotani, Atsushi; Ikeda, Mariko; Terazawa, Yumiko; Shirouzu, Mikako; Stefanov, Vasily; Sakurai, Tetsuya; Yokoyama, Shigeyuki

    2015-09-11

    Cell-free protein synthesis is used to produce proteins with various structural traits. Recent bioinformatics analyses indicate that more than half of eukaryotic proteins possess long intrinsically disordered regions. However, no systematic study concerning the connection between intrinsic disorder and expression success of cell-free protein synthesis has been presented until now. To address this issue, we examined correlations of the experimentally observed cell-free protein expression yields with the contents of intrinsic disorder bioinformatically predicted in the expressed sequences. This analysis revealed strong relationships between intrinsic disorder and protein amenability to heterologous cell-free expression. On the one hand, elevated disorder content was associated with the increased ratio of soluble expression. On the other hand, overall propensity for detectable protein expression decreased with disorder content. We further demonstrated that these tendencies are rooted in some distinct features of intrinsically disordered regions, such as low hydrophobicity, elevated surface accessibility and high abundance of sequence motifs for proteolytic degradation, including sites of ubiquitination and PEST sequences. Our findings suggest that identification of intrinsically disordered regions in the expressed amino acid sequences can be of practical use for predicting expression success and optimizing cell-free protein synthesis.

  6. Importance of Intrinsic and Instrumental Value of Education in Pakistan

    Science.gov (United States)

    Kumar, Mahendar

    2017-01-01

    Normally, effectiveness of any object or thing is judged by two values; intrinsic and instrumental. To compare intrinsic value of education with instrumental value, this study has used the following variables: getting knowledge for its own sake, getting knowledge for social status, getting knowledge for job or business endeavor and getting…

  7. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  8. David Ross, Ideal Utilitarianism, and the Intrinsic Value of Acts

    Directory of Open Access Journals (Sweden)

    Francesco Orsi

    2012-01-01

    Full Text Available The denial of the intrinsic value of acts apart from both motives and consequences lies at the heart of Ross’s deontology and his opposition to ideal utilitarianism. Moreover, the claim that acts can have intrinsic value is a staple element of early and contemporary attempts to “consequentialise” all of morality. I first show why Ross’s denial is relevant both for his philosophy and for current debates. Then I consider and reject as inconclusive some of Ross’s explicit and implicit motivations for his claim, stemming from his philosophy of action, his axiology, and his concept of intrinsic value, or a combination of these. I also criticize Ross’s later view that all right acts somehow produce some good, but that the value of some of these goods is explained by the prior rightness of the act. In the course of the discussion, the idea that acts can have intrinsic value apart from motives and consequences gains credibility both from the weaknesses in Ross’s arguments and from some putative examples. So, finally, I distinguish two attitudes in the history of ideal utilitarianism towards the necessity or not to give a detailed account of the intrinsic value of acts, and suggest that a Why Bother attitude is more promising than a Constructive one.

  9. Elderly Taiwanese's Intrinsic Risk Factors for Fall-related Injuries

    OpenAIRE

    In-Fun Li; Yvonne Hsiung; Hui-Fen Hsing; Mei-Yu Lee; Te-Hsin Chang; Ming-Yuan Huang

    2016-01-01

    Background: As a vital issue in geriatric research, risk factors for falls were concluded to be multifactorial, and prevention has been mostly aimed at decreasing situational and environmental risks that cause and aggravate fall-related injuries, particularly within the institutions. While knowledge is limited about older patients' intrinsic determinants, the purpose of this study was to explore elderly Taiwanese's intrinsic risk factors associated with severe fall-related injuries. Method...

  10. Metal artifact removal (MAR) analysis for the security inspections using the X-ray computed tomography

    International Nuclear Information System (INIS)

    Cho, Hyo Sung; Woo, Tae Ho; Park, Chul Kyu

    2016-01-01

    Using the metal artifact property, it is analyzed for the X-ray computed tomography (CT) in the aspect of the security on the examined places like airport and surveillance areas. Since the importance of terror prevention strategy has been increased, the security application of X-ray CT has the significant remark. One shot X-ray image has the limitation to find out the exact shape to property in the closed box, which could be solved by the CT scanning without the tearing off the box in this work. Cleaner images can be obtained by the advanced technology if the CT scanning is utilized in the security purposes on the secured areas. A metal sample is treated by the metal artifact removal (MAR) method for the enhanced image. The mimicked explosive is experimented for the imaging processing application where the cleaner one is obtained. The procedure is explained and the further study is discussed. - Highlights: • The X-ray image is used for the nuclear inspections which are made by the image processing. • Nuclear security has been performed for counterterrorism. • Easy and fast inspections are needed. • Metal shows the characteristics of the noises.

  11. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  12. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  13. Security dialogues: building better relationships between security and business

    OpenAIRE

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  14. A simple and secure method to fix laparoscopic trocars in children.

    Science.gov (United States)

    Yip, K F; Tam, P K H; Li, M K W

    2006-04-01

    We introduce a simple method of fixing trocars to the abdominal wall in children. Before anchoring the trocar, a piece of Tegaderm polyurethrane adhesive (3M Healthcare, St. Paul, Minnesota) is attached to the trocar. A silk stitch is anchored to neighboring skin, and then transfixed over the shaft of the trocar through the adhesive. Both inward and outward movement of the trocar can be restrained. This method is simple, fast, secure, and can be applied to trocars of any size.

  15. SWAN - Detection of explosives by means of fast neutron activation analysis

    International Nuclear Information System (INIS)

    Gierlik, M.; Borsuk, S.; Guzik, Z.; Iwanowska, J.; Kaźmierczak, Ł.; Korolczuk, S.; Kozłowski, T.; Krakowski, T.; Marcinkowski, R.; Swiderski, L.; Szeptycka, M.; Szewiński, J.; Urban, A.

    2016-01-01

    In this work we report on SWAN, the experimental, portable device for explosives detection. The device was created as part of the EU Structural Funds Project “Accelerators & Detectors” (POIG.01.01.02-14-012/08-00), with the goal to increase beneficiary's expertise and competencies in the field of neutron activation analysis. Previous experiences and budged limitations lead toward a less advanced design based on fast neutron interactions and unsophisticated data analysis with the emphasis on the latest gamma detection and spectrometry solutions. The final device has been designed as a portable, fast neutron activation analyzer, with the software optimized for detection of carbon, nitrogen and oxygen. SWAN's performance in the role of explosives detector is elaborated in this paper. We demonstrate that the unique features offered by neutron activation analysis might not be impressive enough when confronted with practical demands and expectations of a generic homeland security customer.

  16. Intrinsic strength of sodium borosilicate glass fibers by using a two-point bending technique

    International Nuclear Information System (INIS)

    Nishikubo, Y; Yoshida, S; Sugawara, T; Matsuoka, J

    2011-01-01

    Flaws existing on glass surface can be divided into two types, extrinsic and intrinsic. Although the extrinsic flaws are generated during processing and using, the intrinsic flaws are regarded as structural defects which result from thermal fluctuation. It is known that the extrinsic flaws determine glass strength, but effects of the intrinsic flaws on the glass strength are still unclear. Since it is considered that the averaged bond-strength and the intrinsic flaw would affect the intrinsic strength, the intrinsic strength of glass surely depends on the glass composition. In this study, the intrinsic failure strain of the glass fibers with the compositions of 20Na 2 O-40xB 2 O 3 -(80-40x)SiO 2 (mol%, x = 0, 0.5, 1.0, 1.5) were measured by using a two-point bending technique. The failure strength was estimated from the failure strain and Young's modulus of glass. It is elucidated that two-point bending strength of glass fiber decreases with increasing B 2 O 3 content in glass. The effects of the glass composition on the intrinsic strength are discussed in terms of elastic and inelastic deformation behaviors prior to fracture.

  17. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  18. Skin electronics from scalable fabrication of an intrinsically stretchable transistor array.

    Science.gov (United States)

    Wang, Sihong; Xu, Jie; Wang, Weichen; Wang, Ging-Ji Nathan; Rastak, Reza; Molina-Lopez, Francisco; Chung, Jong Won; Niu, Simiao; Feig, Vivian R; Lopez, Jeffery; Lei, Ting; Kwon, Soon-Ki; Kim, Yeongin; Foudeh, Amir M; Ehrlich, Anatol; Gasperini, Andrea; Yun, Youngjun; Murmann, Boris; Tok, Jeffery B-H; Bao, Zhenan

    2018-03-01

    Skin-like electronics that can adhere seamlessly to human skin or within the body are highly desirable for applications such as health monitoring, medical treatment, medical implants and biological studies, and for technologies that include human-machine interfaces, soft robotics and augmented reality. Rendering such electronics soft and stretchable-like human skin-would make them more comfortable to wear, and, through increased contact area, would greatly enhance the fidelity of signals acquired from the skin. Structural engineering of rigid inorganic and organic devices has enabled circuit-level stretchability, but this requires sophisticated fabrication techniques and usually suffers from reduced densities of devices within an array. We reasoned that the desired parameters, such as higher mechanical deformability and robustness, improved skin compatibility and higher device density, could be provided by using intrinsically stretchable polymer materials instead. However, the production of intrinsically stretchable materials and devices is still largely in its infancy: such materials have been reported, but functional, intrinsically stretchable electronics have yet to be demonstrated owing to the lack of a scalable fabrication technology. Here we describe a fabrication process that enables high yield and uniformity from a variety of intrinsically stretchable electronic polymers. We demonstrate an intrinsically stretchable polymer transistor array with an unprecedented device density of 347 transistors per square centimetre. The transistors have an average charge-carrier mobility comparable to that of amorphous silicon, varying only slightly (within one order of magnitude) when subjected to 100 per cent strain for 1,000 cycles, without current-voltage hysteresis. Our transistor arrays thus constitute intrinsically stretchable skin electronics, and include an active matrix for sensory arrays, as well as analogue and digital circuit elements. Our process offers a

  19. Skin electronics from scalable fabrication of an intrinsically stretchable transistor array

    Science.gov (United States)

    Wang, Sihong; Xu, Jie; Wang, Weichen; Wang, Ging-Ji Nathan; Rastak, Reza; Molina-Lopez, Francisco; Chung, Jong Won; Niu, Simiao; Feig, Vivian R.; Lopez, Jeffery; Lei, Ting; Kwon, Soon-Ki; Kim, Yeongin; Foudeh, Amir M.; Ehrlich, Anatol; Gasperini, Andrea; Yun, Youngjun; Murmann, Boris; Tok, Jeffery B.-H.; Bao, Zhenan

    2018-03-01

    Skin-like electronics that can adhere seamlessly to human skin or within the body are highly desirable for applications such as health monitoring, medical treatment, medical implants and biological studies, and for technologies that include human-machine interfaces, soft robotics and augmented reality. Rendering such electronics soft and stretchable—like human skin—would make them more comfortable to wear, and, through increased contact area, would greatly enhance the fidelity of signals acquired from the skin. Structural engineering of rigid inorganic and organic devices has enabled circuit-level stretchability, but this requires sophisticated fabrication techniques and usually suffers from reduced densities of devices within an array. We reasoned that the desired parameters, such as higher mechanical deformability and robustness, improved skin compatibility and higher device density, could be provided by using intrinsically stretchable polymer materials instead. However, the production of intrinsically stretchable materials and devices is still largely in its infancy: such materials have been reported, but functional, intrinsically stretchable electronics have yet to be demonstrated owing to the lack of a scalable fabrication technology. Here we describe a fabrication process that enables high yield and uniformity from a variety of intrinsically stretchable electronic polymers. We demonstrate an intrinsically stretchable polymer transistor array with an unprecedented device density of 347 transistors per square centimetre. The transistors have an average charge-carrier mobility comparable to that of amorphous silicon, varying only slightly (within one order of magnitude) when subjected to 100 per cent strain for 1,000 cycles, without current-voltage hysteresis. Our transistor arrays thus constitute intrinsically stretchable skin electronics, and include an active matrix for sensory arrays, as well as analogue and digital circuit elements. Our process offers a

  20. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  1. Defining the Intrinsic Cardiac Risks of Operations to Improve Preoperative Cardiac Risk Assessments.

    Science.gov (United States)

    Liu, Jason B; Liu, Yaoming; Cohen, Mark E; Ko, Clifford Y; Sweitzer, Bobbie J

    2018-02-01

    Current preoperative cardiac risk stratification practices group operations into broad categories, which might inadequately consider the intrinsic cardiac risks of individual operations. We sought to define the intrinsic cardiac risks of individual operations and to demonstrate how grouping operations might lead to imprecise estimates of perioperative cardiac risk. Elective operations (based on Common Procedural Terminology codes) performed from January 1, 2010 to December 31, 2015 at hospitals participating in the American College of Surgeons National Surgical Quality Improvement Program were studied. A composite measure of perioperative adverse cardiac events was defined as either cardiac arrest requiring cardiopulmonary resuscitation or acute myocardial infarction. Operations' intrinsic cardiac risks were derived from mixed-effects models while controlling for patient mix. Resultant risks were sorted into low-, intermediate-, and high-risk categories, and the most commonly performed operations within each category were identified. Intrinsic operative risks were also examined using a representative grouping of operations to portray within-group variation. Sixty-six low, 30 intermediate, and 106 high intrinsic cardiac risk operations were identified. Excisional breast biopsy had the lowest intrinsic cardiac risk (overall rate, 0.01%; odds ratio, 0.11; 95% CI, 0.02 to 0.25) relative to the average, whereas aorto-bifemoral bypass grafting had the highest (overall rate, 4.1%; odds ratio, 6.61; 95% CI, 5.54 to 7.90). There was wide variation in the intrinsic cardiac risks of operations within the representative grouping (median odds ratio, 1.40; interquartile range, 0.88 to 2.17). A continuum of intrinsic cardiac risk exists among operations. Grouping operations into broad categories inadequately accounts for the intrinsic cardiac risk of individual operations.

  2. A discourse activist approach to studying IT-security practices in Danish public organizations

    DEFF Research Database (Denmark)

    Bager, Ann Starbæk; Holmgreen, Lise-Lotte

    plurivocality and dialogue in organizational and leadership development practices: Discussion and close up discourse analysis of dialogic practices in a leadership development forum. PhD thesis. University of Aalborg, Denmark. Deetz, S (2001): Conceptual Foundations. In: New Handbook of Organizational......With the threat of personal and organizational details being compromised through e.g. hacking, IT security is fast becoming a major concern in many organizations. In the presentation, the authors explore the potential of applying a discourse based methodological approach to the study and change...... of IT-security practices in Danish public organizations. The approach contributes to the field of Organizational Discourse Studies (ODS), in which discourse scholars are actively involved in dealing with local organizational challenges and fostering organizational change (cf. Grant & Iedema, 2005...

  3. To The Question Of The Concepts "National Security", "Information Security", "National Information Security" Meanings

    OpenAIRE

    Alexander A. Galushkin

    2015-01-01

    In the present article author analyzes value of the concepts "national security", "information security", "national information security". Author gives opinions of scientists-jurists, definitions given by legislators and normotvorets in various regulations.

  4. Intrinsically conductive polymer thin film piezoresistors

    DEFF Research Database (Denmark)

    Lillemose, Michael; Spieser, Martin; Christiansen, N.O.

    2008-01-01

    We report on the piezoresistive effect in the intrinsically conductive polymer, polyaniline. A process recipe for indirect patterning of thin film polyaniline has been developed. Using a specially designed chip, the polyaniline thin films have been characterised with respect to resistivity...

  5. Iron and intrinsic deep level states in Ga2O3

    Science.gov (United States)

    Ingebrigtsen, M. E.; Varley, J. B.; Kuznetsov, A. Yu.; Svensson, B. G.; Alfieri, G.; Mihaila, A.; Badstübner, U.; Vines, L.

    2018-01-01

    Using a combination of deep level transient spectroscopy, secondary ion mass spectrometry, proton irradiation, and hybrid functional calculations, we identify two similar deep levels that are associated with Fe impurities and intrinsic defects in bulk crystals and molecular beam epitaxy and hydride vapor phase epitaxi-grown epilayers of β-Ga2O3. First, our results indicate that FeGa, and not an intrinsic defect, acts as the deep acceptor responsible for the often dominating E2 level at ˜0.78 eV below the conduction band minimum. Second, by provoking additional intrinsic defect generation via proton irradiation, we identified the emergence of a new level, labeled as E2*, having the ionization energy very close to that of E2, but exhibiting an order of magnitude larger capture cross section. Importantly, the properties of E2* are found to be consistent with its intrinsic origin. As such, contradictory opinions of a long standing literature debate on either extrinsic or intrinsic origin of the deep acceptor in question converge accounting for possible contributions from E2 and E2* in different experimental conditions.

  6. VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Batueva

    2014-01-01

    Full Text Available The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.

  7. Virtual Reality: U.S. Information Security Threats Concept And Its International Dimension

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Batueva

    2014-01-01

    Full Text Available The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.

  8. Strategic and policy issues raised by the transition from thermal to fast nuclear systems

    International Nuclear Information System (INIS)

    2009-01-01

    The renewed interest in nuclear energy triggered by concerns about global climate change and security of supply, which could lead to substantial growth in nuclear electricity generation, enhances the attractiveness of fast neutron reactors with closed fuel cycles. Moving from the current fleet of thermal neutron reactors to fast neutron systems will require many decades and extensive RD-D efforts. This book identifies and analyses key strategic and policy issues raised by such a transition, aiming at providing guidance to decision makers on the best approaches for implementing transition scenarios. The topics covered in this book will be of interest to government and nuclear industry policy makers as well as to specialists working on nuclear energy system analyses and advanced fuel cycle issues. (author)

  9. Exploration of horizontal intrinsic spin resonances with two partial Siberian snakes

    Directory of Open Access Journals (Sweden)

    F. Lin

    2007-04-01

    Full Text Available Two partial Siberian snakes were used to avoid all the spin imperfection and vertical intrinsic resonances in the alternating gradient synchrotron (AGS at Brookhaven National Laboratory. However, the horizontal betatron motion can cause polarization loss resulting from the nonvertical stable spin direction in the presence of two partial snakes. This type of resonance, called a horizontal intrinsic spin resonance, was observed and systematically studied in the AGS. A simplified analytic model and numerical simulation have been developed to compare with experimental data. Properties of the horizontal intrinsic resonance are discussed.

  10. Bimanual motor coordination controlled by cooperative interactions in intrinsic and extrinsic coordinates.

    Science.gov (United States)

    Sakurada, Takeshi; Ito, Koji; Gomi, Hiroaki

    2016-01-01

    Although strong motor coordination in intrinsic muscle coordinates has frequently been reported for bimanual movements, coordination in extrinsic visual coordinates is also crucial in various bimanual tasks. To explore the bimanual coordination mechanisms in terms of the frame of reference, here we characterized implicit bilateral interactions in visuomotor tasks. Visual perturbations (finger-cursor gain change) were applied while participants performed a rhythmic tracking task with both index fingers under an in-phase or anti-phase relationship in extrinsic coordinates. When they corrected the right finger's amplitude, the left finger's amplitude unintentionally also changed [motor interference (MI)], despite the instruction to keep its amplitude constant. Notably, we observed two specificities: one was large MI and low relative-phase variability (PV) under the intrinsic in-phase condition, and the other was large MI and high PV under the extrinsic in-phase condition. Additionally, using a multiple-interaction model, we successfully decomposed MI into intrinsic components caused by motor correction and extrinsic components caused by visual-cursor mismatch of the right finger's movements. This analysis revealed that the central nervous system facilitates MI by combining intrinsic and extrinsic components in the condition with in-phases in both intrinsic and extrinsic coordinates, and that under-additivity of the effects is explained by the brain's preference for the intrinsic interaction over extrinsic interaction. In contrast, the PV was significantly correlated with the intrinsic component, suggesting that the intrinsic interaction dominantly contributed to bimanual movement stabilization. The inconsistent features of MI and PV suggest that the central nervous system regulates multiple levels of bilateral interactions for various bimanual tasks. © 2015 The Authors. European Journal of Neuroscience published by Federation of European Neuroscience Societies and

  11. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  12. Trapped Electron Mode Turbulence Driven Intrinsic Rotation in Tokamak Plasmas

    International Nuclear Information System (INIS)

    Wang, W.X.; Hahm, T.S.; Ethier, S.; Zakharov, L.E.

    2011-01-01

    Recent progress from global gyrokinetic simulations in understanding the origin of intrinsic rotation in toroidal plasmas is reported with emphasis on electron thermal transport dominated regimes. The turbulence driven intrinsic torque associated with nonlinear residual stress generation by the fluctuation intensity and the intensity gradient in the presence of zonal flow shear induced asymmetry in the parallel wavenumber spectrum is shown to scale close to linearly with plasma gradients and the inverse of the plasma current. These results qualitatively reproduce empirical scalings of intrinsic rotation observed in various experiments. The origin of current scaling is found to be due to enhanced kll symmetry breaking induced by the increased radial variation of the safety factor as the current decreases. The physics origin for the linear dependence of intrinsic torque on pressure gradient is that both turbulence intensity and the zonal flow shear, which are two key ingredients for driving residual stress, increase with the strength of turbulence drive, which is R0/LTe and R0/Lne for the trapped electron mode.

  13. Extrinsic photoresponse enhancement under additional intrinsic photoexcitation in organic semiconductors

    Energy Technology Data Exchange (ETDEWEB)

    Kounavis, P., E-mail: pkounavis@upatras.gr [Department of Electrical and Computer Engineering, School of Engineering, University of Patras, 26504 Patras (Greece)

    2016-06-28

    Dual light beam photoresponse experiments are employed to explore the photoresponse under simultaneous extrinsic and intrinsic photoexcitation of organic semiconductors. The photoresponse of a red modulated light extrinsic photoexcitation is found that can be significantly enhanced under an additional blue bias-light intrinsic photoexcitation in two terminal pentacene films on glass substrates. From the frequency resolved photoresponse, it is deduced that the phenomenon of photoresponse enhancement can be attributed to an increase in the extrinsic photogeneration rate of the red modulated light and/or an improvement of the drift velocity of carriers under an additional blue light intrinsic photoexcitation. The possible predominant extrinsic photogeneration mechanism, which can be compatible with the observed dependence of the photoresponse enhancement on the frequency and on the light intensities of the red and blue light excitation, is the singlet exciton dissociation through electron transfer to acceptor-like traps. Moreover, an improvement in the drift velocity of carriers traversing grain boundaries with potential energy barriers, which may be reduced by trapping of minority carriers created from the intrinsic photoexcitation, may partly contribute to the photoresponse enhancement.

  14. Extrinsic photoresponse enhancement under additional intrinsic photoexcitation in organic semiconductors

    International Nuclear Information System (INIS)

    Kounavis, P.

    2016-01-01

    Dual light beam photoresponse experiments are employed to explore the photoresponse under simultaneous extrinsic and intrinsic photoexcitation of organic semiconductors. The photoresponse of a red modulated light extrinsic photoexcitation is found that can be significantly enhanced under an additional blue bias-light intrinsic photoexcitation in two terminal pentacene films on glass substrates. From the frequency resolved photoresponse, it is deduced that the phenomenon of photoresponse enhancement can be attributed to an increase in the extrinsic photogeneration rate of the red modulated light and/or an improvement of the drift velocity of carriers under an additional blue light intrinsic photoexcitation. The possible predominant extrinsic photogeneration mechanism, which can be compatible with the observed dependence of the photoresponse enhancement on the frequency and on the light intensities of the red and blue light excitation, is the singlet exciton dissociation through electron transfer to acceptor-like traps. Moreover, an improvement in the drift velocity of carriers traversing grain boundaries with potential energy barriers, which may be reduced by trapping of minority carriers created from the intrinsic photoexcitation, may partly contribute to the photoresponse enhancement.

  15. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  16. Intrinsic Hand Muscle Activation for Grasp and Horizontal Transport

    OpenAIRE

    Winges, Sara A.; Kundu, Bornali; Soechting, John F.; Flanders, Martha

    2007-01-01

    During object manipulation, the hand and arm muscles produce internal forces on the object (grasping forces) and forces that result in external translation or rotation of the object in space (transport forces). The present study tested whether the intrinsic hand muscles are actively involved in transport as well as grasping. Intrinsic hand muscle activity increased with increasing demands for grasp stability, but also showed the timing and directional tuning patterns appropriate for actively ...

  17. Perceived and geographic food access and food security status among households with children.

    Science.gov (United States)

    Ma, Xiaoguang; Liese, Angela D; Bell, Bethany A; Martini, Lauren; Hibbert, James; Draper, Carrie; Burke, Michael P; Jones, Sonya J

    2016-10-01

    To examine the association of both perceived and geographic neighbourhood food access with food security status among households with children. This was a cross-sectional study in which participants' perceptions of neighbourhood food access were assessed by a standard survey instrument, and geographic food access was evaluated by distance to the nearest supermarket. Multinomial logistic regression models were used to examine the associations. The Midlands Family Study included 544 households with children in eight counties in South Carolina, USA. Food security status among participants was classified into three categories: food secure (FS), food insecure (FI) and very low food security among children (VLFS-C). Compared with FS households, VLFS-C households had lower odds of reporting easy access to adequate food shopping. VLFS-C households also had lower odds of reporting neighbourhood access to affordable fruits and vegetables compared with FS households and reported worse selection of fruits and vegetables, quality of fruits and vegetables, and selection of low-fat products. FI households had lower odds of reporting fewer opportunities to purchase fast food. None of the geographic access measures was significantly associated with food security status. Caregivers with children who experienced hunger perceived that they had less access to healthy affordable food in their community, even though grocery stores were present. Approaches to improve perceived access to healthy affordable food should be considered as part of the overall approach to improving food security and eliminating child hunger.

  18. Perceived and Geographic Food Access and Food Security Status among Households with Children

    Science.gov (United States)

    Ma, Xiaoguang; Liese, Angela D.; Bell, Bethany; Martini, Lauren; Hibbert, James; Draper, Carrie; Jones, Sonya J.

    2017-01-01

    Objective To examine the association of both perceived and geographic neighborhood food access with food security status among households with children. Design This was a cross-sectional study in which participants’ perceptions of neighborhood food access were assessed by a standard survey instrument, and geographic food access was evaluated by distance to the nearest supermarket. Multinomial logistic regression models were used to examine the associations. Subjects The Midlands Family Study included 544 households with children in eight counties in South Carolina. Food security status among participants was classified into three categories: food secure (FS), food insecure (FI) and very low food security among children (VLFS-C). Results Compared to FS households, VLFS-C households had lower odds of reporting easy access to adequate food shopping. VLFS-C households also had lower odds of reporting neighborhood access to affordable fruits and vegetables compared to FS households and reported worse selection of fruits and vegetables, quality of fruits and vegetables and selection of low-fat products. FI households had lower odds of reporting fewer opportunities to purchase fast food. None of the geographic access measures was significantly associated with food security status. Conclusions Caregivers with children that experienced hunger perceived that they had less access to healthy affordably food in their community, even though grocery stores were present. Approaches to improve perceived access to healthy affordable food should be considered as part of the overall approach to improving food security and eliminating child hunger. PMID:27133939

  19. Determination of intrinsic equilibrium constants at an alumina/electrolyte interface

    Directory of Open Access Journals (Sweden)

    SLOBODAN K. MILONJIC

    2004-12-01

    Full Text Available Intrinsic ionization and complexation constants at an alumina/electrolyte interface were studied by the site binding model, while the sorption of alkali cations from aqueous solutions was interpreted by the triple-layer model. The surface properties of alumina were investigated by the potentiometric acid-base titration method. The point of zero charge (pHpzc of alumina obtained by this method was found to be 7.2. The obtained mean values of the intrinsic protonation and ionization constants of the surface hydroxyl groups and the intrinsic surface complexation constant, in different electrolytes, are pKinta1 = 4.4, pKinta2 = 9.6 and pKintM+ = 9.5, respectively.

  20. A Review of the Relationship between Novelty, Intrinsic Motivation and Reinforcement Learning

    Directory of Open Access Journals (Sweden)

    Siddique Nazmul

    2017-11-01

    Full Text Available This paper presents a review on the tri-partite relationship between novelty, intrinsic motivation and reinforcement learning. The paper first presents a literature survey on novelty and the different computational models of novelty detection, with a specific focus on the features of stimuli that trigger a Hedonic value for generating a novelty signal. It then presents an overview of intrinsic motivation and investigations into different models with the aim of exploring deeper co-relationships between specific features of a novelty signal and its effect on intrinsic motivation in producing a reward function. Finally, it presents survey results on reinforcement learning, different models and their functional relationship with intrinsic motivation.

  1. Crude and intrinsic birth rates for Asian countries.

    Science.gov (United States)

    Rele, J R

    1978-01-01

    An attempt to estimate birth rates for Asian countries. The main sources of information in developing countries has been census age-sex distribution, although inaccuracies in the basic data have made it difficult to reach a high degree of accuracy. Different methods bring widely varying results. The methodology presented here is based on the use of the conventional child-woman ratio from the census age-sex distribution, with a rough estimate of the expectation of life at birth. From the established relationships between child-woman ratio and the intrinsic birth rate of the nature y = a + bx + cx(2) at each level of life expectation, the intrinsic birth rate is first computed using coefficients already computed. The crude birth rate is obtained using the adjustment based on the census age-sex distribution. An advantage to this methodology is that the intrinsic birth rate, normally an involved computation, can be obtained relatively easily as a biproduct of the crude birth rates and the bases for the calculations for each of 33 Asian countries, in some cases over several time periods.

  2. Intrinsic Motivation and Flow Condition on the Music Teacher's Performance

    Science.gov (United States)

    Torres Delgado, Gabriela

    2017-01-01

    The aim of these research is to identify if music teachers and teachers from other areas are intrinsically or extrinsically motivated, to identify the dimensions of the flow state, and to identify if there is a relationship between intrinsic motivation and flow state in these teachers. The sample was made up of 738 active teachers. The presence of…

  3. LEADERSHIP STYLE AND EMPLOYEES' INTRINSIC JOB ...

    African Journals Online (AJOL)

    This study investigates the impact of leadership style on employees' intrinsic ... of many factors including motivation, leadership, job satisfaction, workers' alienation and ... Factors associated with job satisfaction include incentive to work, reward of ... advancement/promotion, recognition and self-actualization cannot be met ...

  4. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  5. Transport of Intrinsic Plutonium Colloids in Saturated Porous Media

    Science.gov (United States)

    Zhou, D.; Abdel-Fattah, A.; Boukhalfa, H.; Ware, S. D.; Tarimala, S.; Keller, A. A.

    2011-12-01

    Actinide contaminants were introduced to the subsurface environment as a result of nuclear weapons development and testing, as well as for nuclear power generation and related research activities for defense and civilian applications. Even though most actinide species were believed to be fairly immobile once in the subsurface, recent studies have shown the transport of actinides kilometers away from their disposal sites. For example, the treated liquid wastes released into Mortandad Canyon at the Los Alamos National Laboratory were predicted to travel less than a few meters; however, plutonium and americium have been detected 3.4 km away from the waste outfall. A colloid-facilitated mechanism has been suggested to account for this unexpected transport of these radioactive wastes. Clays, oxides, organic matters, and actinide hydroxides have all been proposed as the possible mobile phase. Pu ions associated with natural colloids are often referred to as pseudo-Pu colloids, in contrast with the intrinsic Pu colloids that consist of Pu oxides. Significant efforts have been made to investigate the role of pseudo-Pu colloids, while few studies have evaluated the environmental behavior of the intrinsic Pu colloids. Given the fact that Pu (IV) has extremely low solubility product constant, it can be inferred that the transport of Pu in the intrinsic form is highly likely at suitable environmental conditions. This study investigates the transport of intrinsic Pu colloids in a saturated alluvium material packed in a cylindrical column (2.5-cm Dia. x 30-cm high) and compares the results to previous data on the transport of pseudo Pu colloids in the same material. A procedure to prepare a stable intrinsic Pu colloid suspension that produced consistent and reproducible electrokinetic and stability data was developed. Electrokinetic properties and aggregation stability were characterized. The Pu colloids, together with trillium as a conservative tracer, were injected into the

  6. Secure thin client architecture for DICOM image analysis

    Science.gov (United States)

    Mogatala, Harsha V. R.; Gallet, Jacqueline

    2005-04-01

    This paper presents a concept of Secure Thin Client (STC) Architecture for Digital Imaging and Communications in Medicine (DICOM) image analysis over Internet. STC Architecture provides in-depth analysis and design of customized reports for DICOM images using drag-and-drop and data warehouse technology. Using a personal computer and a common set of browsing software, STC can be used for analyzing and reporting detailed patient information, type of examinations, date, Computer Tomography (CT) dose index, and other relevant information stored within the images header files as well as in the hospital databases. STC Architecture is three-tier architecture. The First-Tier consists of drag-and-drop web based interface and web server, which provides customized analysis and reporting ability to the users. The Second-Tier consists of an online analytical processing (OLAP) server and database system, which serves fast, real-time, aggregated multi-dimensional data using OLAP technology. The Third-Tier consists of a smart algorithm based software program which extracts DICOM tags from CT images in this particular application, irrespective of CT vendor's, and transfers these tags into a secure database system. This architecture provides Winnipeg Regional Health Authorities (WRHA) with quality indicators for CT examinations in the hospitals. It also provides health care professionals with analytical tool to optimize radiation dose and image quality parameters. The information is provided to the user by way of a secure socket layer (SSL) and role based security criteria over Internet. Although this particular application has been developed for WRHA, this paper also discusses the effort to extend the Architecture to other hospitals in the region. Any DICOM tag from any imaging modality could be tracked with this software.

  7. Learning to learn – intrinsic plasticity as a metaplasticity mechanism for memory formation

    Science.gov (United States)

    Sehgal, Megha; Song, Chenghui; Ehlers, Vanessa L.; Moyer, James R.

    2013-01-01

    “Use it or lose it” is a popular adage often associated with use-dependent enhancement of cognitive abilities. Much research has focused on understanding exactly how the brain changes as a function of experience. Such experience-dependent plasticity involves both structural and functional alterations that contribute to adaptive behaviors, such as learning and memory, as well as maladaptive behaviors, including anxiety disorders, phobias, and posttraumatic stress disorder. With the advancing age of our population, understanding how use-dependent plasticity changes across the lifespan may also help to promote healthy brain aging. A common misconception is that such experience-dependent plasticity (e.g., associative learning) is synonymous with synaptic plasticity. Other forms of plasticity also play a critical role in shaping adaptive changes within the nervous system, including intrinsic plasticity – a change in the intrinsic excitability of a neuron. Intrinsic plasticity can result from a change in the number, distribution or activity of various ion channels located throughout the neuron. Here, we review evidence that intrinsic plasticity is an important and evolutionarily conserved neural correlate of learning. Intrinsic plasticity acts as a metaplasticity mechanism by lowering the threshold for synaptic changes. Thus, learning-related intrinsic changes can facilitate future synaptic plasticity and learning. Such intrinsic changes can impact the allocation of a memory trace within a brain structure, and when compromised, can contribute to cognitive decline during the aging process. This unique role of intrinsic excitability can provide insight into how memories are formed and, more interestingly, how neurons that participate in a memory trace are selected. Most importantly, modulation of intrinsic excitability can allow for regulation of learning ability – this can prevent or provide treatment for cognitive decline not only in patients with clinical

  8. Connection between slow and fast dynamics of molecular liquids around the glass transition

    International Nuclear Information System (INIS)

    Niss, Kristine; Dalle-Ferrier, Cecile; Frick, Bernhard; Russo, Daniela; Dyre, Jeppe; Alba-Simionesco, Christiane

    2010-01-01

    The mean-square displacement (MSD) was measured by neutron scattering at various temperatures and pressures for a number of molecular glass-forming liquids. The MSD is invariant along the glass-transition line at the pressure studied, thus establishing an 'intrinsic' Lindemann criterion for any given liquid. A one-to-one connection between the MSD's temperature dependence and the liquid's fragility is found when the MSD is evaluated on a time scale of ∼4 ns, but does not hold when the MSD is evaluated at shorter times. The findings are discussed in terms of the elastic model and the role of relaxations, and the correlations between slow and fast dynamics are addressed.

  9. [EXTRINSIC AND INTRINSIC FACTORS FOR FALLS THAT CAUSED HIP FRACTURE].

    Science.gov (United States)

    Tsur, Atzmon; Shakeer, Nael; Segal, Zvi; Itah, Dorit; Eluz, Dana

    2017-05-01

    Among the reasons described as possibly causing falls in older and elderly people are extrinsic factors such as bumping into objects, slipping on a wet floor, etc., and intrinsic factors - those that occur suddenly without warning. To investigate the connection between the reasons for falls, extrinsic or intrinsic and different medical and nonmedical factors. The survey included 82 people, 53 women and 29 men, who fell and broke their hip, underwent surgery, and were treated at the Rehabilitation Department. Data showed that 39 people fell due to extrinsic factors and 43 due to intrinsic reasons. We examined the correlation with several factors, both medical and non-medical, that may have influenced the scenario of each group. Falls due to extrinsic reasons took place at all hours of the day and night, mainly in people who were alone and who wore shoes or sandals at the time of the fall and who either suffered from slight or no disturbances in attention and concentration. Falls due to intrinsic reasons occurred mainly during rest or sleep hours, in people who walked barefoot or with socks or slippers and who suffered moderate or severe disturbances in attention and concentration. Although the differences in the extrinsic vs. intrinsic reasons for falls that led to broken hips were fairly clear, it would be difficult to recommend new tools for prevention of this phenomenon. Trying to predict an infrequent future event such as a traumatic fall is inherently difficult.

  10. Intrinsic periodic and aperiodic stochastic resonance in an electrochemical cell

    Science.gov (United States)

    Tiwari, Ishant; Phogat, Richa; Parmananda, P.; Ocampo-Espindola, J. L.; Rivera, M.

    2016-08-01

    In this paper we show the interaction of a composite of a periodic or aperiodic signal and intrinsic electrochemical noise with the nonlinear dynamics of an electrochemical cell configured to study the corrosion of iron in an acidic media. The anodic voltage setpoint (V0) in the cell is chosen such that the anodic current (I ) exhibits excitable fixed point behavior in the absence of noise. The subthreshold periodic (aperiodic) signal consists of a train of rectangular pulses with a fixed amplitude and width, separated by regular (irregular) time intervals. The irregular time intervals chosen are of deterministic and stochastic origins. The amplitude of the intrinsic internal noise, regulated by the concentration of chloride ions, is then monotonically increased, and the provoked dynamics are analyzed. The signal to noise ratio and the cross-correlation coefficient versus the chloride ions' concentration curves have a unimodal shape indicating the emergence of an intrinsic periodic or aperiodic stochastic resonance. The abscissa for the maxima of these unimodal curves correspond to the optimum value of intrinsic noise where maximum regularity of the invoked dynamics is observed. In the particular case of the intrinsic periodic stochastic resonance, the scanning electron microscope images for the electrode metal surfaces are shown for certain values of chloride ions' concentrations. These images, qualitatively, corroborate the emergence of order as a result of the interaction between the nonlinear dynamics and the composite signal.

  11. Intrinsic thermodynamics of inhibitor binding to human carbonic anhydrase IX.

    Science.gov (United States)

    Linkuvienė, Vaida; Matulienė, Jurgita; Juozapaitienė, Vaida; Michailovienė, Vilma; Jachno, Jelena; Matulis, Daumantas

    2016-04-01

    Human carbonic anhydrase 9th isoform (CA IX) is an important marker of numerous cancers and is increasingly interesting as a potential anticancer drug target. Various synthetic aromatic sulfonamide-bearing compounds are being designed as potent inhibitors of CA IX. However, sulfonamide compound binding to CA IX is linked to several reactions, the deprotonation of the sulfonamide amino group and the protonation of the CA active site Zn(II)-bound hydroxide. These linked reactions significantly affect the affinities and other thermodynamic parameters such as enthalpies and entropies of binding. The observed and intrinsic affinities of compound binding to CA IX were determined by the fluorescent thermal shift assay. The enthalpies and entropies of binding were determined by the isothermal titration calorimetry. The pKa of CA IX was determined to be 6.8 and the enthalpy of CA IX-Zn(II)-bound hydroxide protonation was -24 kJ/mol. These values enabled the analysis of intrinsic thermodynamics of a library of compounds binding to CA IX. The most strongly binding compounds exhibited the intrinsic affinity of 0.01 nM and the observed affinity of 2 nM. The intrinsic thermodynamic parameters of compound binding to CA IX helped to draw the compound structure to thermodynamics relationship. It is important to distinguish the intrinsic from observed parameters of any disease target protein interaction with its inhibitors as drug candidates when drawing detailed compound structure to thermodynamics correlations. Copyright © 2016 Elsevier B.V. All rights reserved.

  12. Security patterns in practice designing secure architectures using software patterns

    CERN Document Server

    Fernandez-Buglioni, Eduardo

    2013-01-01

    Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides

  13. Database and applications security integrating information security and data management

    CERN Document Server

    Thuraisingham, Bhavani

    2005-01-01

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging

  14. Examining intrinsic versus extrinsic exercise goals: cognitive, affective, and behavioral outcomes.

    Science.gov (United States)

    Sebire, Simon J; Standage, Martyn; Vansteenkiste, Maarten

    2009-04-01

    Grounded in self-determination theory (SDT), this study had two purposes: (a) examine the associations between intrinsic (relative to extrinsic) exercise goal content and cognitive, affective, and behavioral outcomes; and (b) test the mediating role of psychological need satisfaction in the Exercise Goal Content --> Outcomes relationship. Using a sample of 410 adults, hierarchical regression analysis showed relative intrinsic goal content to positively predict physical self-worth, self-reported exercise behavior, psychological well-being, and psychological need satisfaction and negatively predict exercise anxiety. Except for exercise behavior, the predictive utility of relative intrinsic goal content on the dependent variables of interest remained significant after controlling for participants' relative self-determined exercise motivation. Structural equation modeling analyses showed psychological need satisfaction to partially mediate the effect of relative intrinsic goal content on the outcome variables. Our findings support further investigation of exercise goals commensurate with the goal content perspective advanced in SDT.

  15. The House of Security: Stakeholder Perceptions of Security Assessment and Importance

    OpenAIRE

    Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane

    2007-01-01

    In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the €܈ouse of Security€ݬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...

  16. Securing Land Tenure, Improving Food Security and Reducing ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Securing Land Tenure, Improving Food Security and Reducing Poverty in Rural ... land tenure regimes as obstacles to food security, economic integration and ... its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  17. Intrinsic motivation and extrinsic incentives jointly predict performance: a 40-year meta-analysis.

    Science.gov (United States)

    Cerasoli, Christopher P; Nicklin, Jessica M; Ford, Michael T

    2014-07-01

    More than 4 decades of research and 9 meta-analyses have focused on the undermining effect: namely, the debate over whether the provision of extrinsic incentives erodes intrinsic motivation. This review and meta-analysis builds on such previous reviews by focusing on the interrelationship among intrinsic motivation, extrinsic incentives, and performance, with reference to 2 moderators: performance type (quality vs. quantity) and incentive contingency (directly performance-salient vs. indirectly performance-salient), which have not been systematically reviewed to date. Based on random-effects meta-analytic methods, findings from school, work, and physical domains (k = 183, N = 212,468) indicate that intrinsic motivation is a medium to strong predictor of performance (ρ = .21-45). The importance of intrinsic motivation to performance remained in place whether incentives were presented. In addition, incentive salience influenced the predictive validity of intrinsic motivation for performance: In a "crowding out" fashion, intrinsic motivation was less important to performance when incentives were directly tied to performance and was more important when incentives were indirectly tied to performance. Considered simultaneously through meta-analytic regression, intrinsic motivation predicted more unique variance in quality of performance, whereas incentives were a better predictor of quantity of performance. With respect to performance, incentives and intrinsic motivation are not necessarily antagonistic and are best considered simultaneously. Future research should consider using nonperformance criteria (e.g., well-being, job satisfaction) as well as applying the percent-of-maximum-possible (POMP) method in meta-analyses. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  18. Fluxons in long and annular intrinsic Josephson junction stacks

    CERN Document Server

    Clauss, T; Moessle, M; Müller, A; Weber, A; Kölle, D; Kleiner, R

    2002-01-01

    A promising approach towards a THz oscillator based on intrinsic Josephson junctions in high-temperature superconductors is based on the collective motion of Josephson fluxons, which are predicted to form various configurations ranging from a triangular to a quadratic lattice. Not only for this reason, but certainly also for the sake of basic physics, several experimental and theoretical investigations have been done on the subject of collective fluxon dynamics in stacked intrinsic Josephson junctions. In this paper we will present some experimental results on the fluxon dynamics of long intrinsic Josephson junction stacks made of Bi sub 2 Sr sub 2 CaCu sub 2 O sub 8. The stacks were formed either in an open or in an annular geometry, and clear resonant fluxon modes were observed. Experiments discussed include measurements of current-voltage characteristics in external magnetic fields and in external microwave fields.

  19. Intrinsic motivation and learning in a schizophrenia spectrum sample.

    Science.gov (United States)

    Choi, Jimmy; Medalia, Alice

    2010-05-01

    A motivation is a telling hallmark of negative symptomatology in schizophrenia, and it impacts nearly every facet of behavior, including inclination to attempt the difficult cognitive tasks involved in cognitive remediation therapy. Experiences of external reward, reinforcement, and hedonic anticipatory enjoyment are diminished in psychosis, so therapeutics which instead target intrinsic motivation for cognitive tasks may enhance task engagement, and subsequently, remediation outcome. We examined whether outpatients could attain benefits from an intrinsically motivating instructional approach which (a) presents learning materials in a meaningful game-like context, (b) personalizes elements of the learning materials into themes of high interest value, and (c) offers choices so patients can increase their control over the learning process. We directly compared one learning method that incorporated the motivational paradigm into an arithmetic learning program against another method that carefully manipulated out the motivational variables in the same learning program. Fifty-seven subjects with schizophrenia or schizoaffective disorder were randomly assigned to one of the two learning programs for 10 thirty-minute sessions while an intent-to-treat convenience subsample (n=15) was used to account for practice effect. Outcome measures were arithmetic learning, attention, motivation, self competency, and symptom severity. Results showed the motivational group (a) acquired more arithmetic skill, (b) possessed greater intrinsic motivation for the task, (c) reported greater feelings of self competency post-treatment, and (d) demonstrated better post-test attention. Interestingly, baseline perception of self competency was a significant predictor of post-test arithmetic scores. Results demonstrated that incorporating intrinsically motivating instructional techniques into a difficult cognitive task promoted greater learning of the material, higher levels of intrinsic

  20. Functions of intrinsic disorder in transmembrane proteins

    DEFF Research Database (Denmark)

    Kjaergaard, Magnus; Kragelund, Birthe B.

    2017-01-01

    Intrinsic disorder is common in integral membrane proteins, particularly in the intracellular domains. Despite this observation, these domains are not always recognized as being disordered. In this review, we will discuss the biological functions of intrinsically disordered regions of membrane...... receptors. The functions of the disordered regions are many and varied. We will discuss selected examples including: (1) Organization of receptors, kinases, phosphatases and second messenger sources into signaling complexes. (2) Modulation of the membrane-embedded domain function by ball-and-chain like...... mechanisms. (3) Trafficking of membrane proteins. (4) Transient membrane associations. (5) Post-translational modifications most notably phosphorylation and (6) disorder-linked isoform dependent function. We finish the review by discussing the future challenges facing the membrane protein community regarding...

  1. Survey of intrinsic states of light nuclei

    International Nuclear Information System (INIS)

    Brink, D.M.

    1975-01-01

    The resonating group method and the generator coordinate method are two closely related theories of nuclear structure which can be used to construct wave functions describing cluster structures. In both cases the form of the intrinsic state implies a selection of those degrees of freedom which are regarded as being important for the problem under consideration. The form of the intrinsic state also corresponds to a particular truncation of the shell model space. In the resonating group method the effect of the Pauli principle leads to forbidden or redundant states of relative motion of clusters. An improved understanding of the role of forbidden states in the theory has led to important advances in the phenomenological description of cluster structures in nuclei. 3 tables, 2 figures

  2. Overview of IAEA Activities in Support of Fast Reactors Development and Deployment & Objectives of this Meeting

    International Nuclear Information System (INIS)

    Monti, Stefano

    2012-01-01

    FRs in a closed fuel cycle represent the only available nuclear technology able to guarantee the full sustainability of nuclear energy (virtually unlimited natural resources of nuclear fuel and drastic reduction of the requirements of the geological repository). FR technology has been brought to high level of maturity by the design, construction and operation of several experimental, demonstrative and power fast reactors worldwide. The largest experience is for SFR with oxide and metal fuel. Safety features of FRs are rather different compared to thermal reactors due to the fast spectrum and the different plant configuration. Reactivity effects play an important role in the design of innovative FRs: they represent the first safety system provided by the intrinsic physical configuration of the core. IAEA is supporting Member States representing a platform to share knowledge and identify technology gaps and R&D needs. Within the TWG-FR, different CRPs aimed at the improvement of FR safety design have been carrying out

  3. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  4. What's in a name? : Why these proteins are intrinsically disordered: Why these proteins are intrinsically disordered

    NARCIS (Netherlands)

    Dunker, A Keith; Babu, M Madan; Barbar, Elisar; Blackledge, Martin; Bondos, Sarah E; Dosztányi, Zsuzsanna; Dyson, H Jane; Forman-Kay, Julie; Fuxreiter, Monika; Gsponer, Jörg; Han, Kyou-Hoon; Jones, David T; Longhi, Sonia; Metallo, Steven J; Nishikawa, Ken; Nussinov, Ruth; Obradovic, Zoran; Pappu, Rohit V; Rost, Burkhard; Selenko, Philipp; Subramaniam, Vinod; Sussman, Joel L; Tompa, Peter; Uversky, Vladimir N

    2013-01-01

    "What's in a name? That which we call a rose By any other name would smell as sweet." From "Romeo and Juliet", William Shakespeare (1594) This article opens a series of publications on disambiguation of the basic terms used in the field of intrinsically disordered proteins. We start from the

  5. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  6. Transient coupled calculations of the Molten Salt Fast Reactor using the Transient Fission Matrix approach

    Energy Technology Data Exchange (ETDEWEB)

    Laureau, A., E-mail: laureau.axel@gmail.com; Heuer, D.; Merle-Lucotte, E.; Rubiolo, P.R.; Allibert, M.; Aufiero, M.

    2017-05-15

    Highlights: • Neutronic ‘Transient Fission Matrix’ approach coupled to the CFD OpenFOAM code. • Fission Matrix interpolation model for fast spectrum homogeneous reactors. • Application for coupled calculations of the Molten Salt Fast Reactor. • Load following, over-cooling and reactivity insertion transient studies. • Validation of the reactor intrinsic stability for normal and accidental transients. - Abstract: In this paper we present transient studies of the Molten Salt Fast Reactor (MSFR). This generation IV reactor is characterized by a liquid fuel circulating in the core cavity, requiring specific simulation tools. An innovative neutronic approach called “Transient Fission Matrix” is used to perform spatial kinetic calculations with a reduced computational cost through a pre-calculation of the Monte Carlo spatial and temporal response of the system. Coupled to this neutronic approach, the Computational Fluid Dynamics code OpenFOAM is used to model the complex flow pattern in the core. An accurate interpolation model developed to take into account the thermal hydraulics feedback on the neutronics including reactivity and neutron flux variation is presented. Finally different transient studies of the reactor in normal and accidental operating conditions are detailed such as reactivity insertion and load following capacities. The results of these studies illustrate the excellent behavior of the MSFR during such transients.

  7. Transient coupled calculations of the Molten Salt Fast Reactor using the Transient Fission Matrix approach

    International Nuclear Information System (INIS)

    Laureau, A.; Heuer, D.; Merle-Lucotte, E.; Rubiolo, P.R.; Allibert, M.; Aufiero, M.

    2017-01-01

    Highlights: • Neutronic ‘Transient Fission Matrix’ approach coupled to the CFD OpenFOAM code. • Fission Matrix interpolation model for fast spectrum homogeneous reactors. • Application for coupled calculations of the Molten Salt Fast Reactor. • Load following, over-cooling and reactivity insertion transient studies. • Validation of the reactor intrinsic stability for normal and accidental transients. - Abstract: In this paper we present transient studies of the Molten Salt Fast Reactor (MSFR). This generation IV reactor is characterized by a liquid fuel circulating in the core cavity, requiring specific simulation tools. An innovative neutronic approach called “Transient Fission Matrix” is used to perform spatial kinetic calculations with a reduced computational cost through a pre-calculation of the Monte Carlo spatial and temporal response of the system. Coupled to this neutronic approach, the Computational Fluid Dynamics code OpenFOAM is used to model the complex flow pattern in the core. An accurate interpolation model developed to take into account the thermal hydraulics feedback on the neutronics including reactivity and neutron flux variation is presented. Finally different transient studies of the reactor in normal and accidental operating conditions are detailed such as reactivity insertion and load following capacities. The results of these studies illustrate the excellent behavior of the MSFR during such transients.

  8. Correction for intrinsic and set dead-time losses in radioactivity counting

    International Nuclear Information System (INIS)

    Wyllie, H.A.

    1992-12-01

    Equations are derived for the determination of the intrinsic dead time of the components which precede the paralysis unit in a counting system for measuring radioactivity. The determination depends on the extension of the set dead time by the intrinsic dead time. Improved formulae are given for the dead-time correction of the count rate of a radioactive source in a single-channel system. A variable in the formulae is the intrinsic dead time which is determined concurrently with the counting of the source. The only extra equipment required in a conventional system is a scaler. 5 refs., 2 tabs., 21 figs

  9. End-to-end Information Flow Security Model for Software-Defined Networks

    Directory of Open Access Journals (Sweden)

    D. Ju. Chaly

    2015-01-01

    Full Text Available Software-defined networks (SDN are a novel paradigm of networking which became an enabler technology for many modern applications such as network virtualization, policy-based access control and many others. Software can provide flexibility and fast-paced innovations in the networking; however, it has a complex nature. In this connection there is an increasing necessity of means for assuring its correctness and security. Abstract models for SDN can tackle these challenges. This paper addresses to confidentiality and some integrity properties of SDNs. These are critical properties for multi-tenant SDN environments, since the network management software must ensure that no confidential data of one tenant are leaked to other tenants in spite of using the same physical infrastructure. We define a notion of end-to-end security in context of software-defined networks and propose a semantic model where the reasoning is possible about confidentiality, and we can check that confidential information flows do not interfere with non-confidential ones. We show that the model can be extended in order to reason about networks with secure and insecure links which can arise, for example, in wireless environments.The article is published in the authors’ wording.

  10. Patterns of intrinsic bioremediation at two U.S. Air Force bases

    International Nuclear Information System (INIS)

    Wiedemeier, T.H.; Swanson, M.A.; Wilson, J.T.; Kampbell, D.H.

    1995-01-01

    Intrinsic bioremediation of benzene, toluene, ethylbenzene, and xylenes (BTEX) occurs when indigenous microorganisms work to reduce the total mass of contamination in the subsurface without the addition of nutrients. A conservative tracer, such as trimethylbenzene, found commingled with the contaminant plume can be used to distinguish between attenuation caused by dispersion, dilution from recharge, volatilization, and sorption and attenuation caused by biodegradation. Patterns of intrinsic bioremediation can vary markedly from site to site depending on governing physical, biological, and chemical processes. Intrinsic bioremediation causes measurable changes in groundwater chemistry. Specifically, concentrations of contaminants, dissolved oxygen, nitrate, ferrous iron, sulfate, and methane in groundwater change both temporally and spatially as biodegradation proceeds Operations at Hill Air Force Base (AFB) and Patrick AFB resulted in fuel-hydrocarbon contamination of soil and groundwater. In both cases, trimethylbenzene data confirm that dissolved BTEX is biodegrading. Geochemical evidence from the Hill AFB site suggests that aerobic respiration, denitrification, iron reduction, sulfate reduction, and methanogenesis all are contributing to intrinsic bioremediation of dissolved BTEX. Sulfate reduction is the dominant biodegradation mechanism at this site. Geochemical evidence from Patrick AFB suggests that aerobic respiration, iron reduction, and methanogenesis are contributing to intrinsic bioremediation of dissolved BTEX. Methanogenesis is the dominant biodegradation mechanism at this site

  11. Digested disorder: Quarterly intrinsic disorder digest (April-May-June, 2013).

    Science.gov (United States)

    DeForte, Shelly; Reddy, Krishna D; Uversky, Vladimir N

    2013-01-01

    The current literature on intrinsically disordered proteins is overwhelming. To keep interested readers up to speed with this literature, we continue a "Digested Disorder" project and represent a series of reader's digest type articles objectively representing the research papers and reviews on intrinsically disordered proteins. The only 2 criteria for inclusion in this digest are the publication date (a paper should be published within the covered time frame) and topic (a paper should be dedicated to any aspect of protein intrinsic disorder). The current digest issue covers papers published during the period of April, May, and June of 2013. The papers are grouped hierarchically by topics they cover, and for each of the included paper a short description is given on its major findings.

  12. Determination of intrinsic attenuation in the oceanic lithosphere-asthenosphere system

    Science.gov (United States)

    Takeuchi, Nozomu; Kawakatsu, Hitoshi; Shiobara, Hajime; Isse, Takehi; Sugioka, Hiroko; Ito, Aki; Utada, Hisashi

    2017-12-01

    We recorded P and S waves traveling through the oceanic lithosphere-asthenosphere system (LAS) using broadband ocean-bottom seismometers in the northwest Pacific, and we quantitatively separated the intrinsic (anelastic) and extrinsic (scattering) attenuation effects on seismic wave propagation to directly infer the thermomechanical properties of the oceanic LAS. The strong intrinsic attenuation in the asthenosphere obtained at higher frequency (~3 hertz) is comparable to that constrained at lower frequency (~100 seconds) by surface waves and suggests frequency-independent anelasticity, whereas the intrinsic attenuation in the lithosphere is frequency dependent. This difference in frequency dependence indicates that the strong and broad peak dissipation recently observed in the laboratory exists only in the asthenosphere and provides new insight into what distinguishes the asthenosphere from the lithosphere.

  13. A Review of the UK Fast Reactor Programme: March 1980

    International Nuclear Information System (INIS)

    Smith, R.D.

    1980-01-01

    Commercial Fast Reactor (CFR) have concentrated on reducing the capital cost and improving the intrinsic safety of the reactor. Particular attention is being paid to achieving the necessary guarantees of structural reliability for those internal structures which are difficult to inspect and good progress has been made in this area, particularly in providing redundancy in the key reactor structures. International collaboration continues to play a large part in the UK programme and there is an active exchange between the UK and all those countries with operating fast reactors. A particular step forward was the signing of an agreement between the AEA and the USDOE for a programme of work on fuel testing, which is aimed to provide important confirmatory work on the safety of fuel in fast reactors. This programme envisages the destructive testing in the US safety test reactor TREAT at Idaho of fast reactor pins of both UK and US origin which have been irradiated in PFR and then shipped across the Atlantic for testing

  14. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  15. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  16. Comparing Effects of Intrinsic and Extrinsic Social Values Between Younger and Older Employees.

    Science.gov (United States)

    Yeung, Dannii Y; Fung, Helene H; Chan, Darius K-S

    2016-08-17

    Socioemotional selectivity theory proposes that older adults emphasize emotional goals and interpersonal closeness to a greater extent than do younger adults, suggesting that holding social work-related values (SWVs) may be beneficial to older employees. This project aimed at examining two dimensions of SWVs, intrinsic and extrinsic SWVs, and tested whether age and work situation would moderate their effects on self-rated job performance. A cross-sectional survey (Study 1, N = 357) and a 14-day experience sampling study (Study 2, N = 77) were conducted among Chinese managerial employees. Study 1 showed that the direct effect of intrinsic SWVs on self-rated job performance was stronger in older employees than in younger employees. Study 2 demonstrated that older employees who valued intrinsic SWVs while being in social situations performed much better than when they did not value intrinsic SWVs but being in social situations; however such positive effect was not shown in younger employees. Findings of this project reveal that the effect of SWVs varies across locus of effect (intrinsic versus extrinsic), age, and work situation. Among older employees, the positive effect of intrinsic SWVs is more crucial than that of extrinsic SWVs on self-rated job performance. Findings of this project imply that intrinsically rewarding incentives would be more effective in motivating older employees to reach peak performance.

  17. Diminished neural responses predict enhanced intrinsic motivation and sensitivity to external incentive.

    Science.gov (United States)

    Marsden, Karen E; Ma, Wei Ji; Deci, Edward L; Ryan, Richard M; Chiu, Pearl H

    2015-06-01

    The duration and quality of human performance depend on both intrinsic motivation and external incentives. However, little is known about the neuroscientific basis of this interplay between internal and external motivators. Here, we used functional magnetic resonance imaging to examine the neural substrates of intrinsic motivation, operationalized as the free-choice time spent on a task when this was not required, and tested the neural and behavioral effects of external reward on intrinsic motivation. We found that increased duration of free-choice time was predicted by generally diminished neural responses in regions associated with cognitive and affective regulation. By comparison, the possibility of additional reward improved task accuracy, and specifically increased neural and behavioral responses following errors. Those individuals with the smallest neural responses associated with intrinsic motivation exhibited the greatest error-related neural enhancement under the external contingency of possible reward. Together, these data suggest that human performance is guided by a "tonic" and "phasic" relationship between the neural substrates of intrinsic motivation (tonic) and the impact of external incentives (phasic).

  18. Enterprise Mac Security Mac OS X Snow Leopard Security

    CERN Document Server

    Edge, Stephen Charles; Hunter, Beau; Sullivan, Gene; LeBlanc, Dee-Ann

    2010-01-01

    A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing s

  19. Learning Enhances Intrinsic Excitability in a Subset of Lateral Amygdala Neurons

    Science.gov (United States)

    Sehgal, Megha; Ehlers, Vanessa L.; Moyer, James R., Jr.

    2014-01-01

    Learning-induced modulation of neuronal intrinsic excitability is a metaplasticity mechanism that can impact the acquisition of new memories. Although the amygdala is important for emotional learning and other behaviors, including fear and anxiety, whether learning alters intrinsic excitability within the amygdala has received very little…

  20. Original Paper Detecting Nosocomial Intrinsic Infections through ...

    African Journals Online (AJOL)

    2011-04-20

    Apr 20, 2011 ... surgical procedures as precursory to intrinsic infections and that bacterial pathogens found on wounds and endogenous ... University Teaching Hospital, Idi Araba, Lagos, ..... confirm reason for selective decontamination of the.

  1. Intrinsic cylindrical and spherical waves

    International Nuclear Information System (INIS)

    Ludlow, I K

    2008-01-01

    Intrinsic waveforms associated with cylindrical and spherical Bessel functions are obtained by eliminating the factors responsible for the inverse radius and inverse square radius laws of wave power per unit area of wavefront. The resulting expressions are Riccati-Bessel functions for both cases and these can be written in terms of amplitude and phase functions of order v and wave variable z. When z is real, it is shown that a spatial phase angle of the intrinsic wave can be defined and this, together with its amplitude function, is systematically investigated for a range of fixed orders and varying z. The derivatives of Riccati-Bessel functions are also examined. All the component functions exhibit different behaviour in the near field depending on the order being less than, equal to or greater than 1/2. Plots of the phase angle can be used to display the locations of the zeros of the general Riccati-Bessel functions and lead to new relations concerning the ordering of the real zeros of Bessel functions and the occurrence of multiple zeros when the argument of the Bessel function is fixed

  2. Organisational Learning and Employees' Intrinsic Motivation

    Science.gov (United States)

    Remedios, Richard; Boreham, Nick

    2004-01-01

    This study examined the effects of organisational learning initiatives on employee motivation. Four initiatives consistent with theories of organisational learning were a priori ranked in terms of concepts that underpin intrinsic-motivation theory. Eighteen employees in a UK petrochemical company were interviewed to ascertain their experiences of…

  3. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  4. Assessing Individual-Level Factors Supporting Student Intrinsic Motivation in Online Discussions: A Qualitative Study

    Science.gov (United States)

    Shroff, Ronnie H.; Vogel, Douglas R.; Coombes, John

    2008-01-01

    Research has established that intrinsic motivation has a positive effect on learning and academic achievement. However, little is known about the impact of different technology-supported learning activities on student intrinsic motivation or whether such learning activities significantly enhance student intrinsic motivation compared to traditional…

  5. SWAN - Detection of explosives by means of fast neutron activation analysis

    Energy Technology Data Exchange (ETDEWEB)

    Gierlik, M., E-mail: m.gierlik@ncbj.gov.pl; Borsuk, S.; Guzik, Z.; Iwanowska, J.; Kaźmierczak, Ł.; Korolczuk, S.; Kozłowski, T.; Krakowski, T.; Marcinkowski, R.; Swiderski, L.; Szeptycka, M.; Szewiński, J.; Urban, A.

    2016-10-21

    In this work we report on SWAN, the experimental, portable device for explosives detection. The device was created as part of the EU Structural Funds Project “Accelerators & Detectors” (POIG.01.01.02-14-012/08-00), with the goal to increase beneficiary's expertise and competencies in the field of neutron activation analysis. Previous experiences and budged limitations lead toward a less advanced design based on fast neutron interactions and unsophisticated data analysis with the emphasis on the latest gamma detection and spectrometry solutions. The final device has been designed as a portable, fast neutron activation analyzer, with the software optimized for detection of carbon, nitrogen and oxygen. SWAN's performance in the role of explosives detector is elaborated in this paper. We demonstrate that the unique features offered by neutron activation analysis might not be impressive enough when confronted with practical demands and expectations of a generic homeland security customer.

  6. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  7. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  8. Do monetary rewards crowd out intrinsic motivations of volunteers? Some empirical evidence for Italian volunteers

    OpenAIRE

    Damiano Fiorillo

    2009-01-01

    The paper studies the determinants of regular volunteering departing from previous literature on extrinsic and intrinsic motivations. It contributes to the literature investigating the role of monetary rewards to influence intrinsic motivation. Using a simple framework that allows me to study the effect of monetary rewards on intrinsic motivation, the paper shows, controlling for endogenous bias, that monetary rewards crowd-out intrinsic motivation.

  9. Intrinsic kinetic parameters of substrate utilization by immobilized anaerobic sludge.

    Science.gov (United States)

    Zaiat, M; Vieira, L G; Foresti, E

    1997-01-20

    This article presents a method for evaluating the intrinsic kinetic parameters of the specific substrate utilization rate (r) equation and discusses the results obtained for anaerobic sludge-bed samples taken from a horizontal-flow anaerobic immobilized sludge (HAIS) reactor. This method utilizes a differential reactor filled with polyurethane foam matrices containing immobilized anaerobic sludge which is subjected to a range of feeding substrate flow rates. The range of liquid superficial velocities thus obtained are used for generating data of observed specific substrate utilization rates (r(obs)) under a diversity of external mass transfer resistance conditions. The r(obs) curves are then adjusted to permit their extrapolation for the condition of no external mass transfer resistance, and the values determined are used as a test for the condition of absence of limitation of internal mass transfer. The intrinsic parameters r(max), the maximum specific substrate utilization rate, and K(s), the half-velocity coefficient, are evaluated from the r values under no external mass transfer resistance and no internal mass transfer limitation. The application of such a method for anaerobic sludge immobilized in polyurethane foam particles treating a glucose substrate at 30 degrees C resulted in intrinsic r(max) and K(s), respectively, of 0.330 mg chemical oxygen demand (COD) . mg(-1) volatile suspended solids (VSS) . h(-1) and 72 mg COD . L(-1). In comparison with the values found in the literature, intrinsic r(max) is significantly high and intrinsic K(s) is relatively low. (c) 1997 John Wiley & Sons, Inc.

  10. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  11. Incremental Learning of Skill Collections based on Intrinsic Motivation

    Directory of Open Access Journals (Sweden)

    Jan Hendrik Metzen

    2013-07-01

    Full Text Available Life-long learning of reusable, versatile skills is a key prerequisite forembodied agents that act in a complex, dynamic environment and are faced withdifferent tasks over their lifetime. We address the question of how an agentcan learn useful skills efficiently during a developmental period,i.e., when no task is imposed on him and no external reward signal is provided.Learning of skills in a developmental period needs to be incremental andself-motivated. We propose a new incremental, task-independent skill discoveryapproach that is suited for continuous domains. Furthermore, the agent learnsspecific skills based on intrinsic motivation mechanisms thatdetermine on which skills learning is focused at a given point in time. Weevaluate the approach in a reinforcement learning setup in two continuousdomains with complex dynamics. We show that an intrinsically motivated, skilllearning agent outperforms an agent which learns task solutions from scratch.Furthermore, we compare different intrinsic motivation mechanisms and howefficiently they make use of the agent's developmental period.

  12. Role of "intrinsic charm" in semileptonic B-meson decays

    CERN Document Server

    Breidenbach, C; Mannel, T; Turczyk, S

    2008-01-01

    We discuss the role of so-called "intrinsic-charm" operators in semi-leptonic B-meson decays, which appear first at order 1/m_b^3 in the heavy quark expansion. We show by explicit calculation that -- at scales mu <= m_c -- the contributions from "intrinsic-charm" effects can be absorbed into short-distance coefficient functions multiplying, for instance, the Darwin term. Then, the only remnant of "intrinsic charm" are logarithms of the form ln(m_c^2/m_b^2), which can be resummed by using renormalization-group techniques. As long as the dynamics at the charm-quark scale is perturbative, alpha_s(m_c) << 1, this implies that no additional non-perturbative matrix elements aside from the Darwin and the spin-orbit term have to be introduced at order 1/m_b^3. Hence, no sources for additional hadronic uncertainties have to be taken into account. Similar arguments may be made for higher orders in the 1/m_b expansion.

  13. Intrinsic photocatalytic assessment of reactively sputtered TiO₂ films.

    Science.gov (United States)

    Rafieian, Damon; Driessen, Rick T; Ogieglo, Wojciech; Lammertink, Rob G H

    2015-04-29

    Thin TiO2 films were prepared by DC magnetron reactive sputtering at different oxygen partial pressures. Depending on the oxygen partial pressure during sputtering, a transition from metallic Ti to TiO2 was identified by spectroscopic ellipsometry. The crystalline nature of the film developed during a subsequent annealing step, resulting in thin anatase TiO2 layers, displaying photocatalytic activity. The intrinsic photocatalytic activity of the catalysts was evaluated for the degradation of methylene blue (MB) using a microfluidic reactor. A numerical model was employed to extract the intrinsic reaction rate constants. High conversion rates (90% degradation within 20 s residence time) were observed within these microreactors because of the efficient mass transport and light distribution. To evaluate the intrinsic reaction kinetics, we argue that mass transport has to be accounted for. The obtained surface reaction rate constants demonstrate very high reactivity for the sputtered TiO2 films. Only for the thinnest film, 9 nm, slightly lower kinetics were observed.

  14. Functional Advantages of Conserved Intrinsic Disorder in RNA-Binding Proteins

    OpenAIRE

    Varadi, Mihaly; Zsolyomi, Fruzsina; Guharoy, Mainak; Tompa, Peter

    2015-01-01

    Proteins form large macromolecular assemblies with RNA that govern essential molecular processes. RNA-binding proteins have often been associated with conformational flexibility, yet the extent and functional implications of their intrinsic disorder have never been fully assessed. Here, through large-scale analysis of comprehensive protein sequence and structure datasets we demonstrate the prevalence of intrinsic structural disorder in RNA-binding proteins and domains. We addressed their func...

  15. The detrimental effects of extrinsic reinforcement on “Intrinsic motivation”

    OpenAIRE

    Dickinson, Alyce M.

    1989-01-01

    Extrinsic consequences have been criticized on the grounds that they decrease intrinsic motivation or internally initiated behavior. Two popular rationales for this criticism, Lepper's overjustification hypothesis (1981) and Deci's motivational theory (Deci & Ryan, 1985), are reviewed and the criticism is then redefined behaviorally. “Intrinsically controlled” behavior is defined as behavior maintained by response-produced reinforcers, and the question concerning extrinsic consequences is thu...

  16. Sequence periodicity in nucleosomal DNA and intrinsic curvature.

    Science.gov (United States)

    Nair, T Murlidharan

    2010-05-17

    Most eukaryotic DNA contained in the nucleus is packaged by wrapping DNA around histone octamers. Histones are ubiquitous and bind most regions of chromosomal DNA. In order to achieve smooth wrapping of the DNA around the histone octamer, the DNA duplex should be able to deform and should possess intrinsic curvature. The deformability of DNA is a result of the non-parallelness of base pair stacks. The stacking interaction between base pairs is sequence dependent. The higher the stacking energy the more rigid the DNA helix, thus it is natural to expect that sequences that are involved in wrapping around the histone octamer should be unstacked and possess intrinsic curvature. Intrinsic curvature has been shown to be dictated by the periodic recurrence of certain dinucleotides. Several genome-wide studies directed towards mapping of nucleosome positions have revealed periodicity associated with certain stretches of sequences. In the current study, these sequences have been analyzed with a view to understand their sequence-dependent structures. Higher order DNA structures and the distribution of molecular bend loci associated with 146 base nucleosome core DNA sequence from C. elegans and chicken have been analyzed using the theoretical model for DNA curvature. The curvature dispersion calculated by cyclically permuting the sequences revealed that the molecular bend loci were delocalized throughout the nucleosome core region and had varying degrees of intrinsic curvature. The higher order structures associated with nucleosomes of C.elegans and chicken calculated from the sequences revealed heterogeneity with respect to the deviation of the DNA axis. The results points to the possibility of context dependent curvature of varying degrees to be associated with nucleosomal DNA.

  17. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  18. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  19. Assessing and comparing information security in swiss hospitals.

    Science.gov (United States)

    Landolt, Sarah; Hirschel, Jürg; Schlienger, Thomas; Businger, Walter; Zbinden, Alex M

    2012-11-07

    Availability of information in hospitals is an important prerequisite for good service. Significant resources have been invested to improve the availability of information, but it is also vital that the security of this information can be guaranteed. The goal of this study was to assess information security in hospitals through a questionnaire based on the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) standard ISO/IEC 27002, evaluating Information technology - Security techniques - Code of practice for information-security management, with a special focus on the effect of the hospitals' size and type. The survey, set up as a cross-sectional study, was conducted in January 2011. The chief information officers (CIOs) of 112 hospitals in German-speaking Switzerland were invited to participate. The online questionnaire was designed to be fast and easy to complete to maximize participation. To group the analyzed controls of the ISO/IEC standard 27002 in a meaningful way, a factor analysis was performed. A linear score from 0 (not implemented) to 3 (fully implemented) was introduced. The scores of the hospitals were then analyzed for significant differences in any of the factors with respect to size and type of hospital. The participating hospitals were offered a benchmark report about their status. The 51 participating hospitals had an average score of 51.1% (range 30.6% - 81.9%) out of a possible 100% where all items in the questionnaire were fully implemented. Room for improvement could be identified, especially for the factors covering "process and quality management" (average score 1.3 ± 0.8 out of a maximum of 3) and "organization and risk management" (average score 1.3 ± 0.7 out of a maximum of 3). Private hospitals scored significantly higher than university hospitals in the implementation of "security zones" and "backup" (P = .008). Half (50.00%, 8588/17,177) of all assessed hospital beds

  20. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...