WorldWideScience

Sample records for key ret adaptor-docking

  1. Key Roles for MYC, KIT and RET signaling in secondary angiosarcomas

    DEFF Research Database (Denmark)

    Styring, E; Seinen, J; Dominguez-Valentin, M

    2014-01-01

    of the gene signature to an external data set. RESULTS: In total, 103 genes were significantly deregulated between primary and secondary angiosarcomas. Secondary angiosarcomas showed upregulation of MYC, KIT and RET and downregulation of CDKN2C. Functional annotation analysis identified multiple target genes...... in the receptor protein tyrosine kinase pathway. The results were validated using RT-qPCR and immunohistochemistry. Further, the gene signature was applied to an external data set and, herein, distinguished primary from secondary angiosarcomas. CONCLUSIONS: Upregulation of MYC, KIT and RET and downregulation......BACKGROUND: Angiosarcomas may develop as primary tumours of unknown cause or as secondary tumours, most commonly following radiotherapy to the involved field. The different causative agents may be linked to alternate tumorigenesis, which led us to investigate the genetic profiles of morphologically...

  2. Anmeldelse : Howard Zehr: Genoprettende Ret

    DEFF Research Database (Denmark)

    Adrian, Lin

    2010-01-01

    Anmeldelse af Howard Zehr: Genoprettende ret, der udkom i 2008. Oversat fra engelsk: Restorative Justice Udgivelsesdato: august 2010......Anmeldelse af Howard Zehr: Genoprettende ret, der udkom i 2008. Oversat fra engelsk: Restorative Justice Udgivelsesdato: august 2010...

  3. Konsulent året rundt

    DEFF Research Database (Denmark)

    Stenderup, Mogens Larsen; Næsby, Torben

    Udgangspunktet for indholdet i Konsulent året rundt har været konsulenttjenesten i Aalborg Kommunes Reggio Emilia projekt. Konsulenter spiller en væsentlig rolle i de pædagogiske analyser og fungerer som en helt integreret del af praksis i denne filosofi. Derfor får konsulentarbejdet en helt...

  4. Sediments of a retting yard

    Digital Repository Service at National Institute of Oceanography (India)

    Remani, K.N.; Venugopal, P.; Devi, K.S.; Unnithan, R.V.

    (av. 46.8 and 92.3 mg/g respectively) compared to the reference station (20.6 and 48.9 mg/g) and published data on estuarine sediments.C/N ratios were consistently higher in the retting yard. Organic nitrogen, however,did not show this trend. Annual...

  5. ret en daarna

    NARCIS (Netherlands)

    Dommering, E.; Geus, M.J.; Hins, A.W.; Kroes, Q.R.; Nieuwenhuis, A.J.; Pietermaat, E.C.; Turner, C.J.; Voorhoof, D.

    2013-01-01

    In de zaak Féret1 veroordeelde het EHRM de haatzaaiende politicus voor discriminatie en aanzetten tot racisme, zonder dat in concreto een daad tot aanzetten van geweld of discriminatie door de nationale rechter was vastgesteld. Dit blijft, ondanks interne discussie in het Hof, vaste jurisprudentie.

  6. Retort to Religious Critics of RET.

    Science.gov (United States)

    Nardi, Thomas J.

    This paper is concerned with people who contact clergymen for counseling who could benefit from the short-term directive therapeutic approach of Rational Emotive Therapy (RET) and the reluctance of clergymen to use RET. The integration of the precepts of Christianity and the concepts of RET is considered. This paper is specifically a response to…

  7. Comparative Evaluation of Physical and Structural Properties of Water Retted and Non-retted Flax Fibers

    Directory of Open Access Journals (Sweden)

    Vijaya Raghavan

    2013-10-01

    Full Text Available Flax stems of Modran variety were subjected to water retting under laboratory conditions and its physical properties were compared with non-retted fibers. Physical properties including percentage of impurities, weighted average length, linear density, tenacity and elongation were analyzed and the results were compared. The analysis of retted and non-retted flax fibers showed that retting is the most important step in the processing of flax fibers and it directly affects quality attributes like strength, fineness, and homogeneity. Scanning Electron microscope images of fibers were also analyzed and the retted fibers showed much cleaner surface when compared to decorticated non-retted fibers.

  8. Forårets urter

    DEFF Research Database (Denmark)

    Jensen, Kirsten

    2016-01-01

    Om foråret kommer der liv i naturen. Planter og dyr får en ny begyndelse. Fugleæg, dyreunger, små nye træer i skovbunden og lysegrønne planter dukker op. Forårsmånederne hedder marts, april og maj. Her pibler alt det grønne op ad jorden. Meget af det kan faktisk spises, selvom vi kalder det ukrud...

  9. Retting of Flax by Aspergillus niger

    Science.gov (United States)

    De França, F. P.; Rosemberg, J. A.; De Jesus, A. M.

    1969-01-01

    In this study, retting was carried out by Aspergillus niger. The pH, galacturonic acid (GA), and total reducing sugar were determined; the end point was identified by the classic empirical processes and by the maximal GA content of the retting water. The process gave clear and resistent fibers, and the retting time was similar to that of current industrial processes with bacterial enzymes. Control of total acidity was not required, since the pH remained close to neutrality throughout the entire process. PMID:16349835

  10. RET is a potential tumor suppressor gene in colorectal cancer

    Science.gov (United States)

    Luo, Yanxin; Tsuchiya, Karen D.; Park, Dong Il; Fausel, Rebecca; Kanngurn, Samornmas; Welcsh, Piri; Dzieciatkowski, Slavomir; Wang, Jianping; Grady, William M.

    2012-01-01

    Cancer arises as the consequence of mutations and epigenetic alterations that activate oncogenes and inactivate tumor suppressor genes. Through a genome-wide screen for methylated genes in colon neoplasms, we identified aberrantly methylated RET in colorectal cancer. RET, a transmembrane receptor tyrosine kinase and a receptor for the GDNF-family ligands, was one of the first oncogenes to be identified and has been shown to be an oncogene in thyroid cancer and pheochromocytoma. However, unexpectedly, we found RET is methylated in 27% of colon adenomas and in 63% of colorectal cancers, and now provide evidence that RET has tumor suppressor activity in colon cancer. The aberrant methylation of RET correlates with decreased RET expression, whereas the restoration of RET in colorectal cancer cell lines results in apoptosis. Furthermore, in support of a tumor suppressor function of RET, mutant RET has also been found in primary colorectal cancer. We now show that these mutations inactivate RET, which is consistent with RET being a tumor suppressor gene in the colon. These findings suggest that the aberrant methylation of RET and the mutational inactivation of RET promote colorectal cancer formation and that RET can serve as a tumor suppressor gene in the colon. Moreover, the increased frequency of methylated RET in colon cancers compared to adenomas suggests RET inactivation is involved in the progression of colon adenomas to cancer. PMID:22751117

  11. Øret i skyen

    DEFF Research Database (Denmark)

    Søndergaard, Morten

    2015-01-01

    Da Etisk Råd afholder sit årlige møde på Utzon Centret i Ålborg i oktober 2010 er ingen af deltagerne på mødet klar over, at et bioteknologisk øre lytter med. Det er et resultat af flere ret utrolige tilfældigheder og sammenfald: Nogen har ved en fejl tændt højttalersystemet i udstillingsrummene...... under den smukke konferencesal med udsigt ud over Limfjorden. I udstillingsrummene står et værk af den Australske kunstner Stelarc, Internet Ear, som er en del af udstillingen BIOTOPIA – Art in the Wet Zone. Internet Ear er, rent skulpturelt, en eksakt kopi af kunstnerens egen arm, hvorpå han for ca. 4...... år siden fik et ekstra øre indopereret. Situationen der udspiller sig i Utzon Centret er på flere måder symptomatisk for en række aktuelle kulturelle og samfundsmæssige tendenser. Den er endvidere emblematisk for de udfordringer, en cyber-museologi står overfor....

  12. La retórica en Internet

    Directory of Open Access Journals (Sweden)

    Roberto Gamonal Arroyo

    2012-04-01

    Full Text Available La Retórica, una disciplina antigua que data del siglo V a.C., está muy presente enInternet, un medio de comunicación social que nació en el siglo XX. La AntigüedadClásica renace para esclarecer este fenómeno de las nuevas tecnologías de lainformación. La Retórica ayuda a explicar el intrincado concepto de Internet, afacilitar su práctica cotidiana y a su construcción de una forma ordenada y sistemática.

  13. Byggeri hele året 1

    DEFF Research Database (Denmark)

    Den voksende byggeaktivitet har medført, at både betydningen af og interessen for vinterbyggeri stadig øges. Denne tendens har været kraftigt understøttet af Boligministeriet, og Statens Byggeforskningsinstitut har derfor fundet det naturligt at sammenfatte tidligere anvisninger og de seneste års...

  14. Comparison of traditional field retting and Phlebia radiata Cel 26 retting of hemp fibres for fibre-reinforced composites

    DEFF Research Database (Denmark)

    Liu, Ming; Ale, Marcel Tutor; Kołaczkowski, Bartłomiej

    2017-01-01

    Classical field retting and controlled fungal retting of hemp using Phlebia radiata Cel 26 (a mutant with low cellulose degrading ability) were compared with pure pectinase treatment with regard to mechanical properties of the produced fibre/epoxy composites. For field retting a classification...

  15. A cross-talk between TrkB and Ret tyrosine kinases receptors mediates neuroblastoma cells differentiation.

    Directory of Open Access Journals (Sweden)

    Carla Lucia Esposito

    Full Text Available Understanding the interplay between intracellular signals initiated by multiple receptor tyrosine kinases (RTKs to give the final cell phenotype is a major pharmacological challenge. Retinoic acid (RA-treatment of neuroblastoma (NB cells implicates activation of Ret and TrkB RTKs as critical step to induce cell differentiation. By studying the signaling interplay between TrkB and Ret as paradigmatic example, here we demonstrate the existence of a cross-talk mechanism between the two unrelated receptors that is needed to induce the cell differentiation. Indeed, we show that TrkB receptor promotes Ret phosphorylation by a mechanism that does not require GDNF. This reveals to be a key mechanism, since blocking either TrkB or Ret by small interfering RNA causes a failure in NB biochemical and morphological differentiation. Our results provide the first evidence that a functional transactivation between distinct tyrosine kinases receptors is required for an important physiological process.

  16. Drosophila Cancer Models Identify Functional Differences between Ret Fusions.

    Science.gov (United States)

    Levinson, Sarah; Cagan, Ross L

    2016-09-13

    We generated and compared Drosophila models of RET fusions CCDC6-RET and NCOA4-RET. Both RET fusions directed cells to migrate, delaminate, and undergo EMT, and both resulted in lethality when broadly expressed. In all phenotypes examined, NCOA4-RET was more severe than CCDC6-RET, mirroring their effects on patients. A functional screen against the Drosophila kinome and a library of cancer drugs found that CCDC6-RET and NCOA4-RET acted through different signaling networks and displayed distinct drug sensitivities. Combining data from the kinome and drug screens identified the WEE1 inhibitor AZD1775 plus the multi-kinase inhibitor sorafenib as a synergistic drug combination that is specific for NCOA4-RET. Our work emphasizes the importance of identifying and tailoring a patient's treatment to their specific RET fusion isoform and identifies a multi-targeted therapy that may prove effective against tumors containing the NCOA4-RET fusion. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.

  17. Retting effect of kenaf bast fiber by electron beam irradiation

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Hye Kyoung; Kangm Hyo Kyoung; Jeun, Joon Pyo; Kang, Phil Hyun [Korea Atomic Energy Research Institute, Jeongeup (Korea, Republic of)

    2010-06-15

    Kenaf (Hibiscus cannabinus) retting were separated from a kenaf bast fiber by a combination of Electron beam irradiation (EBI) and NaOH solution treatment. The methods were based on a 6% NaOH solution treatment after various doses of EBI. FT-IR spectroscopy demonstrated that the content of lignin and hemicellulose in the retted kenaf fibers decreased as the EBI dose increased. Specifically, the lignin in the retted kenaf fiber treated with 300 kGy of EBI was almost completely removed. The morphology of retted kenaf fibers were characterized by SEM image, and the studies showed that the fibrillated degree of retted kenaf fibers treated with various EBI doses and was increased as EBI dose increased. The retted kenaf fibers treated with the EBI at 300 kGy was uniformly fibrillated with 10 {approx} 30 {mu}m diameters.

  18. Retting effect of kenaf bast fiber by electron beam irradiation

    International Nuclear Information System (INIS)

    Shin, Hye Kyoung; Kangm Hyo Kyoung; Jeun, Joon Pyo; Kang, Phil Hyun

    2010-01-01

    Kenaf (Hibiscus cannabinus) retting were separated from a kenaf bast fiber by a combination of Electron beam irradiation (EBI) and NaOH solution treatment. The methods were based on a 6% NaOH solution treatment after various doses of EBI. FT-IR spectroscopy demonstrated that the content of lignin and hemicellulose in the retted kenaf fibers decreased as the EBI dose increased. Specifically, the lignin in the retted kenaf fiber treated with 300 kGy of EBI was almost completely removed. The morphology of retted kenaf fibers were characterized by SEM image, and the studies showed that the fibrillated degree of retted kenaf fibers treated with various EBI doses and was increased as EBI dose increased. The retted kenaf fibers treated with the EBI at 300 kGy was uniformly fibrillated with 10 ∼ 30 μm diameters

  19. Somatic RET mutation in a patient with pigmented adrenal pheochromocytoma

    NARCIS (Netherlands)

    Maison, Nicole; Korpershoek, Esther; Eisenhofer, Graeme; Robledo, Mercedes; de Krijger, Ronald; Beuschlein, Felix

    UNLABELLED: Pheochromocytomas (PCC) and paraganglioma (PGL) are rare neuroendocrine tumors arising from chromaffin cells of the neural crest. Mutations in the RET-proto-oncogene are associated with sporadic pheochromocytoma, familial or sporadic medullary thyroid carcinoma (MTC) and multiple

  20. Improvement of organoleptic quality of retted cassava products by alkali pretreatment of roots and addition of sodium nitrate during retting.

    Science.gov (United States)

    Ogbo, Frank C

    2003-12-15

    Alkali pretreatment of cassava roots before retting and addition of sodium nitrate during retting were used to manipulate the metabolism of microorganisms involved in cassava (Manihot esculenta Crantz) retting, as a method for removing the characteristic offensive odour of retted cassava products. Odour was assessed by organoleptic methods. The characteristics of fermentation of cassava by the traditional method (control) were as follows; aerobic mesophilic count (APC) on nutrient agar (NA) at 30 degrees C/48 h, attained a maximum of 2.3 x 10(7)/ml retting juice while counts on de Man Rogosa and Sharpe agar (MRS) at 30 degrees C/48 h were 1.6 x 10(8)/ml. Maximum titrable acidity was 0.062% lactic acid by weight of retting juice. Cassava was retted in 3 days and the product exhibited characteristic offensive odour. Addition of NaNO3 into retting water effectively removed odour at a concentration of 0.3 g/l. Maximum APC on NA/30 degrees C/48 h was 6.8 x 10(6)/ml. Counts on MRS/30 degrees C/48 h exceeded 2.4 x 10(9)/ml. Retting was complete in 3 days with a final titrable acidity of 0.068% of retting juice. Removal of odour likely resulted from selection of homo-fermentative lactic acid bacteria, thus producing mostly odourless lactic acid. Alkali pretreatment of roots before retting was efficacious in removing odour at a concentration of 10 g/l for 30 min. This fermentation was characterized by APC on NA/30 degrees C/48 h of 5.4 x 10(6)/ml; MRS/30 degrees C/48 h reached a maximum of only 10 x 10(4)/ml and correspondingly low titrable acidity of 0.003%. Low counts of lactic acid bacteria correlate well with the absence of odour in this sample. Both treatments did not adversely affect the detoxification process, yielding "foo-foo" with HCN levels lower than 10 mg/kg. Residual nitrates and nitrites of 30 mg/kg in the sodium nitrate-treated sample were also within the safe limits of 156 mg/kg allowed in many countries. Organoleptically improved samples were acceptable to

  1. Characterization of Bacterial and Fungal Community Dynamics by High-Throughput Sequencing (HTS Metabarcoding during Flax Dew-Retting

    Directory of Open Access Journals (Sweden)

    Christophe Djemiel

    2017-10-01

    Full Text Available Flax dew-retting is a key step in the industrial extraction of fibers from flax stems and is dependent upon the production of a battery of hydrolytic enzymes produced by micro-organisms during this process. To explore the diversity and dynamics of bacterial and fungal communities involved in this process we applied a high-throughput sequencing (HTS DNA metabarcoding approach (16S rRNA/ITS region, Illumina Miseq on plant and soil samples obtained over a period of 7 weeks in July and August 2014. Twenty-three bacterial and six fungal phyla were identified in soil samples and 11 bacterial and four fungal phyla in plant samples. Dominant phyla were Proteobacteria, Bacteroidetes, Actinobacteria, and Firmicutes (bacteria and Ascomycota, Basidiomycota, and Zygomycota (fungi all of which have been previously associated with flax dew-retting except for Bacteroidetes and Basidiomycota that were identified for the first time. Rare phyla also identified for the first time in this process included Acidobacteria, CKC4, Chlorobi, Fibrobacteres, Gemmatimonadetes, Nitrospirae and TM6 (bacteria, and Chytridiomycota (fungi. No differences in microbial communities and colonization dynamics were observed between early and standard flax harvests. In contrast, the common agricultural practice of swath turning affects both bacterial and fungal community membership and structure in straw samples and may contribute to a more uniform retting. Prediction of community function using PICRUSt indicated the presence of a large collection of potential bacterial enzymes capable of hydrolyzing backbones and side-chains of cell wall polysaccharides. Assignment of functional guild (functional group using FUNGuild software highlighted a change from parasitic to saprophytic trophic modes in fungi during retting. This work provides the first exhaustive description of the microbial communities involved in flax dew-retting and will provide a valuable benchmark in future studies aiming

  2. Når politik og journalistik, ret og krig blandes

    DEFF Research Database (Denmark)

    Harste, Gorm

    2007-01-01

    Artiklen analyserer den manglende politiske dømmekraft som er opstået i debatten om Christoffer Guldbrandsens tv'dokumentar 'Den hemmelige krig'. Den offentlige og politiske debat herom er en erstatningsdebat for den kommisionsdomstol, der burde nedsættes om de løgne, der har været fremsat 2002 -...

  3. Forårets konflikter godt for den danske model

    DEFF Research Database (Denmark)

    Scheuer, Steen

    2008-01-01

    Den store vinder ved forårets konflikter var den danske model for aftaler på arbejdsmarkedet. De offentlige fagforeninger fik sig en lærestreg, da regeringen og Folketinget til de flestes overraskelse lod de lovlige konflikter løbe i ugevis. For hermed tvang man parterne, og især forbundene, til...

  4. Effektivitet af naturligt drevne radontiltag året rundt

    DEFF Research Database (Denmark)

    Haker Høegh, Britt; Rasmussen, Torben Valdbjørn

    Denne rapport omhandler projektet Effektivitet af naturligt drevne radontiltag året rundt. Projektet er et spireprojekt finansieret af Innovationsnetværket InnoBYG og Forsknings- og Innovationsstyrelsen. Projektet er gennemført af Teknologisk Institut i samarbejde med Statens Byggeforskningsinsti...

  5. Cold DUst around NEarby Stars (DUNES). First results. A resolved exo-Kuiper belt around the solar-like star ζ2 Ret

    NARCIS (Netherlands)

    Eiroa, C.; Fedele, D.; Maldonado, J.; Gonzalez-Garcia, B. M.; Rodmann, J.; Heras, A. M.; Pilbratt, G. L.; Augereau, J. -Ch.; Mora, A.; Montesinos, B.; Ardila, D.; Bryden, G.; Liseau, R.; Stapelfeldt, K.; Launhardt, R.; Solano, E.; Bayo, A.; Absil, O.; Arevalo, M.; Barrado, D.; Beichmann, C.; Danchi, W.; del Burgo, C.; Ertel, S.; Fridlund, M.; Fukagawa, M.; Gutierrez, R.; Gruen, E.; Kamp, I.; Krivov, A.; Lebreton, J.; Loehne, T.; Lorente, R.; Marshall, J.; Martinez-Arnaiz, R.; Meeus, G.; Montes, D.; Morbidelli, A.; Mueller, S.; Mutschke, H.; Nakagawa, T.; Olofsson, G.; Ribas, I.; Roberge, A.; Sanz-Forcada, J.; Thebault, P.; White, G. J.; Wolf, S.; Walker, H.

    We present the first far-IR observations of the solar-type stars δ Pav, HR 8501, 51 Peg and ζ2 Ret, taken within the context of the DUNES Herschel open time key programme (OTKP). This project uses the PACS and SPIRE instruments with the objective of studying infrared excesses due to exo-Kuiper belts

  6. Efficacy of rational emotive therapy (RET) with children: a critical re-appraisal.

    Science.gov (United States)

    Gossette, R L; O'Brien, R M

    1993-03-01

    Proponents of rational-emotive therapy (RET) advocate its use within the school curriculum to forestall future maladjustment through the early detection and eradication of irrational beliefs. A review of 33 unpublished dissertations and four published reports found RET effective in about 25% of comparisons with wait-list, placebo, and other treatment conditions. The major effects of RET were changes in scores on self-report measures of irrational beliefs, less on emotional distress, and little or no change in behavior; essentially the same pattern of effects previously found in a similar analysis of RET in adult populations. Little justification was found for continued use of RET in schools.

  7. Correlation of RET somatic mutations with clinicopathological features in sporadic medullary thyroid carcinomas

    Science.gov (United States)

    Moura, M M; Cavaco, B M; Pinto, A E; Domingues, R; Santos, J R; Cid, M O; Bugalho, M J; Leite, V

    2009-01-01

    Screening of REarranged during Transfection (RET) gene mutations has been carried out in different series of sporadic medullary thyroid carcinomas (MTC). RET-positive tumours seem to be associated to a worse clinical outcome. However, the correlation between the type of RET mutation and the patients' clinicopathological data has not been evaluated yet. We analysed RET exons 5, 8, 10–16 in fifty-one sporadic MTC, and found somatic mutations in thirty-three (64.7%) tumours. Among the RET-positive cases, exon 16 was the most frequently affected (60.6%). Two novel somatic mutations (Cys630Gly, c.1881del18) were identified. MTC patients were divided into three groups: group 1, with mutations in RET exons 15 and 16; group 2, with other RET mutations; group 3, having no RET mutations. Group 1 had higher prevalence (P=0.0051) and number of lymph node metastases (P=0.0017), and presented more often multifocal tumours (P=0.037) and persistent disease at last control (P=0.0242) than group 2. Detectable serum calcitonin levels at last screening (P=0.0119) and stage IV disease (P=0.0145) were more frequent in group 1, than in the other groups. Our results suggest that, among the sporadic MTC, cases with RET mutations in exons 15 and 16 are associated with the worst prognosis. Cases with other RET mutations have the most indolent course, and those with no RET mutations have an intermediate risk. PMID:19401695

  8. Radiological Effluent Technical Specifications (RETS) implementation, Kewaunee Nuclear Power Plant

    International Nuclear Information System (INIS)

    Serrano, W.; Akers, D.W.

    1985-06-01

    A review of the Radiological Effluent Technical Specifications (RETS) for the Kewaunee Nuclear Power Plant was performed. The principal review guidelines used were NUREG-0133, ''Preparation of Radiological Effluent Technical Specifications for Nuclear Power Plants,'' and Draft 7'' of NUREG-0472, Revision 3, ''Radiological Effluent Technical Specifications for Pressurized Water Reactors.'' Draft submittals were discussed with the Licensee by the NRC staff until all items requiring changes to the Technical Specifications were resolved. The Licensee then submitted final proposed RETS to the NRC which were evaluated and found to be in compliance with the NRC review guidelines. The proposed Offsite Dose Calculation Manual and the Radiological Environmental Monitoring Manual were reviewed and generally found to be in compliance with the NRC review guidelines

  9. Replication pattern of the pericentromeric region of chromosome 10q and expression of the RET protooncogene.

    Science.gov (United States)

    Cinti, R; Schena, F; Passalacqua, M; Ceccherini, I; Ravazzolo, R

    2004-08-15

    Regulation of the RET gene is highly specific during embryo development and is strictly tissue-specific. Control of transcription depends on mechanisms influenced by epigenetic processes, in particular, histone acetylation at regions flanking the 5' end of the gene. Since the RET gene is mapped in the pericentromeric region of the human chromosome 10, the implication of epigenetic processes is even more striking and worth to be investigated in an extended chromosomal tract. One experimental approach to study the chromatin status in relationship with gene transcription is to assess the replication timing, which we did by using fluorescent in situ hybridization in cells expressing or not expressing the RET gene. By using probes spanning a 700-kb genomic region from the RET locus toward the centromere, we found a relationship between RET expression and early replication. Different patterns were observed between cells naturally expressing RET and cells induced to expression of RET by treatment with sodium butyrate, an inhibitor of histone deacetylases. Three-dimensional analysis of the nuclear localization of fluorescent signals by confocal microscopy showed difference of localization between the RET probe and a probe for a housekeeping gene, G3PDH, located at 12p13.3, in cells that do not express RET, in accordance with previous data for other genes and chromosomal regions. However, RET-expressing cells showed a localization of signals which was not consistent with that expected for expressed genes.

  10. Craniopharyngiomas express embryonic stem cell markers (SOX2, OCT4, KLF4, and SOX9) as pituitary stem cells but do not coexpress RET/GFRA3 receptors.

    Science.gov (United States)

    Garcia-Lavandeira, Montserrat; Saez, Carmen; Diaz-Rodriguez, Esther; Perez-Romero, Sihara; Senra, Ana; Dieguez, Carlos; Japon, Miguel A; Alvarez, Clara V

    2012-01-01

    Adult stem cells maintain some markers expressed by embryonic stem cells and express other specific markers depending on the organ where they reside. Recently, stem/progenitor cells in the rodent and human pituitary have been characterized as expressing GFRA2/RET, PROP1, and stem cell markers such as SOX2 and OCT4 (GPS cells). Our objective was to detect other specific markers of the pituitary stem cells and to investigate whether craniopharyngiomas (CRF), a tumor potentially derived from Rathke's pouch remnants, express similar markers as normal pituitary stem cells. We conducted mRNA and Western blot studies in pituitary extracts, and immunohistochemistry and immunofluorescence on sections from normal rat and human pituitaries and 20 CRF (18 adamantinomatous and two papillary). Normal pituitary GPS stem cells localized in the marginal zone (MZ) express three key embryonic stem cell markers, SOX2, OCT4, and KLF4, in addition to SOX9 and PROP1 and β-catenin overexpression. They express the RET receptor and its GFRA2 coreceptor but also express the coreceptor GFRA3 that could be detected in the MZ of paraffin pituitary sections. CRF maintain the expression of SOX2, OCT4, KLF4, SOX9, and β-catenin. However, RET and GFRA3 expression was altered in CRF. In 25% (five of 20), both RET and GFRA3 were detected but not colocalized in the same cells. The other 75% (15 of 20) lose the expression of RET, GFRA3, or both proteins simultaneously. Human pituitary adult stem/progenitor cells (GPS) located in the MZ are characterized by expression of embryonic stem cell markers SOX2, OCT4, and KLF4 plus the specific pituitary embryonic factor PROP1 and the RET system. Redundancy in RET coreceptor expression (GFRA2 and GFRA3) suggest an important systematic function in their physiological behavior. CRF share the stem cell markers suggesting a common origin with GPS. However, the lack of expression of the RET/GFRA system could be related to the cell mislocation and deregulated

  11. Ret Finger Protein: An E3 Ubiquitin Ligase Juxtaposed to the XY Body in Meiosis

    Directory of Open Access Journals (Sweden)

    Isabelle Gillot

    2009-01-01

    Full Text Available During prophase I of male meiosis, the sex chromosomes form a compact structure called XY body that associates with the nuclear membrane of pachytene spermatocytes. Ret Finger Protein is a transcriptional repressor, able to interact with both nuclear matrix-associated proteins and double-stranded DNA. We report the precise and unique localization of Ret Finger Protein in pachytene spermatocytes, in which Ret Finger Protein takes place of lamin B1, between the XY body and the inner nuclear membrane. This localization of Ret Finger Protein does not seem to be associated with O-glycosylation or sumoylation. In addition, we demonstrate that Ret Finger Protein contains an E3 ubiquitin ligase activity. These observations lead to an attractive hypothesis in which Ret Finger Protein would be involved in the positioning and the attachment of XY body to the nuclear lamina of pachytene spermatocytes.

  12. HOXB5 cooperates with NKX2-1 in the transcription of human RET.

    Directory of Open Access Journals (Sweden)

    Jiang Zhu

    Full Text Available The enteric nervous system (ENS regulates peristaltic movement of the gut, and abnormal ENS causes Hirschsprung's disease (HSCR in newborns. HSCR is a congenital complex genetic disorder characterised by a lack of enteric ganglia along a variable length of the intestine. The receptor tyrosine kinase gene (RET is the major HSCR gene and its expression is crucial for ENS development. We have previously reported that (i HOXB5 transcription factor mediates RET expression, and (ii mouse with defective HOXB5 activity develop HSCR phenotype. In this study, we (i elucidate the underlying mechanisms that HOXB5 mediate RET expression, and (ii examine the interactions between HOXB5 and other transcription factors implicated in RET expression. We show that human HOXB5 binds to the promoter region 5' upstream of the binding site of NKX2-1 and regulates RET expression. HOXB5 and NKX2-1 form a protein complex and mediate RET expression in a synergistic manner. HSCR associated SNPs at the NKX2-1 binding site (-5G>A rs10900296; -1A>C rs10900297, which reduce NKX2-1 binding, abolish the synergistic trans-activation of RET by HOXB5 and NKX2-1. In contrast to the synergistic activation of RET with NKX2-1, HOXB5 cooperates in an additive manner with SOX10, PAX3 and PHOX2B in trans-activation of RET promoter. Taken together, our data suggests that HOXB5 in coordination with other transcription factors mediates RET expression. Therefore, defects in cis- or trans-regulation of RET by HOXB5 could lead to reduction of RET expression and contribute to the manifestation of the HSCR phenotype.

  13. Enhanced sensitivity of the RET proto-oncogene to ionizing radiation in vitro.

    Science.gov (United States)

    Volpato, Claudia Béu; Martínez-Alfaro, Minerva; Corvi, Raffaella; Gabus, Coralie; Sauvaigo, Sylvie; Ferrari, Pietro; Bonora, Elena; De Grandi, Alessandro; Romeo, Giovanni

    2008-11-01

    Exposure to ionizing radiation is a well-known risk factor for a number of human cancers, including leukemia and thyroid cancer. It has been known for a long time that exposure of cells to radiation results in extensive DNA damage; however, a small number of studies have tried to explain the mechanisms of radiation-induced carcinogenesis. The high prevalence of RET/PTC rearrangements in patients who have received external radiation, and the evidence of in vitro induction of RET rearrangements in human cells, suggest an enhanced sensitivity of the RET genomic region to damage by ionizing radiation. To assess whether RET is indeed more sensitive to radiations than other genomic regions, we used a COMET assay coupled with fluorescence in situ hybridization, which allows the measurement of DNA fragmentation in defined genomic regions of single cells. We compared the initial DNA damage of the genomic regions of RET, CXCL12/SDF1, ABL, MYC, PLA2G2A, p53, and JAK2 induced by ionizing radiation in both a lymphoblastoid and a fetal thyroid cell line. In both cell lines, RET fragmentation was significantly higher than in other genomic regions. Moreover, a differential distribution of signals within the COMET was associated with a higher percentage of RET fragments in the tail. RET was more susceptible to fragmentation in the thyroid-derived cells than in lymphoblasts. This enhanced susceptibility of RET to ionizing radiation suggests the possibility of using it as a radiation exposure marker.

  14. A estrutura retórica do verbete Spinoza

    Directory of Open Access Journals (Sweden)

    Marilena Chaui

    2009-12-01

    Full Text Available Propomos uma análise do verbete "Spinoza" do Dictionnaire Historique et Critique salientando a estrutura retórica do texto, em cujo centro se encontra a nova figura do ateu, construída por Bayle, o ateu especulativo ou "o ateu de sistema".The paper presents a study of the rhetorical framework of the article "Spinoza" in Bayle's Dictionnaire Historique et Critique and the new image of the atheist as athée de système.

  15. O cultivo retórico da escuta

    Directory of Open Access Journals (Sweden)

    Jorge Cardoso Filho

    2014-08-01

    Full Text Available Esse artigo discute o modo como, na cultura contemporânea, hábitos perceptivos podem ser cultivados de forma relacionada ao ambiente sociocultural e técnico, especificamente no campo da escuta musical. Delimita seu foco de investigação nas estratégias empregadas a fim de persuadir a escuta de algoe de determinado modo, demonstrando preocupação com a dimensão retórica atuante no campo da percepção musical. Aponta a necessidade de entendimento dos mecanismos pelos quais a escuta é formatada na relação com os gêneros musicais, com as estratégias de midiatização e com os padrões de sensibilidade. Por fim, toma as estratégias empregadas no processo produtivo de dois álbuns do gênero musical Rock como exemplos de atuação dessa retórica: o álbum The Joshua Tree (1987, da banda irlandesa U2, e Nevermind (1991, da banda estadunidense Nirvana.

  16. Linen Most Useful: Perspectives on Structure, Chemistry, and Enzymes for Retting Flax

    Science.gov (United States)

    Akin, Danny E.

    2013-01-01

    The components of flax (Linum usitatissimum) stems are described and illustrated, with reference to the anatomy and chemical makeup and to applications in processing and products. Bast fiber, which is a major economic product of flax along with linseed and linseed oil, is described with particular reference to its application in textiles, composites, and specialty papers. A short history of retting methods, which is the separation of bast fiber from nonfiber components, is presented with emphasis on water retting, field retting (dew retting), and experimental methods. Past research on enzyme retting, particularly by the use of pectinases as a potential replacement for the current commercial practice of field retting, is reviewed. The importance and mechanism of Ca2+ chelators with pectinases in retting are described. Protocols are provided for retting of both fiber-type and linseed-type flax stems with different types of pectinases. Current and future applications are listed for use of a wide array of enzymes to improve processed fibers and blended yarns. Finally, potential lipid and aromatic coproducts derived from the dust and shive waste streams of fiber processing are indicated. PMID:25969769

  17. Crosstalk between VEGF-A/VEGFR2 and GDNF/RET signaling pathways

    International Nuclear Information System (INIS)

    Tufro, Alda; Teichman, Jason; Banu, Nazifa; Villegas, Guillermo

    2007-01-01

    Vascular endothelial growth factor (VEGF-A) plays multiple roles in kidney development: stimulates cell proliferation, survival, tubulogenesis, and branching morphogenesis. However, the mechanism that mediates VEGF-A induced ureteric bud branching is unclear. Glial-derived neurotrophic factor (GDNF) signaling through tyrosine kinase c-RET is the major regulator of ureteric bud branching. Here we examined whether VEGF-A regulates RET signaling. We determined that ureteric bud-derived cells express the main VEGF-A signaling receptor, VEGFR2 and RET, by RT-PCR, immunoblotting, and immunocytochemistry. We show that the VEGF-A isoform VEGF 165 induces RET-tyr 1062 phosphorylation in addition to VEGFR2 autophosphorylation, that VEGF 165 and GDNF have additive effects on RET-tyr 1062 phosphorylation, and that VEGFR2 and RET co-immunoprecipitate. Functionally, VEGF 165 induces ureteric bud cell proliferation and branching morphogenesis. Similarly, in embryonic kidney explants VEGF 165 induces RET-tyr 1062 phosphorylation and upregulates GDNF. These findings provide evidence for a novel cooperative interaction between VEGFR2 and RET that mediates VEGF-A functions in ureteric bud cells

  18. No mutations found by RET mutation scanning in sporadic and hereditary neuroblastoma

    NARCIS (Netherlands)

    Hofstra, R. M.; Cheng, N. C.; Hansen, C.; Stulp, R. P.; Stelwagen, T.; Clausen, N.; Tommerup, N.; Caron, H.; Westerveld, A.; Versteeg, R.; Buys, C. H.

    1996-01-01

    Neuroblastoma occasionally occurs in diseases associated with abnormal neurocrest differentiation, e.g. Hirschsprung disease. Expression studies in developing mice suggest that the proto-oncogene RET plays a role in neurocrest differentiation. In humans expression of RET is limited to certain tumor

  19. Proteomic Identification of DNA-PK Involvement within the RET Signaling Pathway.

    Directory of Open Access Journals (Sweden)

    Lyle J Burdine

    Full Text Available Constitutive activation of the Rearranged during Transfection (RET proto-oncogene leads to the development of MEN2A medullary thyroid cancer (MTC. The relatively clear genotype/phenotype relationship seen with RET mutations and the development of MEN2A is unusual in the fact that a single gene activity can drive the progression towards metastatic disease. Despite knowing the oncogene responsible for MEN2A, MTC, like most tumors of neural crest origin, remains largely resistant to chemotherapy. Constitutive activation of RET in a SK-N-MC cell line model reduces cell sensitivity to chemotherapy. In an attempt to identify components of the machinery responsible for the observed RET induced chemoresistance, we performed a proteomic screen of histones and associated proteins in cells with a constitutively active RET signaling pathway. The proteomic approach identified DNA-PKcs, a DNA damage response protein, as a target of the RET signaling pathway. Active DNA-PKcs, which is phosphorylated at site serine 2056 and localized to chromatin, was elevated within our model. Treatment with the RET inhibitor RPI-1 significantly reduced s2056 phosphorylation in RET cells as well as in a human medullary thyroid cancer cell line. Additionally, inhibition of DNA-PKcs activity diminished the chemoresistance observed in both cell lines. Importantly, we show that activated DNA-PKcs is elevated in medullary thyroid tumor samples and that expression correlates with expression of RET in thyroid tumors. These results highlight one mechanism by which RET signaling likely primes cells for rapid response to DNA damage and suggests DNA-PKcs as an additional target in MTC.

  20. Lentiviral expression of retinal guanylate cyclase-1 (RetGC1 restores vision in an avian model of childhood blindness.

    Directory of Open Access Journals (Sweden)

    Melissa L Williams

    2006-06-01

    Full Text Available Leber congenital amaurosis (LCA is a genetically heterogeneous group of retinal diseases that cause congenital blindness in infants and children. Mutations in the GUCY2D gene that encodes retinal guanylate cyclase-1 (retGC1 were the first to be linked to this disease group (LCA type 1 [LCA1] and account for 10%-20% of LCA cases. These mutations disrupt synthesis of cGMP in photoreceptor cells, a key second messenger required for function of these cells. The GUCY1*B chicken, which carries a null mutation in the retGC1 gene, is blind at hatching and serves as an animal model for the study of LCA1 pathology and potential treatments in humans.A lentivirus-based gene transfer vector carrying the GUCY2D gene was developed and injected into early-stage GUCY1*B embryos to determine if photoreceptor function and sight could be restored to these animals. Like human LCA1, the avian disease shows early-onset blindness, but there is a window of opportunity for intervention. In both diseases there is a period of photoreceptor cell dysfunction that precedes retinal degeneration. Of seven treated animals, six exhibited sight as evidenced by robust optokinetic and volitional visual behaviors. Electroretinographic responses, absent in untreated animals, were partially restored in treated animals. Morphological analyses indicated there was slowing of the retinal degeneration.Blindness associated with loss of function of retGC1 in the GUCY1*B avian model of LCA1 can be reversed using viral vector-mediated gene transfer. Furthermore, this reversal can be achieved by restoring function to a relatively low percentage of retinal photoreceptors. These results represent a first step toward development of gene therapies for one of the more common forms of childhood blindness.

  1. Tipo/retórica. Una aproximación a la retórica tipográfica

    Directory of Open Access Journals (Sweden)

    Roberto Gamonal Arroyo

    2012-04-01

    Full Text Available A simple vista la Retórica y la Tipografía parecen dos disciplinas con poco en común, pero en este artículo veremos cómo estas dos materias, con muchos siglos de existencia, tienen nexos inquebrantables que abren nuevas vías de investigación. La letra es la representación verbal y visual de nuestro lenguaje y nuestro pensamiento. Su agrupación en palabras y oraciones conforman textos cuyo objetivo principal es persuadir al lector para ser leídas. Y esta persuasión la ejerce no sólo a través de su contenido, sino también de su forma.

  2. Comparative evaluation of RetCam vs. gonioscopy images in congenital glaucoma

    Directory of Open Access Journals (Sweden)

    Raj V Azad

    2014-01-01

    Full Text Available Purpose: To compare clarity, exposure and quality of anterior chamber angle visualization in congenital glaucoma patients, using RetCam and indirect gonioscopy images. Design: Cross-sectional study Participants. Congenital glaucoma patients over age of 5 years. Materials and Methods: A prospective consecutive pilot study was done in congenital glaucoma patients who were older than 5 years. Methods used are indirect gonioscopy and RetCam imaging. Clarity of the image, extent of angle visible and details of angle structures seen were graded for both methods, on digitally recorded images, in each eye, by two masked observers. Outcome Measures: Image clarity, interobserver agreement. Results: 40 eyes of 25 congenital glaucoma patients were studied. RetCam image had excellent clarity in 77.5% of patients versus 47.5% by gonioscopy. The extent of angle seen was similar by both methods. Agreement between RetCam and gonioscopy images regarding details of angle structures was 72.50% by observer 1 and 65.00% by observer 2. Conclusions: There was good agreement between RetCam and indirect gonioscopy images in detecting angle structures of congenital glaucoma patients. However, RetCam provided greater clarity, with better quality, and higher magnification images. RetCam can be a useful alternative to gonioscopy in infants and small children without the need for general anesthesia.

  3. Comparative evaluation of RetCam vs. gonioscopy images in congenital glaucoma.

    Science.gov (United States)

    Azad, Raj V; Chandra, Parijat; Chandra, Anuradha; Gupta, Aparna; Gupta, Viney; Sihota, Ramanjit

    2014-02-01

    To compare clarity, exposure and quality of anterior chamber angle visualization in congenital glaucoma patients, using RetCam and indirect gonioscopy images. Cross-sectional study Participants. Congenital glaucoma patients over age of 5 years. A prospective consecutive pilot study was done in congenital glaucoma patients who were older than 5 years. Methods used are indirect gonioscopy and RetCam imaging. Clarity of the image, extent of angle visible and details of angle structures seen were graded for both methods, on digitally recorded images, in each eye, by two masked observers. Image clarity, interobserver agreement. 40 eyes of 25 congenital glaucoma patients were studied. RetCam image had excellent clarity in 77.5% of patients versus 47.5% by gonioscopy. The extent of angle seen was similar by both methods. Agreement between RetCam and gonioscopy images regarding details of angle structures was 72.50% by observer 1 and 65.00% by observer 2. There was good agreement between RetCam and indirect gonioscopy images in detecting angle structures of congenital glaucoma patients. However, RetCam provided greater clarity, with better quality, and higher magnification images. RetCam can be a useful alternative to gonioscopy in infants and small children without the need for general anesthesia.

  4. RET mutational spectrum in Hirschsprung disease: evaluation of 601 Chinese patients.

    Directory of Open Access Journals (Sweden)

    Man-Ting So

    Full Text Available Rare (RVs and common variants of the RET gene contribute to Hirschsprung disease (HSCR; congenital aganglionosis. While RET common variants are strongly associated with the commonest manifestation of the disease (males; short-segment aganglionosis; sporadic, rare coding sequence (CDS variants are more frequently found in the lesser common and more severe forms of the disease (females; long/total colonic aganglionosis; familial.Here we present the screening for RVs in the RET CDS and intron/exon boundaries of 601 Chinese HSCR patients, the largest number of patients ever reported. We identified 61 different heterozygous RVs (50 novel distributed among 100 patients (16.64%. Those include 14 silent, 29 missense, 5 nonsense, 4 frame-shifts, and one in-frame amino-acid deletion in the CDS, two splice-site deletions, 4 nucleotide substitutions and a 22-bp deletion in the intron/exon boundaries and 1 single-nucleotide substitution in the 5' untranslated region. Exonic variants were mainly clustered in RET the extracellular domain. RET RVs were more frequent among patients with the most severe phenotype (24% vs. 15% in short-HSCR. Phasing RVs with the RET HSCR-associated haplotype suggests that RVs do not underlie the undisputable association of RET common variants with HSCR. None of the variants were found in 250 Chinese controls.

  5. Nexos estratégicos entre la retórica y la publicidad

    Directory of Open Access Journals (Sweden)

    Luis Gallardo Vera

    2011-06-01

    Full Text Available El presente artículo contribuye a establecer nexos estratégicos entre la retórica y la publicidad. La adopción del prisma estratégico en los estudios retóricos de la publicidad no es común, sin embargo, la relación entre retórica y publicidad a un nivel estratégico es evidente, teniendo presente los estudios que han investigado la simbiosis entre las dos actividades.Del universo compuesto por las investigaciones sobre retórica y publicidad se seleccionó una muestra de las obras susceptibles de responder a la pregunta de cuáles son los nexos estratégicos entre la retórica y la publicidad. Con este criterio se conformó una muestra teóricamente conducida del universo. La hipótesis de partida ha sido que, si existen documentos que indaguen en la relación entre la retórica y la publicidad, es posible construir un documento que muestre de un modo amplio cuáles son los nexos estratégicos entre ambas actividades. Finalmente, se contrastó que, efectivamente, este documento es único al mostrar ampliamente cuáles son los nexos estratégicos existentes entre la retórica y la publicidad.

  6. Kinetics of Natural Detoxification of Hydrogen Cyanide Contained In Retted Cassava Roots

    Directory of Open Access Journals (Sweden)

    2016-11-01

    Full Text Available This work presents the kinetics of natural detoxification of hydrogen cyanide contained in retted cassava roots. Retting is traditional fermentation of cassava, performed to soften the roots. During retting, cyanide diffuses into water used for the retting. The fresh cassava roots (bitter and sweet varieties used for this experiment were separately retted at ambient 0 temperature of 30 C. The cyanide content and pH were monitored daily. From the analysis of the experimental results, a first order consecutive rate equation is an adequate tool for explaining the mechanism of HCN reduction (or decay in retted cassava roots. The detoxification constants for the bound cyanide in the bitter and sweet cassava roots were 0.378/day and 0.438/day respectively, while that of the free hydrogen cyanide were 0.63/day and 0.74/day for the bitter and sweet varieties respectively. Cassava tubers from different species cannot be fermented with the same retting condition unless they have same or close functional properties.

  7. CO2, GDP and RET: An aggregate economic equilibrium analysis for Turkey

    International Nuclear Information System (INIS)

    Kumbaroglu, Guerkan; Karali, Nihan; Arikan, Yildiz

    2008-01-01

    There is a worldwide interest in renewable electricity technologies (RETs) due to growing concerns about global warming and climate change. As an EU candidate country whose energy demand increases exponentially, Turkey inevitably shares this common interest on RET. This study, using an aggregate economic equilibrium model, explores the economic costs of different policy measures to mitigate CO 2 emissions in Turkey. The model combines energy demands, capital requirements and labor inputs at a constant elasticity of substitution under an economy-wide nested production function. Growing energy demand, triggered by economic growth, is met by increased supply and initiates new capacity additions. Investment into RET is encouraged via the incorporation of (a) endogenous technological learning through which the RET cost declines as a function of cumulative capacity, and (b) a willingness to pay (WTP) function which imposes the WTP of consumers as a lower bound on RET installation. The WTP equation is obtained as a function of consumer income categories, based on data gathered from a pilot survey in which the contingent valuation methodology was employed. The impacts of various emission reduction scenarios on GDP growth and RET diffusion are explored. As expected, RET penetration is accelerated under faster technological learning and higher WTP conditions. It is found that stabilizing CO 2 emissions to year 2005 levels causes economic losses amounting to 17% and 23% of GDP in the years 2020 and 2030, respectively

  8. Ret function in muscle stem cells points to tyrosine kinase inhibitor therapy for facioscapulohumeral muscular dystrophy.

    Science.gov (United States)

    Moyle, Louise A; Blanc, Eric; Jaka, Oihane; Prueller, Johanna; Banerji, Christopher Rs; Tedesco, Francesco Saverio; Harridge, Stephen Dr; Knight, Robert D; Zammit, Peter S

    2016-11-14

    Facioscapulohumeral muscular dystrophy (FSHD) involves sporadic expression of DUX4, which inhibits myogenesis and is pro-apoptotic. To identify target genes, we over-expressed DUX4 in myoblasts and found that the receptor tyrosine kinase Ret was significantly up-regulated, suggesting a role in FSHD. RET is dynamically expressed during myogenic progression in mouse and human myoblasts. Constitutive expression of either RET9 or RET51 increased myoblast proliferation, whereas siRNA-mediated knockdown of Ret induced myogenic differentiation. Suppressing RET activity using Sunitinib, a clinically-approved tyrosine kinase inhibitor, rescued differentiation in both DUX4-expressing murine myoblasts and in FSHD patient-derived myoblasts. Importantly, Sunitinib also increased engraftment and differentiation of FSHD myoblasts in regenerating mouse muscle. Thus, DUX4-mediated activation of Ret prevents myogenic differentiation and could contribute to FSHD pathology by preventing satellite cell-mediated repair. Rescue of DUX4-induced pathology by Sunitinib highlights the therapeutic potential of tyrosine kinase inhibitors for treatment of FSHD.

  9. Distributional effects of the Australian Renewable Energy Target (RET) through wholesale and retail electricity price impacts

    International Nuclear Information System (INIS)

    Cludius, Johanna; Forrest, Sam; MacGill, Iain

    2014-01-01

    The Australian Renewable Energy Target (RET) has spurred significant investment in renewable electricity generation, notably wind power, over the past decade. This paper considers distributional implications of the RET for different energy users. Using time-series regression, we show that the increasing amount of wind energy has placed considerable downward pressure on wholesale electricity prices through the so-called merit order effect. On the other hand, RET costs are passed on to consumers in the form of retail electricity price premiums. Our findings highlight likely significant redistributive transfers between different energy user classes under current RET arrangements. In particular, some energy-intensive industries are benefiting from lower wholesale electricity prices whilst being largely exempted from contributing to the costs of the scheme. By contrast, many households are paying significant RET pass through costs whilst not necessarily benefiting from lower wholesale prices. A more equitable distribution of RET costs and benefits could be achieved by reviewing the scope and extent of industry exemptions and ensuring that methodologies to estimate wholesale price components in regulated electricity tariffs reflect more closely actual market conditions. More generally, these findings support the growing international appreciation that policy makers need to integrate distributional assessments into policy design and implementation. - Highlights: • The Australian RET has complex yet important distributional impacts on different energy users. • Likely wealth transfers from residential and small business consumers to large energy-intensive industry. • Merit order effects of wind likely overcompensate exempt industry for contribution to RET costs. • RET costs for households could be reduced if merit order effects were adequately passed through. • Need for distributional impact assessments when designing and implementing clean energy policy

  10. RET fusions in a small subset of advanced colorectal cancers at risk of being neglected.

    Science.gov (United States)

    Pietrantonio, F; Di Nicolantonio, F; Schrock, A B; Lee, J; Morano, F; Fucà, G; Nikolinakos, P; Drilon, A; Hechtman, J F; Christiansen, J; Gowen, K; Frampton, G M; Gasparini, P; Rossini, D; Gigliotti, C; Kim, S T; Prisciandaro, M; Hodgson, J; Zaniboni, A; Chiu, V K; Milione, M; Patel, R; Miller, V; Bardelli, A; Novara, L; Wang, L; Pupa, S; Sozzi, G; Ross, J; Di Bartolomeo, M; Bertotti, A; Ali, S; Trusolino, L; Falcone, A; de Braud, F; Cremolini, C

    2018-03-10

    Recognition of rare molecular subgroups is a challenge for precision oncology and may lead to tissue-agnostic approval of targeted agents. Here we aimed to comprehensively characterize the clinical, pathological and molecular landscape of RET rearranged metastatic colorectal cancer (mCRC). In this case series, we compared clinical, pathological and molecular characteristics of 24 RET rearranged mCRC patients with those of a control group of 291 patients with RET negative tumors. RET rearranged and RET negative mCRCs were retrieved by systematic literature review and by taking advantage of three screening sources: 1) Ignyta's phase 1/1b study on RXDX-105 (NCT01877811); 2) cohorts screened at two Italian and one South Korean Institutions; 3) Foundation Medicine Inc. database. Next generation sequencing data were analyzed for RET rearranged cases. RET fusions were more frequent in older patients (median age of 66 vs. 60 years, p = 0.052), with ECOG PS 1-2 (90% vs. 50%, p = 0.02), right-sided (55% vs. 32%, P=0.013), previously unresected primary tumors (58% vs. 21%, P<0.001), RAS and BRAF wild-type (100% vs. 40%, p < 0.001) and MSI-high (48% vs. 7%, P<0.001). Notably, 11 (26%) out of 43 patients with right-sided, RAS and BRAF wild-type tumors harbored a RET rearrangement. At a median follow-up of 45.8 months, patients with RET fusion-positive tumors showed a significantly worse OS when compared with RET-negative ones (median OS 14.0 vs. 38.0 months, HR: 4.59; 95% CI, 3.64-32.66; P<0.001). In the multivariable model, RET rearrangements were still associated with shorter OS [HR: 2.97; 95% CI, 1.25-7.07; P=0.014], while primary tumor location, RAS and BRAF mutations and MSI status were not. Though very rare, RET rearrangements define a new subtype of mCRC that shows poor prognosis with conventional treatments and is therefore worth of a specific management.

  11. Modifications Caused by Enzyme-Retting and Their Effect on Composite Performance

    Directory of Open Access Journals (Sweden)

    Jonn A. Foulk

    2011-01-01

    Full Text Available Bethune seed flax was collected from Canada with seed removed using a stripper header and straw pulled and left in field for several weeks. Unretted straw was decorticated providing a coarse fiber bundle feedstock for enzyme treatments. Enzyme treatments using a bacterial pectinolytic enzyme with lyase activity were conducted in lab-scale reactors. Four fiber specimens were created: no retting, minimal retting, moderate retting, and full retting. Fiber characterization tests: strength, elongation, diameter, metal content, wax content, and pH were conducted with significant differences between fibers. Thermosetting vinyl ester resin was used to produce composite panels via vacuum-assisted infusion. Composite performance was evaluated using fiber bundle pull-out, tensile, impact, and interlaminar shear tests. Composite tests indicate that composite panels are largely unchanged among fiber samples. Variation in composite performance might not be realized due to poor interfacial bonding being of larger impact than the more subtle changes incurred by the enzyme treatment.

  12. Developmental wiring of specific neurons is regulated by RET-1/Nogo-A in Caenorhabditis elegans

    DEFF Research Database (Denmark)

    Torpe, Nanna; Nørgaard, Steffen; Høye, Anette M.

    2017-01-01

    Nogo-A is a membrane-bound protein that functions to inhibit neuronal migration, adhesion, and neurite outgrowth during development. In the mature nervous system, Nogo-A stabilizes neuronal wiring to inhibit neuronal plasticity and regeneration after injury. Here, we show that RET-1, the sole Nog...... present a previously unidentified function for RET-1 in the nervous system of C. elegans.......-A homolog in Caenorhabditis elegans, is required to control developmental wiring of a specific subset of neurons. In ret-1 deletion mutant animals, specific ventral nerve cord axons are misguided where they fail to respect the ventral midline boundary. We found that ret-1 is expressed in multiple neurons...

  13. Controlled retting of hemp fibres: Effect of hydrothermal pre-treatmen tand enzymatic retting on the mechanical properties of unidirectiona lhemp/epoxy composites

    DEFF Research Database (Denmark)

    Liu, Ming; Silva, Diogo Alexandre Santos; Fernando, Dinesh

    2016-01-01

    The objective of this work was to investigate the use of hydrothermal pre-treatment and enzymatic retting to remove non-cellulosic compounds and thus improve the mechanical properties of hemp fibre/epoxy composites. Hydrothermal pre-treatment at 100 kPa and 121 °C combined with enzymatic retting...... produced fibres with the highest ultimate tensile strength (UTS) of 780 MPa. Compared to untreated fibres, this combined treatment exhibited a positive effect on the mechanical properties of hemp fibre/epoxy composites, resulting in high quality composites with low porosity factor (αpf) of 0.08.Traditional...

  14. Novel tumorigenic rearrangement, Δrfp/ret, in a papillary thyroid carcinoma from externally irradiated patient

    International Nuclear Information System (INIS)

    Saenko, Vladimir; Rogounovitch, Tatiana; Shimizu-Yoshida, Yuki; Abrosimov, Aleksandr; Lushnikov, Eugeny; Roumiantsev, Pavel; Matsumoto, Naomichi; Nakashima, Masahiro; Meirmanov, Serik; Ohtsuru, Akira; Namba, Hiroyuki; Tsyb, Anatoly; Yamashita, Shunichi

    2003-01-01

    Molecular analysis of cDNA derived from a papillary thyroid carcinoma (PTC) (follicular variant of papillary thyroid carcinoma on histology) which developed in an externally irradiated patient 4 years after exposure identified a portion of the 5' region, exons 1-3, of the rfp gene juxtaposed upstream of the fragment encoding the tyrosine kinase (TK) domain of the ret gene. The fusion gene, termed Δrfp/ret, was the result of a balanced chromosomal translocation t(6;10) (p21.3;q11.2) confirmed by interphase FISH painting, with breakpoints occurring in introns 3 and 11 of the rfp and ret genes, respectively. Both Δrfp/ret and reciprocal ret/rfp chimeric introns had small deletions around breakpoints consistent with presumed misrepair of a radiation-induced double-strand DNA break underlying the rearrangement. No extensive sequence homology was found between the fragments flanking the breakpoints. The fusion protein retained the propensity to form oligomers likely to be mediated by a coiled-coil of the RFP polypeptide as assessed by a yeast two-hybrid system. NIH 3T3 fibroblasts stably transfected with a mammalian expression vector encoding full-length ΔRFP/RET readily gave rise to the tumors in athymic mice suggestive of high transforming potential of the fusion protein. Thus, the Δrfp/ret rearrangement may be causatively involved in cancerogenesis and provides additional evidence of the role of activated ret oncogene in the development of a subset of papillary thyroid carcinoma

  15. Comparative evaluation of RetCam vs. gonioscopy images in congenital glaucoma

    OpenAIRE

    Azad, Raj V; Chandra, Parijat; Chandra, Anuradha; Gupta, Aparna; Gupta, Viney; Sihota, Ramanjit

    2014-01-01

    Purpose: To compare clarity, exposure and quality of anterior chamber angle visualization in congenital glaucoma patients, using RetCam and indirect gonioscopy images. Design: Cross-sectional study Participants. Congenital glaucoma patients over age of 5 years. Materials and Methods: A prospective consecutive pilot study was done in congenital glaucoma patients who were older than 5 years. Methods used are indirect gonioscopy and RetCam imaging. Clarity of the image, extent of angle visible a...

  16. Combined treatment of retting flax wastewater using Fenton oxidation and granular activated carbon

    OpenAIRE

    Abou-Elela, Sohair I.; Ali, Mohammed Eid M.; Ibrahim, Hanan S.

    2016-01-01

    The process of retting flax produces a huge amount of wastewater which is characterized with bad unpleasant smell and high concentration of organic materials. Treatment of such waste had always been difficult because of the presence of refractory organic pollutants such as lignin. In this study, treatment of retting wastewater was carried out using combined system of Fenton oxidation process followed by adsorption on granular activated carbon (GAC). The effects of operating condition on Fento...

  17. Novel tumorigenic rearrangement, {delta}rfp/ret, in a papillary thyroid carcinoma from externally irradiated patient

    Energy Technology Data Exchange (ETDEWEB)

    Saenko, Vladimir; Rogounovitch, Tatiana; Shimizu-Yoshida, Yuki; Abrosimov, Aleksandr; Lushnikov, Eugeny; Roumiantsev, Pavel; Matsumoto, Naomichi; Nakashima, Masahiro; Meirmanov, Serik; Ohtsuru, Akira; Namba, Hiroyuki; Tsyb, Anatoly; Yamashita, Shunichi

    2003-06-19

    Molecular analysis of cDNA derived from a papillary thyroid carcinoma (PTC) (follicular variant of papillary thyroid carcinoma on histology) which developed in an externally irradiated patient 4 years after exposure identified a portion of the 5' region, exons 1-3, of the rfp gene juxtaposed upstream of the fragment encoding the tyrosine kinase (TK) domain of the ret gene. The fusion gene, termed {delta}rfp/ret, was the result of a balanced chromosomal translocation t(6;10) (p21.3;q11.2) confirmed by interphase FISH painting, with breakpoints occurring in introns 3 and 11 of the rfp and ret genes, respectively. Both {delta}rfp/ret and reciprocal ret/rfp chimeric introns had small deletions around breakpoints consistent with presumed misrepair of a radiation-induced double-strand DNA break underlying the rearrangement. No extensive sequence homology was found between the fragments flanking the breakpoints. The fusion protein retained the propensity to form oligomers likely to be mediated by a coiled-coil of the RFP polypeptide as assessed by a yeast two-hybrid system. NIH 3T3 fibroblasts stably transfected with a mammalian expression vector encoding full-length {delta}RFP/RET readily gave rise to the tumors in athymic mice suggestive of high transforming potential of the fusion protein. Thus, the {delta}rfp/ret rearrangement may be causatively involved in cancerogenesis and provides additional evidence of the role of activated ret oncogene in the development of a subset of papillary thyroid carcinoma.

  18. Bacterial succession and metabolite changes during flax (Linum usitatissimum L.) retting with Bacillus cereus HDYM-02.

    Science.gov (United States)

    Zhao, Dan; Liu, Pengfei; Pan, Chao; Du, Renpeng; Ping, Wenxiang; Ge, Jingping

    2016-09-02

    High-throughput sequencing and GC-MS (gas chromatography-mass spectrometry) were jointly used to reveal the bacterial succession and metabolite changes during flax (Linum usitatissimum L.) retting. The inoculation of Bacillus cereus HDYM-02 decreased bacterial richness and diversity. This inoculum led to the replacement of Enterobacteriaceae by Bacillaceae. The level of aerobic Pseudomonadaceae (mainly Azotobacter) and anaerobic Clostridiaceae_1 gradually increased and decreased, respectively. Following the addition of B. cereus HDYM-02, the dominant groups were all degumming enzyme producers or have been proven to be involved in microbial retting throughout the entire retting period. These results could be verified by the metabolite changes, either degumming enzymes or their catalytic products galacturonic acid and reducing sugars. The GC-MS data showed a clear separation between flax retting with and without B. cereus HDYM-02, particularly within the first 72 h. These findings reveal the important bacterial groups that are involved in fiber retting and will facilitate improvements in the retting process.

  19. Observation of aggregation triggered by Resonance Energy Transfer (RET) induced intermolecular pairing force.

    Science.gov (United States)

    Pan, Xiaoyong; Wang, Weizhi; Ke, Lin; Zhang, Nan

    2017-07-20

    In this report, we showed the existence of RET induced intermolecular pairing force by comparing their fluorescence behaviors under room illumination vs standing in dark area for either PFluAnt solution or PFluAnt&PFOBT mixture. Their prominent emission attenuation under room illumination brought out the critical role of photo, i.e. RET induced intermolecular pairing force in induction of polymer aggregation. Constant UV-Vis absorption and fluorescence spectra in terms of both peak shapes and maximum wavelengths implied no chemical decomposition was involved. Recoverable fluorescence intensity, fluorescence lifetime as well as NMR spectra further exclude photo induced decomposition. The controllable on/off state of RET induced intermolecular pairing force was verified by the masking effect of outside PFluAnt solution which function as filter to block the excitation of inside PFluAnt and thus off the RET induced intermolecular pairing force. Theoretical calculation suggest that magnitude of RET induced intermolecular pairing force is on the same scale as that of van der Waals interaction. Although the absolute magnitude of RET induced intermolecular pairing force was not tunable, its effect can be magnified by intentionally turn it "on", which was achieved by irradiance with 5 W desk lamp in this report.

  20. The dependence receptor Ret induces apoptosis in somatotrophs through a Pit-1/p53 pathway, preventing tumor growth.

    Science.gov (United States)

    Cañibano, Carmen; Rodriguez, Noela L; Saez, Carmen; Tovar, Sulay; Garcia-Lavandeira, Montse; Borrello, Maria Grazia; Vidal, Anxo; Costantini, Frank; Japon, Miguel; Dieguez, Carlos; Alvarez, Clara V

    2007-04-18

    Somatotrophs are the only pituitary cells that express Ret, GFRalpha1 and GDNF. This study investigated the effects of Ret in a somatotroph cell line, in primary pituitary cultures and in Ret KO mice. Ret regulates somatotroph numbers by inducing Pit-1 overexpression, leading to increased p53 expression and apoptosis, both of which can be prevented with Ret or Pit-1 siRNA. The Pit-1 overexpression is mediated by sustained activation of PKCdelta, JNK, c/EBPalpha and CREB induced by a complex of Ret, caspase 3 and PKCdelta. In the presence of GDNF, Akt is activated, and the Pit-1 overexpression and resulting apoptosis are blocked. The adenopituitary of Ret KO mice is larger than normal, showing Pit-1 and somatotroph hyperplasia. In normal animals, activation of the Ret/Pit-1/p53 pathway by retroviral introduction of Ret blocked tumor growth in vivo. Thus, somatotrophs have an intrinsic mechanism for controlling Pit-1/GH production through an apoptotic/survival pathway. Ret might be of value for treatment of pituitary adenomas.

  1. Expression of the RET/PTC fusion gene as a marker for papillary carcinoma in Hashimoto's thyroiditis

    DEFF Research Database (Denmark)

    Wirtschafter, A; Schmidt, R; Rosen, D

    1997-01-01

    specific genes in patients diagnosed with Hashimoto's disease. The newly identified oncogenes RET/PTC1 and RET/PTC3 provide useful and specific markers of the early stages of papillary carcinoma as they are highly specific for malignant cells. Using a sensitive and specific reverse transcriptase......-polymerase chain reaction (RT-PCR) assay, we found messenger RNA (mRNA) expression for the RET/PTC1 and RET/PTC3 oncogenes in 95% of the Hashimoto's patients studied. All Hashimoto's patients presenting without histopathologic evidence of papillary thyroid cancer showed molecular genetic evidence of cancer...

  2. New Insights into c-Ret Signalling Pathway in the Enteric Nervous System and Its Relationship with ALS

    Directory of Open Access Journals (Sweden)

    M. J. Luesma

    2014-01-01

    Full Text Available The receptor tyrosine kinase Ret (c-Ret transduces the glial cell line-derived neurotrophic factor (GDNF signal, one of the neurotrophic factors related to the degeneration process or the regeneration activity of motor neurons in amyotrophic lateral sclerosis (ALS. The phosphorylation of several tyrosine residues of c-Ret seems to be altered in ALS. c-Ret is expressed in motor neurons and in the enteric nervous system (ENS during the embryonic period. The characteristics of the ENS allow using it as model for central nervous system (CNS study and being potentially useful for the research of human neurological diseases such as ALS. The aim of the present study was to investigate the cellular localization and quantitative evaluation of marker c-Ret in the adult human gut. To assess the nature of c-Ret positive cells, we performed colocalization with specific markers of cells that typically are located in the enteric ganglia. The colocalization of PGP9.5 and c-Ret was preferentially intense in enteric neurons with oval morphology and mostly peripherally localized in the ganglion, so we concluded that the c-Ret receptor is expressed by a specific subtype of enteric neurons in the mature human ENS of the gut. The functional significance of these c-Ret positive neurons is discussed.

  3. New insights into c-Ret signalling pathway in the enteric nervous system and its relationship with ALS.

    Science.gov (United States)

    Luesma, M J; Cantarero, I; Álvarez-Dotu, J M; Santander, S; Junquera, C

    2014-01-01

    The receptor tyrosine kinase Ret (c-Ret) transduces the glial cell line-derived neurotrophic factor (GDNF) signal, one of the neurotrophic factors related to the degeneration process or the regeneration activity of motor neurons in amyotrophic lateral sclerosis (ALS). The phosphorylation of several tyrosine residues of c-Ret seems to be altered in ALS. c-Ret is expressed in motor neurons and in the enteric nervous system (ENS) during the embryonic period. The characteristics of the ENS allow using it as model for central nervous system (CNS) study and being potentially useful for the research of human neurological diseases such as ALS. The aim of the present study was to investigate the cellular localization and quantitative evaluation of marker c-Ret in the adult human gut. To assess the nature of c-Ret positive cells, we performed colocalization with specific markers of cells that typically are located in the enteric ganglia. The colocalization of PGP9.5 and c-Ret was preferentially intense in enteric neurons with oval morphology and mostly peripherally localized in the ganglion, so we concluded that the c-Ret receptor is expressed by a specific subtype of enteric neurons in the mature human ENS of the gut. The functional significance of these c-Ret positive neurons is discussed.

  4. Ret and Etv4 Promote Directed Movements of Progenitor Cells during Renal Branching Morphogenesis.

    Directory of Open Access Journals (Sweden)

    Paul Riccio

    2016-02-01

    Full Text Available Branching morphogenesis of the epithelial ureteric bud forms the renal collecting duct system and is critical for normal nephron number, while low nephron number is implicated in hypertension and renal disease. Ureteric bud growth and branching requires GDNF signaling from the surrounding mesenchyme to cells at the ureteric bud tips, via the Ret receptor tyrosine kinase and coreceptor Gfrα1; Ret signaling up-regulates transcription factors Etv4 and Etv5, which are also critical for branching. Despite extensive knowledge of the genetic control of these events, it is not understood, at the cellular level, how renal branching morphogenesis is achieved or how Ret signaling influences epithelial cell behaviors to promote this process. Analysis of chimeric embryos previously suggested a role for Ret signaling in promoting cell rearrangements in the nephric duct, but this method was unsuited to study individual cell behaviors during ureteric bud branching. Here, we use Mosaic Analysis with Double Markers (MADM, combined with organ culture and time-lapse imaging, to trace the movements and divisions of individual ureteric bud tip cells. We first examine wild-type clones and then Ret or Etv4 mutant/wild-type clones in which the mutant and wild-type sister cells are differentially and heritably marked by green and red fluorescent proteins. We find that, in normal kidneys, most individual tip cells behave as self-renewing progenitors, some of whose progeny remain at the tips while others populate the growing UB trunks. In Ret or Etv4 MADM clones, the wild-type cells generated at a UB tip are much more likely to remain at, or move to, the new tips during branching and elongation, while their Ret-/- or Etv4-/- sister cells tend to lag behind and contribute only to the trunks. By tracking successive mitoses in a cell lineage, we find that Ret signaling has little effect on proliferation, in contrast to its effects on cell movement. Our results show that Ret

  5. RET Functions as a Dual-Specificity Kinase that Requires Allosteric Inputs from Juxtamembrane Elements

    Directory of Open Access Journals (Sweden)

    Iván Plaza-Menacho

    2016-12-01

    Full Text Available Receptor tyrosine kinases exhibit a variety of activation mechanisms despite highly homologous catalytic domains. Such diversity arises through coupling of extracellular ligand-binding portions with highly variable intracellular sequences flanking the tyrosine kinase domain and specific patterns of autophosphorylation sites. Here, we show that the juxtamembrane (JM segment enhances RET catalytic domain activity through Y687. This phospho-site is also required by the JM region to rescue an otherwise catalytically deficient RET activation-loop mutant lacking tyrosines. Structure-function analyses identified interactions between the JM hinge, αC helix, and an unconventional activation-loop serine phosphorylation site that engages the HRD motif and promotes phospho-tyrosine conformational accessibility and regulatory spine assembly. We demonstrate that this phospho-S909 arises from an intrinsic RET dual-specificity kinase activity and show that an equivalent serine is required for RET signaling in Drosophila. Our findings reveal dual-specificity and allosteric components for the mechanism of RET activation and signaling with direct implications for drug discovery.

  6. Spatial Positioning of RET and H4 Following Radiation Exposure Leads to Tumor Development

    Directory of Open Access Journals (Sweden)

    Yuri E. Nikiforov

    2001-01-01

    Full Text Available Exposure to ionizing radiation is a well-known risk factor for a number of human cancers, including leukemia, thyroid cancer, soft tissue sarcomas, and many others. Although it has been known for a long time that radiation exposure to the cell results in extensive DNA damage, including double strand DNA breaks, the exact mechanisms of radiation-induced carcinogenesis remain unknown. Recently, a large increase in incidence of thyroid cancer was observed in children exposed to radiation after the Chernobyl nuclear accident [1]. A high prevalence of chromosomal rearrangements involving the RET gene was found among these radiation-induced thyroid tumors [2,3]. As a result of such rearrangement, a portion of the RET gene is fused with another gene, typically with the H4 or ELE1. However, since the DNA targets of ionizing radiation are randomly distributed throughout the cell nucleus, the reason for predilection for the RET rearrangements in thyroid cells was unclear.

  7. Technical evaluation of RETS-required reports for Turkey Point Units No. 3 and 4

    International Nuclear Information System (INIS)

    Magleby, E.H.; Young, T.E.; Henscheid, J.W.

    1985-01-01

    A review of the reports required by Federal regulations and the plant specific Radiological Effluent Technical Specifications (RETS) for operations conducted during 1983 was performed. The periodic reports reviewed were the Annual Radiological Environmental Operating Report for 1983 and Semiannual Radioactive Effluent Release Reports for 1983. The principal review guidelines were the plant's specific RETS, NUREG-0133, ''Preparation of Radiological Effluent Technical Specifications for Nuclear Power Plants'', and NRC Guidance on the Review of the Process Control Programs. The Licensee's submitted reports were found to be reasonably complete and consistent with the review guidelines

  8. Technical evaluation of RETS-required reports for the La Crosse boiling water reactor

    International Nuclear Information System (INIS)

    Magleby, E.H.; Young, T.E.

    1985-01-01

    A review of the reports required by federal regulations and the plant-specific Radiological Effluent Technical Specifications (RETS) for operations conducted during 1983 was performed. The periodic reports reviewed were the Annual Radiological Environmental Operating Report for 1983 and the Semiannual Radioactive Effluent Release Reports for 1983. The principal review guidelines were the plant-specific RETS, NUREG-0133, ''Preparation of Radiological Effluent Technical Specifications for Nuclear Power Plants'', and NRC Guidance on the Review of the Process Control Programs. The Licensee's submitted reports were found to be reasonably complete and consistent with the review guidelines. 5 refs

  9. Technical evaluation of RETS-required reports for Duane Arnold Energy Center Unit No. 1

    International Nuclear Information System (INIS)

    Young, T.E.; Magleby, E.H.; Henscheid, J.W.

    1985-01-01

    A review of the reports required by federal regulations and the plant-specific Radiological Effluent Technical Specifications (RETS) for operations conducted during 1983 was performed. The periodic reports reviewed were the Annual Radiological Environmental Operating Report for 1983 and the Semiannual Radioactive Effluent Release Reports for 1983. The principal review guidelines were the plant's specific RETS, NUREG-0133, ''Preparation of Radiological Effluent Technical Specifications for Nuclear Power Plants'', and NRC Guidance on the Review of the Process Control Programs. The Licensee's submitted reports were found to be reasonably complete and consistent with the review guidelines. 8 refs

  10. Technical evaluation of RETS-required reports for Kewaunee Nuclear Power Plant for 1983

    International Nuclear Information System (INIS)

    Magleby, E.H.; Young, T.E.

    1985-01-01

    A review of the reports required by Federal regulations and the plant-specific Radiological Effluent Technical Specifications (RETS) for operations conducted at the Kewaunee Nuclear Power Plant during 1983 was performed. The periodic reports reviewed were the two Semiannual Effluent Release Reports for 1983 and the annual Kewaunee Environmental Radioactivity Survey. The principal review guidelines were the plant's specific RETS and NRC guidance given in NUREG-0133, ''Preparation of Radiological Effluent Technical Specifications for Nuclear Power Plants.'' The Licensee's submitted reports were found to be reasonably complete and consistent with the review guidelines

  11. Characterization and vectorization of siRNA targeting RET/PTC1 in human papillary thyroid carcinoma cells

    Directory of Open Access Journals (Sweden)

    Massade L.

    2011-10-01

    Full Text Available RET/PTC1 fusion oncogene is the most common genetic alteration identified to date in thyroid papillary carcinomas (PTC and represents a good target for small interfering RNA (siRNA. Our aim was: i to target the RET/PTC1 oncogene by siRNAs, ii to assess the knockdown effects on cell growth and cell cycle regulation and iii to vectorize it in order to protect it from degradation. Methods. Human cell lines expressing RET/PTC1 were transfected by siRNA RET/PTC1, inhibition of the oncogene expression was assessed by qRT-PCR and by Western blot. Conjugation of siRNA RET/PTC1 to squalene was performed by coupling it to squalene. In vivo studies are performed in nude mice. Conclusion. In this short communication, we report the main published results obtained during last years.

  12. A germline RET proto-oncogene mutation in multiple members of an ...

    African Journals Online (AJOL)

    Makia Marafie

    2016-09-17

    Sep 17, 2016 ... The Egyptian Journal of Medical Human Genetics (2017) 18, 193–197. HOSTED BY ... been reported in 85% of tested individuals, nearly 50% of them are amino acid .... [1] Krampitz GW, Norton JA. RET gene mutations ...

  13. Is thyroidectomy necessary in RET mutations carriers of the familial medullary thyroid carcinoma syndrome?

    DEFF Research Database (Denmark)

    Hansen, H S; Torring, H; Godballe, C

    2000-01-01

    BACKGROUND: The results and consequences of genetic testing in a family with familial medullary thyroid carcinoma (FMTC) are described. METHODS: In the screening of relatives, serum calcitonin is replaced by RET mutation analysis that was performed in families suspected of hereditary medullary th...

  14. A germline RET proto-oncogene mutation in multiple members of an ...

    African Journals Online (AJOL)

    Background: Multiple endocrine neoplasia type 2A (MEN2A) is a rare cancer associated-syndrome, inherited in an autosomal dominant fashion and caused by germline mutation in RET proto-oncogene. Clinical diagnosis depends on the manifestation of two or more certain endocrine tumors in an individual, such as ...

  15. Variants in RET Associated With Hirschsprung's Disease Affect Binding of Transcription Factors and Gene Expression

    NARCIS (Netherlands)

    Sribudiani, Yunia; Metzger, Marco; Osinga, Jan; Rey, Amanda; Burns, Alan J.; Thapar, Nikhil; Hofstra, Robert M. W.

    BACKGROUND & AIMS: Two noncoding variations in RET-the T allele of the single nucleotide polymorphism (SNP) rs2435357 (Enh1:C>T) and the A allele of the SNP rs2506004 (Enh2:C>A)-are associated with Hirschsprung's disease. These SNPs are in strong linkage disequilibrium and located in an enhancer

  16. Synergistic growth inhibition of cancer cells harboring the RET/PTC1 ...

    Indian Academy of Sciences (India)

    Synergistic growth inhibition of cancer cells harboring the RET/PTC1 oncogene by staurosporine and rotenone involves enhanced cell death. ANTÓNIO PEDRO GONÇALVES, ARNALDO VIDEIRA, VALDEMAR MÁXIMO and PAULA SOARES. J. Biosci. 36(4), September 2011, 639-648, © Indian Academy of Sciences.

  17. No mutations found by RET mutation scanning in sporadic and hereditary neuroblastoma

    NARCIS (Netherlands)

    Hofstra, RMW; Cheng, NC; Stulp, RP; Stelwagen, T; Clausen, N; Tommerup, N; Caron, H; Westerveld, A; Buys, CHCM

    Neuroblastoma occasionally occurs in diseases associated with abnormal neurocrest differentiation, e.g. Hirschsprung disease. Expression studies in developing mice suggest that the proto-oncogene RET plays a role in neurocrest differentiation. In humans expression of RT is limited to certain tumor

  18. Ret receptor tyrosine kinase sustains proliferation and tissue maturation in intestinal epithelia

    DEFF Research Database (Denmark)

    Perea, Daniel; Guiu, Jordi; Hudry, Bruno

    2017-01-01

    Expression of the Ret receptor tyrosine kinase is a defining feature of enteric neurons. Its importance is underscored by the effects of its mutation in Hirschsprung disease, leading to absence of gut innervation and severe gastrointestinal symptoms. We report a new and physiologically significant...

  19. The Establishment of a Formal Midwest Renewable Energy Tracking System (M-RETS) Organization

    Energy Technology Data Exchange (ETDEWEB)

    Maria Redmond; Chela Bordas O' Connor

    2010-06-30

    The objectives identified in requesting and utilizing this funding has been met. The goal was to establish a formal, multi-jurisdictional organization to: (1) ensure the policy objectives of the participating jurisdictions are addressed through increased tradability of the Renewable Energy Credits (RECs) from M-RETS and to eliminate the possibility that a single jurisdiction will be the sole arbiter of the operation of the system; (2) facilitate the establishment of REC standards including the attributes related to, the creation, trading, and interaction with other trading and tracking systems; and (3) have a centralized and established organization that will be responsible for the contracting and governance responsibilities of a multi-jurisdictional tracking system. The M-RETS Inc. Board ensures that the system remains policy neutral; that the attributes of generation are tracked in a way that allows the system users to easily identify and trade relevant RECs; that the system can add jurisdictions as needed or desired; and that the tracking system operate in such a way to allow for the greatest access possible for those participating in other tracking or trading systems by allowing those systems to negotiate with a single M-RETS entity for the import and export of RECs. M-RETS as an organizational body participates and often leads the discussions related to the standardization of RECs and increasing the tradability of M-RETS RECs. M-RETS is a founding member of the Environmental Trading Network of North America (ETNNA) and continues to take a leadership role in the development of processes to facilitate trading among tracking systems and to standardize REC definitions. The Board of Directors of M-RETS, Inc., the non-profit corporation, continues to hold telephone/internet Board meetings. Legal counsel continues working with the board and APX management on a new agreement with APX. The board expects to have an agreement and corresponding fee structure in place by

  20. Targeting surface nucleolin with a multivalent pseudopeptide delays development of spontaneous melanoma in RET transgenic mice

    International Nuclear Information System (INIS)

    El Khoury, Diala; Courty, José; Hovanessian, Ara G; Prévost-Blondel, Armelle; Destouches, Damien; Lengagne, Renée; Krust, Bernard; Hamma-Kourbali, Yamina; Garcette, Marylène; Niro, Sandra; Kato, Masashi; Briand, Jean-Paul

    2010-01-01

    The importance of cell-surface nucleolin in cancer biology was recently highlighted by studies showing that ligands of nucleolin play critical role in tumorigenesis and angiogenesis. By using a specific antagonist that binds the C-terminal tail of nucleolin, the HB-19 pseudopeptide, we recently reported that HB-19 treatment markedly suppressed the progression of established human breast tumor cell xenografts in the athymic nude mice without apparent toxicity. The in vivo antitumoral action of HB-19 treatment was assessed on the spontaneous development of melanoma in the RET transgenic mouse model. Ten days old RET mice were treated with HB-19 in a prophylactic setting that extended 300 days. In parallel, the molecular basis for the action of HB-19 was investigated on a melanoma cell line (called TIII) derived from a cutaneous nodule of a RET mouse. HB-19 treatment of RET mice caused a significant delay in the onset of cutaneous tumors, several-months delay in the incidence of large tumors, a lower frequency of cutaneous nodules, and a reduction of visceral metastatic nodules while displaying no toxicity to normal tissue. Moreover, microvessel density was significantly reduced in tumors recovered from HB-19 treated mice compared to corresponding controls. Studies on the melanoma-derived tumor cells demonstrated that HB-19 treatment of TIII cells could restore contact inhibition, impair anchorage-independent growth, and reduce their tumorigenic potential in mice. Moreover, HB-19 treatment caused selective down regulation of transcripts coding matrix metalloproteinase 2 and 9, and tumor necrosis factor-α in the TIII cells and in melanoma tumors of RET mice. Although HB-19 treatment failed to prevent the development of spontaneous melanoma in the RET mice, it delayed for several months the onset and frequency of cutaneous tumors, and exerted a significant inhibitory effect on visceral metastasis. Consequently, HB-19 could provide a novel therapeutic agent by itself or

  1. Estudio retórico-comunicativo de los debates presidenciales mexicanos (2006

    Directory of Open Access Journals (Sweden)

    Felicísimo Valbuena de la Fuente

    2007-01-01

    Full Text Available En su Retórica, Aristóteles distinguió materiales de prueba personal (ethos,argumentales (logos y dramáticos, o de experiencia (pathos. También distinguió entre discursos judiciales, deliberativos y epidícticos o demostrativos. El autor de este trabajo quiere demostrar que la Retórica de Aristóteles sigue vigente analizando los debates presidenciales mexicanos en 2006. Se ocupa de cómo cada candidato se atuvo a las normas de los debates, su concepción del público y cómo emplearon los tres tipos de materiales. Asimismo, ilustra sus afirmaciones con numerosos ejemplos.

  2. La traducción como ejercicio retórico y gramatical

    OpenAIRE

    Chico Rico, Francisco

    2009-01-01

    Este trabajo de investigación se centra fundamentalmente en los debates disciplinares latinos en torno a la traducción y a su importancia para la formación del orador en particular y para la educación para la comunicación social en general. En este contexto se aborda el ejercicio de la traducción tanto en el marco de la teoría retórica como en el dominio de la teoría gramatical, así como en el seno de las relaciones entre aquél y éste, ya que si la teoría retórica consideró la traducción fund...

  3. Radiological Effluent Technical Specifications (RETS) implementation: Zion Generating Station Units 1 and 2

    International Nuclear Information System (INIS)

    Serrano, W.; Akers, D.W.; Duce, S.W.; Mandler, J.W.; Simpson, F.B.; Young, T.E.

    1985-06-01

    A review of the Radiological Effluent Technical Specifications (RETS) of the Zion Generating Station Units 1 and 2 was performed. The principal review guidelines used were NUREG-0133, ''Preparation of Radiological Effluent Technical Specifications for Nuclear Power Plants,'' and Draft 7 of NUREG-0472, Revision 3, ''Radiological Effluent Technical Specifications for Pressurized Water Reactors.'' Draft submittals were discussed with the Licensee by both EG and G and the NRC staff until all items requiring changes to the Technical Specifications were resolved. The Licensee then submitted final proposed RETS to the NRC which were evaluated and found to be in compliance with the NRC review guidelines. The proposed Offsite Dose Calculation Manual was reviewed and generally found to be consistent with the NRC review guidelines. 35 refs., 2 figs., 1 tab

  4. Retórica do consumo: o discurso em ação persuasiva

    OpenAIRE

    Pinheiro, Noslen Nascimento

    2016-01-01

    Diante das inúmeras possibilidades de estudo que o discurso publicitário proporciona, propomos, neste trabalho, uma análise retórica dos títulos de anúncios veiculados em revistas impressas de 1808 a 2015, no Brasil. Em alguns casos, a análise se estende aos textos adicionais para elucidar as intenções argumentativas do orador. Nossa proposta baseia-se essencialmente em uma fundamentação teórica sobre a retórica, exposta no capítulo 1, as quais são baseadas nas teorias de Aristóteles (1985...

  5. IMPACT OF JUTE RETTING ON PHYTOPLANKTON DIVERSITY AND AQUATIC HEALTH: BIOMONITORING IN A TROPICAL OXBOW LAKE

    Directory of Open Access Journals (Sweden)

    Dipankar Ghosh

    2015-11-01

    Full Text Available Phytoplankton acts as a primary producer and biological filter of aquatic ecosystem. Jute retting during monsoon is a common anthropological activity in the rural Bengal. Quantitative seasonal bio-monitoring of phytoplankton community composition with relative abundance and its diversity indices was carried out in this study from April 2013 to March 2014 to assess water quality and the impact of jute retting on phytoplankton diversity of a tropical fresh water oxbow lake in Nadia district of India. We recorded a total of 34 genera of 5 distinct classes, Chlorophyceae (15, Bacillariophyceae (13, Cyanophyceae (4, Dinophyceae (1 and Euglenophyceae (1. Members of Chlorophyceae dominated throughout the year. Unlike Cyanophyceae, Bacillariophyceae was found to be significantly increased during monsoon when compared to the rest of the year. Average phytoplankton density was highest in post-monsoon (8760/L followed by monsoon (4680/L and pre-monsoon (3650/L. Owing to the dominance of class Chlorophyceae and Bacillariophyceae we found this lake to be oligotrophic to mesotrophic. Indices values of genera richness, Shannon-Wiener, evenness and Simpson’s diversity reached their lowest 14, 1.61, 0.61 and 0.68 in monsoon and highest 23, 2.42, 0.77 and 0.86 in post monsoon respectively. The lowest diversity values during monsoon clearly suggested that the selected lake has highest anthropogenic pollution due to jute retting which impacted significantly on phytoplankton diversity. Therefore, the lake is not conducive for fish growth especially during monsoon and we opine that there is a need to regulate jute retting process, intensity and its density in the lake during the monsoon to ensure enhanced biodiversity for sustainable management and conservation of aquatic environment of this Oxbow lake.

  6. Prisen Årets studenter start-up går til Drop Bucket

    DEFF Research Database (Denmark)

    Lassen, Lisbeth

    2015-01-01

    DTU’s ny pris for årets mest innovative studerende blev ved universitetets årsfest givet til Heiða Gunnarsdóttir Nolsøe og Marie Stampe Berggreen, som står bag virksomheden Drop Bucket. Koncerndirektør for innovation og entreprenørskab, Marianne Thellersen, overakte prisen til de to innovatører s...

  7. Comparison of GFL–GFRα complexes: further evidence relating GFL bend angle to RET signalling

    International Nuclear Information System (INIS)

    Parkash, Vimal; Goldman, Adrian

    2009-01-01

    The second crystal structure of the GDNF-GFRα1 complex provides further evidence that GFL signalling through RET is determined by the bend angle in the GFL. Glial cell line-derived neurotrophic factor (GDNF) activates the receptor tyrosine kinase RET by binding to the GDNF-family receptor α1 (GFRα1) and forming the GDNF 2 –GFRα1 2 –RET 2 heterohexamer complex. A previous crystal structure of the GDNF 2 –GFRα1 2 complex suggested that differences in signalling in GDNF-family ligand (GFL) complexes might arise from differences in the bend angle between the two monomers in the GFL homodimer. Here, a 2.35 Å resolution structure of the GDNF 2 –GFRα1 2 complex crystallized with new cell dimensions is reported. The structure was refined to a final R factor of 22.5% (R free = 28%). The structures of both biological tetrameric complexes in the asymmetric unit are very similar to 2v5e and different from the artemin–GFRα3 structure, even though there is a small change in the structure of the GDNF. By comparison of all known GDNF and artemin structures, it is concluded that GDNF is more bent and more flexible than artemin and that this may be related to RET signalling. Comparisons also suggest that the differences between artemin and GDNF arise from the increased curvature of the artemin ‘fingers’, which both increases the buried surface area in the monomer–monomer interface and changes the intermonomer bend angle. From sequence comparison, it is suggested that neuturin (the second GFL) adopts an artemin-like conformation, while persephin has a different conformation to the other three

  8. Screening for retinopathy of prematurity-a comparison between binocular indirect ophthalmoscopy and RetCam 120

    Directory of Open Access Journals (Sweden)

    Shah Parag

    2006-01-01

    Full Text Available Aim: To compare the photographic screening for retinopathy of prematurity (ROP using RetCam 120 with binocular indirect ophthalmoscope (BIO, which is the current gold standard. Setting and Design: Prospective, comparative study. Materials and Methods: A total of 87 RetCam examinations were performed on 27 premature babies. They were stored in a separate file after deleting the identifying information. At the same visit using the BIO with scleral depression, an experienced vitreoretinal surgeon evaluated the fundus in detail. A masked examiner then evaluated the RetCam photographs for presence or absence of ROP, the stage and zone of the disease, and the presence or absence of plus disease. These data were then compared with the BIO findings to determine the sensitivity, specificity, and the positive and negative predictive values of the method. Results: ROP was detected in 63 of 87 examinations by BIO and in 56 of 87 RetCam examinations. Nine RetCam examinations were false-negative and two were false-positive. Sensitivity of RetCam was 85.71% (54/63 and specificity was 91.66% (22/24. The positive and negative predictive values were 96.43% and 70.97% respectively. Conclusion: Nine cases having ROP were missed by the RetCam. All these cases were either in zone 3 or the outer part of zone 2, which later regressed. These were missed mostly because of the restricted mobility of the camera head caused by its size and the barrier caused by the lid speculum arms. No case of threshold ROP was missed. RetCam may replace BIO for screening of ROP.

  9. Mitos no Desengajamento Moral: Retóricas da Samarco em um Crime Corporativo

    Directory of Open Access Journals (Sweden)

    Cintia Rodrigues de Oliveira Medeiros

    2017-12-01

    Full Text Available Nesta pesquisa, conduzimos uma análise retórica com o objetivo de explorar os mecanismos de desengajamento moral utilizados pela Samarco no caso do crime ocorrido com a quebra de uma barragem sob sua administração, em novembro de 2015, em Minas Gerais. O corpus de pesquisa submetido à análise retórica constitui-se de publicações contendo declarações da empresa e de seus representantes sobre o caso em questão. Como resultados, mostramos que a Samarco utiliza-se de três mitos na sua retórica: (a Nós estamos fazendo o que deve ser feito; (b Nós não colocamos a sociedade e o meio ambiente em risco; e (c A culpa não é nossa. Esses três mitos são recursos representativos do desengajamento moral (Bandura, 1999 da empresa para cometer um crime corporativo. Nossa análise identificou três mecanismos: deslocamento de culpa; minimização e distorção das consequências; e rotulagem eufemística.

  10. Combined treatment of retting flax wastewater using Fenton oxidation and granular activated carbon

    Directory of Open Access Journals (Sweden)

    Sohair I. Abou-Elela

    2016-07-01

    Full Text Available The process of retting flax produces a huge amount of wastewater which is characterized with bad unpleasant smell and high concentration of organic materials. Treatment of such waste had always been difficult because of the presence of refractory organic pollutants such as lignin. In this study, treatment of retting wastewater was carried out using combined system of Fenton oxidation process followed by adsorption on granular activated carbon (GAC. The effects of operating condition on Fenton oxidation process such as hydrogen peroxide and iron concentration were investigated. In addition, kinetic study of the adsorption process was elaborated. The obtained results indicated that degradation of organic matters follows a pseudo-first order reaction with regression coefficient of 0.98. The kinetic model suggested that the rate of reaction was highly affected by the concentration of hydrogen peroxide. Moreover, the results indicated that the treatment module was very efficient in removing the organic and inorganic pollutants. The average percentage removal of chemical oxygen demand (COD, total suspended solid (TSS, oil, and grease was 98.60%, 86.60%, and 94.22% with residual values of 44, 20, and 5 mg/L, respectively. The treated effluent was complying with the National Regulatory Standards for wastewater discharge into surface water or reuse in the retting process.

  11. T-Cell Mediated Immune Responses Induced in ret Transgenic Mouse Model of Malignant Melanoma

    Energy Technology Data Exchange (ETDEWEB)

    Abschuetz, Oliver [Skin Cancer Unit, German Cancer Research Center (DKFZ), Heidelberg and Department of Dermatology, Venereology and Allergology, University Medical Center Mannheim, Ruprecht-Karl University of Heidelberg, Mannheim , Heidelberg 69120 (Germany); Osen, Wolfram [Division of Translational Immunology, German Cancer Center, Heidelberg 69120 (Germany); Frank, Kathrin [Skin Cancer Unit, German Cancer Research Center (DKFZ), Heidelberg and Department of Dermatology, Venereology and Allergology, University Medical Center Mannheim, Ruprecht-Karl University of Heidelberg, Mannheim , Heidelberg 69120 (Germany); Kato, Masashi [Unit of Environmental Health Sciences, Department of Biomedical Sciences, College of Life and Health Sciences, Chubu University, Aichi 487-8501 (Japan); Schadendorf, Dirk [Department of Dermatology, University Hospital Essen, Essen 45122 (Germany); Umansky, Viktor, E-mail: v.umansky@dkfz.de [Skin Cancer Unit, German Cancer Research Center (DKFZ), Heidelberg and Department of Dermatology, Venereology and Allergology, University Medical Center Mannheim, Ruprecht-Karl University of Heidelberg, Mannheim , Heidelberg 69120 (Germany)

    2012-04-26

    Poor response of human malignant melanoma to currently available treatments requires a development of innovative therapeutic strategies. Their evaluation should be based on animal models that resemble human melanoma with respect to genetics, histopathology and clinical features. Here we used a transgenic mouse model of spontaneous skin melanoma, in which the ret transgene is expressed in melanocytes under the control of metallothionein-I promoter. After a short latency, around 25% mice develop macroscopic skin melanoma metastasizing to lymph nodes, bone marrow, lungs and brain, whereas other transgenic mice showed only metastatic lesions without visible skin tumors. We found that tumor lesions expressed melanoma associated antigens (MAA) tyrosinase, tyrosinase related protein (TRP)-1, TRP-2 and gp100, which could be applied as targets for the immunotherapy. Upon peptide vaccination, ret transgenic mice without macroscopic melanomas were able to generate T cell responses not only against a strong model antigen ovalbumin but also against typical MAA TRP-2. Although mice bearing macroscopic primary tumors could also display an antigen-specific T cell reactivity, it was significantly down-regulated as compared to tumor-free transgenic mice or non-transgenic littermates. We suggest that ret transgenic mice could be used as a pre-clinical model for the evaluation of novel strategies of melanoma immunotherapy.

  12. Direct association between the Ret receptor tyrosine kinase and the Src homology 2-containing adapter protein Grb7.

    Science.gov (United States)

    Pandey, A; Liu, X; Dixon, J E; Di Fiore, P P; Dixit, V M

    1996-05-03

    Adapter proteins containing Src homology 2 (SH2) domains link transmembrane receptor protein-tyrosine kinases to downstream signal transducing molecules. A family of SH2 containing adapter proteins including Grb7 and Grb10 has been recently identified. We had previously shown that Grb10 associates with Ret via its SH2 domain in an activation-dependent manner (Pandey, A., Duan, H., Di Fiore, P.P., and Dixit, V.M. (1995) J. Biol, Chem. 270, 21461-21463). We now demonstrate that the related adapter molecule Grb7 also associates with Ret in vitro and in vivo, and that the binding of the SH2 domain of Grb7 to Ret is direct. This binding is dependent upon Ret autophosphorylation since Grb7 is incapable of binding a kinase-defective mutant of Ret. Thus two members of the Grb family, Grb7 and Grb10, likely relay signals emanating from Ret to other, as yet, unidentified targets within the cell.

  13. Identification of selective inhibitors of RET and comparison with current clinical candidates through development and validation of a robust screening cascade [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Amanda J. Watson

    2016-05-01

    Full Text Available RET (REarranged during Transfection is a receptor tyrosine kinase, which plays pivotal roles in regulating cell survival, differentiation, proliferation, migration and chemotaxis. Activation of RET is a mechanism of oncogenesis in medullary thyroid carcinomas where both germline and sporadic activating somatic mutations are prevalent.   At present, there are no known specific RET inhibitors in clinical development, although many potent inhibitors of RET have been opportunistically identified through selectivity profiling of compounds initially designed to target other tyrosine kinases. Vandetanib and cabozantinib, both multi-kinase inhibitors with RET activity, are approved for use in medullary thyroid carcinoma, but additional pharmacological activities, most notably inhibition of vascular endothelial growth factor - VEGFR2 (KDR, lead to dose-limiting toxicity. The recent identification of RET fusions present in ~1% of lung adenocarcinoma patients has renewed interest in the identification and development of more selective RET inhibitors lacking the toxicities associated with the current treatments.   In an earlier publication [Newton et al, 2016; 1] we reported the discovery of a series of 2-substituted phenol quinazolines as potent and selective RET kinase inhibitors. Here we describe the development of the robust screening cascade which allowed the identification and advancement of this chemical series.  Furthermore we have profiled a panel of RET-active clinical compounds both to validate the cascade and to confirm that none display a RET-selective target profile.

  14. A retrospective analysis of RET translocation, gene copy number gain and expression in NSCLC patients treated with vandetanib in four randomized Phase III studies.

    Science.gov (United States)

    Platt, Adam; Morten, John; Ji, Qunsheng; Elvin, Paul; Womack, Chris; Su, Xinying; Donald, Emma; Gray, Neil; Read, Jessica; Bigley, Graham; Blockley, Laura; Cresswell, Carl; Dale, Angela; Davies, Amanda; Zhang, Tianwei; Fan, Shuqiong; Fu, Haihua; Gladwin, Amanda; Harrod, Grace; Stevens, James; Williams, Victoria; Ye, Qingqing; Zheng, Li; de Boer, Richard; Herbst, Roy S; Lee, Jin-Soo; Vasselli, James

    2015-03-23

    To determine the prevalence of RET rearrangement genes, RET copy number gains and expression in tumor samples from four Phase III non-small-cell lung cancer (NSCLC) trials of vandetanib, a selective inhibitor of VEGFR, RET and EGFR signaling, and to determine any association with outcome to vandetanib treatment. Archival tumor samples from the ZODIAC ( NCT00312377 , vandetanib ± docetaxel), ZEAL ( NCT00418886 , vandetanib ± pemetrexed), ZEPHYR ( NCT00404924 , vandetanib vs placebo) and ZEST ( NCT00364351 , vandetanib vs erlotinib) studies were evaluated by fluorescence in situ hybridization (FISH) and immunohistochemistry (IHC) in 944 and 1102 patients. The prevalence of RET rearrangements by FISH was 0.7% (95% CI 0.3-1.5%) among patients with a known result. Seven tumor samples were positive for RET rearrangements (vandetanib, n = 3; comparator, n = 4). 2.8% (n = 26) of samples had RET amplification (innumerable RET clusters, or ≥7 copies in > 10% of tumor cells), 8.1% (n = 76) had low RET gene copy number gain (4-6 copies in ≥40% of tumor cells) and 8.3% (n = 92) were RET expression positive (signal intensity ++ or +++ in >10% of tumor cells). Of RET-rearrangement-positive patients, none had an objective response in the vandetanib arm and one patient responded in the comparator arm. Radiologic evidence of tumor shrinkage was observed in two patients treated with vandetanib and one treated with comparator drug. The objective response rate was similar in the vandetanib and comparator arms for patients positive for RET copy number gains or RET protein expression. We have identified prevalence for three RET biomarkers in a population predominated by non-Asians and smokers. RET rearrangement prevalence was lower than previously reported. We found no evidence of a differential benefit for efficacy by IHC and RET gene copy number gains. The low prevalence of RET rearrangements (0.7%) prevents firm conclusions regarding association of vandetanib treatment with

  15. Ny EU-dom om afgifter på motorkøretøjer - en bombe under de nationale registreringsafgifter

    DEFF Research Database (Denmark)

    Thygesen, Jette

    2013-01-01

    Gennem tiden har EU-Domstolen, i en mængde sager, taget stilling til medlemsstaternes ret til at opkræve afgift af motorkøretøjer. EU-Domstolen har således taget stilling til, om afgift på motorkøretøjer er forenelig med EU-retten i forbindelse med arbejdskraftens frie bevægelighed, etableringsre...

  16. Mecanismos argumentativos en las cartas al director: La interrogación retórica

    Directory of Open Access Journals (Sweden)

    Joan Gabriel Burguera Serra

    2010-11-01

    Full Text Available Normal 0 21 false false false ES X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabla normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0cm; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} El objetivo de este artículo se centra en la descripción de la funcionalidad pragmática de la interrogación retórica en las cartas al director. El punto de partida radica en entender las cartas al director como textos con finalidades comunicativas relacionadas con el asentamiento de actos de habla de queja o desaprobación y aceptar, en consecuencia, que el potencial argumentativo que subyace a las interrogaciones retóricas comporta la idoneidad de las mismas en el marco textual indicado. En último término, se proponen unos mecanismos descriptivos básicos para evidenciar las correspondencias entre estructura formal e interpretación retórica de enunciados interrogativos.

  17. Improving retting of fibre through genetic modification of flax to express pectinases.

    Science.gov (United States)

    Musialak, Magdalena; Wróbel-Kwiatkowska, Magdalena; Kulma, Anna; Starzycka, Eligia; Szopa, Jan

    2008-02-01

    Flax (Linum usitatissimum L.) is a raw material used for important industrial products. Linen has very high quality textile properties, such as its strength, water absorption, comfort and feel. However, it occupies less than 1% of the total textile market. The major reason for this is the long and difficult retting process by which linen fibres are obtained. In retting, bast fibre bundles are separated from the core, the epidermis and the cuticle. This is accomplished by the cleavage of pectins and hemicellulose in the flax cell wall, a process mainly carried out by plant pathogens like filamentous fungi. The remaining bast fibres are mainly composed of cellulose and lignin. The aim of this study was to generate plants that could be retted more efficiently. To accomplish this, we employed the novel approach of transgenic flax plant generation with increased polygalacturonase (PGI ) and rhamnogalacturonase (RHA) activities. The constitutive expression of Aspergillus aculeatus genes resulted in a significant reduction in the pectin content in tissue-cultured and field-grown plants. This pectin content reduction was accompanied by a significantly higher (more than 2-fold) retting efficiency of the transgenic plant fibres as measured by a modified Fried's test. No alteration in the lignin or cellulose content was observed in the transgenic plants relative to the control. This indicates that the over-expression of the two enzymes does not affect flax fibre composition. The growth rate and soluble sugar and starch contents were in the range of the control levels. It is interesting to note that the RHA and PGI plants showed higher resistance to Fusarium culmorum and F. oxysporum attack, which correlates with the increased phenolic acid level. In this report, we demonstrate for the first time that over-expression of the A. aculeatus genes results in flax plants more readily usable for fibre production. The biochemical parameters of the cell wall components indicated that

  18. Cidadania: ret?rica e realidade nas pol?ticas sociais de Manaus

    OpenAIRE

    Pereira, Raimundo Emerson Dourado

    2004-01-01

    Este trabalho discute os aspectos que norteiam a quest?o da cidadania, verificando o distanciamento que a ret?rica governamental adquire ao ser confrontada ? reprodu??o da pobreza e da exclus?o social no espa?o urbano de Manaus. Partimos do entendimento de que os programas assistenciais implantados nesta cidade podem se constituir em espa?o onde ? poss?vel observar, dentre outras quest?es que podem ser suscitadas no contexto das pol?ticas sociais no capitalismo perif?rico, as contradi??es que...

  19. Improvement of Haramay Fiber by Pre-treatment of Retting Process withPhosphoric Acid

    International Nuclear Information System (INIS)

    Kuntari-Sasas; Neni-Rustini Eriawati

    2000-01-01

    Haramay as bast fiber contains of cellulose fiber as the main part, mixedwith hemi cellulose, pectin, and lignin as binding material for cellulosefiber to keep it together in the bundle form. For textile material, this bastfiber has to be freed from its binding material, called as retting process,before subjecting to scouring, dyeing and finishing process in textileindustry. In the retting process the dissolve of binding material can be doneeither by using enzyme in bio technology or extraction with strong alkalinecondition in common technology. Using sodium hydroxide for dissolving thebinding material can be carried out easily with good dissolving ability, butcan render the strength retention of the cellulose fiber. Pre-treatment ofthe bast fiber with phosphoric acid (H 3 PO 4 ), is expected to hydrolyze someof the binding materials that can not be dissolved in alkaline condition,including natural pigment that colored the fiber with creamy white. In thisstudy, the pre-treatment process before retting with phosphoric acid wascarried out in various condition, such as concentration of phosphoric acid (5ml/l- 25 ml/l), time and temperature of pre-treatment (1-3 hours at 50 o C or12-24 hours at room temperature), followed by neutralization in dilutealkaline. The retting process was carried out by means of scouring in variousconcentration of sodium hydroxide (NaOH 38 o Be, 10 ml/l-30 m/l), and then wascontinued with bleaching process in hydrogen peroxide solution. Aftercarrying out those experiment, the bast fiber that called haramay wassubjected to testing for weight reduction, strength retention and degree ofwhiteness. From the testing results it is concluded that pre-treatment withphosphoric acid can increase the weight reduction, strength retention ortenacity and degree of whiteness of haramay fiber compared to the oneswithout pre-treatment with phosphoric acid. The best result was obtained bypre-treatment with 5 ml/l H 3 PO 4 at 50 o C for 2 hours, continued by

  20. Le facteur humain et la sûreté de fonctionnement dans le ...

    African Journals Online (AJOL)

    Notre contribution porte sur le rôle fondamental du facteur humain dans le management intégré des risques d'une part et du rôle déterminant qu'il peut avoir à jouer pour que la sûreté de fonctionnement réponde à sa propriété d'autre part. Un rôle illustré à travers une analyse de risque dans un complexe de Gaz Naturel ...

  1. Análisis retórico del esténcil o estarcido

    Directory of Open Access Journals (Sweden)

    Heiner Mercado-Percia

    2012-01-01

    Full Text Available En esta exposición intentaré dar respuesta a las siguientes preguntas: ¿Puede expresarse un discurso retórico por medio de una imagen? Y si esto es posible ¿cómo esta imagen puede persuadir a un auditorio? Estas preguntas surgen a partir de una imagen de esténcil o estarcido llamada Disney War,apareció en los muros de muchas ciudades del mundo, incluida Medellín, y que es promocionada o expuesta a través de la Internet.

  2. A nova retórica do grande capital: a publicidade brasileira entre o neoliberalismo e a democratização

    Directory of Open Access Journals (Sweden)

    Maria Eduarda da Mota Rocha

    2008-09-01

    Full Text Available Resumo: O artigo analisa a emergência de uma nova retórica do grande capital, na publicidade brasileira contemporânea, a partir das relações entre três níveis: o do contexto político e econômico, o do campo publicitário e o dos anúncios. Estas relações permitem explicar as transformações dos valores fundamentais que informam o discurso publicitário, entendido como a retórica do capital, a quem cabe construir a boa vontade da “opinião pública” e converter parte desta em consumidores efetivos dos produtos e serviços. Por isso, os valores em torno dos quais se organizam os anúncios revelam as estratégias de legitimação do capital, no conteúdo que atribuem à imagem de uma “vida plena”. A nova retórica do grande capital é marcada por estratégias narrativas que têm como centro os “conceitos” de “qualidade de vida” e de “responsabilidade social”, em detrimento dos “conceitos” de “status” e “tecnologia” que marcaram a publicidade do período anterior. Abstract: The article analyzes the emergence of big capital new rhetoric in the contemporary Brazilian advertisements, based on the relationships among three levels: the economical and political context, the advertising field, and the advertisements themselves. These relationships allow us to explain the transformations of the basic values that inform the advertisement discourse, understood here as the rhetoric of the capital, that has the task of constructing the good will of public opinion and convert part of them into effective products and services consumers. Therefore, the values around which the ads organize reveal the legitimating strategies of the capital in the contents that attribute to the image of a full life. The new rhetoric of the big capital is marked by narrative strategies that have at the center the concepts of quality of life and social responsibility, in detriment of the concepts of status and technology that have marked the

  3. Book Review: Zarzo, E. (2016), Memoria Retórica y Experiencia Estética. Retórica, Estética y Educación. Madrid: Dykinson

    OpenAIRE

    Davide Mombelli

    2016-01-01

    Memoria retórica y experiencia estética. Retórica, Estética y Educación, recently published by Dykinson, is a fundamental body of research on rhetoric memory and aesthetic experience, two objects of study which, although having generated much literature separately, have not been considered in their reciprocity until now. The author, Esther Zarzo, who earned her Ph.D. in Philosophy, has published several investigations of both a theoretical and practical nature concerning the treatment and...

  4. RET/PTC1-Driven Neoplastic Transformation and Proinvasive Phenotype of Human Thyrocytes Involve Met Induction and β-Catenin Nuclear Translocation

    Directory of Open Access Journals (Sweden)

    Giuliana Cassinelli

    2009-01-01

    Full Text Available Activation of the RET gene by chromosomal rearrangements generating RET/PTC oncogenes is a frequent, early, and causative event in papillary thyroid carcinoma (PTC. We have previously shown that, in human primary thyrocytes, RET/PTC1 induces a transcriptional program including the MET proto-oncogene. In PTCs, β-catenin is frequently mislocated to the cytoplasm nucleus. We investigated the interplay between Ret/ptc1 signaling and Met in regulating the proinvasive phenotype and β-catenin localization in cellular models of human PTC. Here, we show that Met protein is expressed and is constitutively active in human thyrocytes exogenously expressing RET/PTC1 as well as a mutant (Y451F devoid of the main Ret/ptc1 multidocking site. Both in transformed thyrocytes and in the human PTC cell line TPC-1, Ret/ptc1-Y451-dependent signaling and Met cooperated to promote a proinvasive phenotype. Accordingly, gene/functional silencing of either RET/PTC1 or MET abrogated early branching morphogenesis in TPC-1 cells. The same effect was obtained by blocking the common downstream effector Akt. Y451 of Ret/ptc1 was required to promote proliferation and nuclear translocation of β-catenin, suggesting that these oncogene-driven effects are Met-independent. Pharmacologic inhibition of Ret/ptc1 and Met tyrosine kinases by the multitarget small molecule RPI-1 blocked cell proliferation and invasive ability and dislocated β-catenin from the nucleus. Altogether, these results support that Ret/ptc1 cross talks with Met at transcriptional and signaling levels and promotes β-catenin transcriptional activity to drive thyrocyte neoplastic transformation. Such molecular network, promoting disease initiation and acquisition of a proinvasive phenotype, highlights new options to design multitarget therapeutic strategies for PTCs.

  5. RET/PTC1-Driven Neoplastic Transformation and Proinvasive Phenotype of Human Thyrocytes Involve Met Induction and β-Catenin Nuclear Translocation1

    Science.gov (United States)

    Cassinelli, Giuliana; Favini, Enrica; Degl'Innocenti, Debora; Salvi, Alessandro; De Petro, Giuseppina; Pierotti, Marco A; Zunino, Franco; Borrello, Maria Grazia; Lanzi, Cinzia

    2009-01-01

    Activation of the RET gene by chromosomal rearrangements generating RET/PTC oncogenes is a frequent, early, and causative event in papillary thyroid carcinoma (PTC). We have previously shown that, in human primary thyrocytes, RET/PTC1 induces a transcriptional program including the MET proto-oncogene. In PTCs, β-catenin is frequently mislocated to the cytoplasm nucleus. We investigated the interplay between Ret/ptc1 signaling and Met in regulating the proinvasive phenotype and β-catenin localization in cellular models of human PTC. Here, we show that Met protein is expressed and is constitutively active in human thyrocytes exogenously expressing RET/PTC1 as well as a mutant (Y451F) devoid of the main Ret/ptc1 multidocking site. Both in transformed thyrocytes and in the human PTC cell line TPC-1, Ret/ptc1-Y451-dependent signaling and Met cooperated to promote a proinvasive phenotype. Accordingly, gene/functional silencing of either RET/PTC1 or MET abrogated early branching morphogenesis in TPC-1 cells. The same effect was obtained by blocking the common downstream effector Akt. Y451 of Ret/ptc1 was required to promote proliferation and nuclear translocation of β-catenin, suggesting that these oncogene-driven effects are Met-independent. Pharmacologic inhibition of Ret/ptc1 and Met tyrosine kinases by the multitarget small molecule RPI-1 blocked cell proliferation and invasive ability and dislocated β-catenin from the nucleus. Altogether, these results support that Ret/ptc1 cross talks with Met at transcriptional and signaling levels and promotes β-catenin transcriptional activity to drive thyrocyte neoplastic transformation. Such molecular network, promoting disease initiation and acquisition of a proinvasive phenotype, highlights new options to design multitarget therapeutic strategies for PTCs. PMID:19107227

  6. La red de técnicos en salud (rets: logros y desafíos The network of health technicians (rets: achievements and challenges

    Directory of Open Access Journals (Sweden)

    Alcira Castillo Martínez

    2005-03-01

    Full Text Available Se presenta una experiencia de cooperación en red de instituciones de formación de técnicos en salud y la facilitación de la Organización Panamericana de la Salud (OPS, incluyendo el contexto de cambio y las nuevas políticas de recursos humanos con sus implicaciones en el mundo del trabajo y la educación. Constituye una síntesis integradora de los procesos socio-afectivos y técnicos que le dan fuerza y dinámica a la Red de Técnicos en Salud (Rets. Se considera su creación, objetivos, estructura y organización, así como la gestión de la OPS y de los actores institucionales denominados Núcleos de Desarrollo (Nudes con sus proyectos dinamizadores. Por último, se señalan las valoraciones y avances de lo realizado por los actores de los distintos países de América Latina y el Caribe Hispano. Se destaca la utilización de novedosos mecanismos de gestión en la cooperación técnica al reflexionar sobre los factores que influyen en la sostenibilidad y el éxito de experiencias en red con potencial movilizador y articulador para la cooperación horizontal en un mundo globalizado.This article relates an experience of cooperation through a network of institutions oriented to the training of health technicians, under the guidance of the Pan-American Health Organization (OPS. It also deals with present changes in the field and with the new human resources policies, with their respective implications in the world of work and of education. The experience may be regarded as an attempt to integrate the social-affective and technical processes that give strength and dynamism to the Network of Health Technicians (Rets. We examine its creation, objectives, structure and organization, as well as the OPS' management and the role of the institutional actors called Development Nuclei (Nudes and their stimulating projects. Finally, we point to the advantages and progressive characteristics of the work done by professionals in the various Latin

  7. Application of RetCamⅡ in the screening of neonatal fundus disease

    Directory of Open Access Journals (Sweden)

    Zhi-Gang Xiao

    2013-08-01

    Full Text Available AIM: To investigate the safe and reliable examination method for neonatal fundus screening.METHODS: Fundus information of 2 836 neonates performed by RetCamⅡ in our hospital from January 1, 2012 to December 31, 2012 were retrospectively analyzed, including 1 625 cases(57.30%of premature infants which were first examined 1-4 weeks after birth and 1 211 cases(42.70%of term infants which were first examined within 4 weeks after birth.RESULTS: Totally 454 cases of abnormalfundus were found, including 207 cases(12.74%of retinopathy of prematurity(ROP, ROPⅠ in 118 cases(57%, ROPⅡ in 58 cases(28.02%, ROPⅢ in 23 cases(11.11%, ROPⅣ in 8 cases(3.86%, no case of ROPV. A total of 247(20.40%term infants had abnormal fundus, of which 68 cases(27.53%were developmental or hereditary disease, retinoblastoma in 1 case(0.40%, retinal hemorrhage in 102 cases(41.30%, retinal exudative changes in 68 cases(27.53%, optic atrophy in 5 cases(2.02%and optic disc edema in 3 cases(1.21%.CONCLUSION: Neonatal fundus diseases were so various and harmful that early screening should be attended to. Premature infants and term infants with high risk are treated as focus group of fundus screening and RetCamII examination is safe and effective.

  8. miR-449 overexpression inhibits papillary thyroid carcinoma cell growth by targeting RET kinase-β-catenin signaling pathway.

    Science.gov (United States)

    Li, Zongyu; Huang, Xin; Xu, Jinkai; Su, Qinghua; Zhao, Jun; Ma, Jiancang

    2016-10-01

    Papillary thyroid carcinoma (PTC) is the most common thyroid cancer and represent approximately 80% of all thyroid cancers. The present study is aimed to investigate the role of microRNA (miR)-449 in the progression of PTC. Our results revealed that miR-449 was underexpressed in the collected PTC specimens compared with non-cancerous PTC tissues. Overexpression of miR-449 induced a cell cycle arrest at G0/G1 phase and inhibited PTC cell growth in vitro. Further studies revealed that RET proto-oncogene (RET) is a novel miR-449 target, due to miR-449 bound directly to its 3'-untranslated region and miR-449 mimic reduced the protein expression of RET. Similar to the effects of miR-449 overexpression, RET downregulation inhibited cell growth, whereas RET overexpression reversed the inhibitive effect of miR-449 mimic. Furthermore, miR-449 overexpression inhibited the nuclear translocation of β-catenin and reduced the expression of several downstream genes, including c-Myc, cyclin D1, T cell-specific transcription factor (TCF) and lymphoid enhancer-binding factor 1 (LEF-1), and inactivated the β-catenin pathway in TPC-1 cells. Moreover, overexpression of β-catenin prevented miR-449-reduced cell cycle arrest and cell viability. In xenograft animal experiments, miR-449 overexpression effectively suppressed the tumor growth of PTC. Taken together, our research indicated that miR-449 functions as an anti-oncogene by targeting RET, and that miR-449 overexpression inhibited the growth of PTC by inactivating the β-catenin pathway. Thus, miR-449 may serve as a potential therapeutic strategy for the treatment of PTC.

  9. Technical evaluation of RETS-required reports for Browns Ferry Nuclear Power Station, Units 1, 2, and 3, for 1983

    International Nuclear Information System (INIS)

    Young, T.E.; Magleby, E.H.

    1985-01-01

    A review was performed of reports required by federal regulations and the plant-specific radiological effluent technical specifications (RETS) for operations conducted at Tennessee Valley Authority's Browns Ferry Nuclear Station, Units 1, 2, and 3, during 1983. The two periodic reports reviewed were (a) the Effluents and Waste Disposal Semiannual Report, First Half 1983 and (b) the Effluents and Waste Disposal Semiannual Report, Second Half 1983. The principal review guidelines were the plant's specific RETs and NRC guidance given in NUREG-0133, ''Preparation of Radiological Effluent Technical Specifications for Nuclear Power Plants.'' The Licensee's submitted reports were found to be reasonably complete and consistent with the review guidelines

  10. Technical evaluation of RETS-required reports for Zion Nuclear Power Station, Units 1 and 2 for 1983

    International Nuclear Information System (INIS)

    Young, T.E.; Magleby, E.H.

    1985-01-01

    A review was performed on the reports required by Federal regulations and the plant-specific Radiological Effluent Technical Specifications (RETS) for operations conducted at Commonwealth Edison's Zion Nuclear Power Station during 1983. The two periodic reports reviewed: (1) were the Effluent and Waste Disposal Semiannual Report, July-December 1983, and (2) the Radioactive Waste and Environmental Monitoring Annual Report - 1983. The principal review guidelines were the plant's specific RETS and NRC guidance given in NUREG-0133, ''Preparation of Radiological Effluent Technical Specifications for Nuclear Power Plants.'' The Licensee's submitted reports were found to be reasonably complete and consistent with the review guidelines

  11. Technical evaluation of RETS-required reports for the Edwin I. Hatch Nuclear Plant, Units 1 and 2

    International Nuclear Information System (INIS)

    Young, T.E.; Magleby, E.H.

    1985-01-01

    A review of the reports required by federal regulations and the plant-specific Radiological Effluent Technical Specifications (RETS) for operations conducted during 1983 was performed. The periodic reports reviewed for the Edwin I. Hatch Nuclear Plant were the Annual Radiological Environmental Operating Report for 1983 and the Semiannual Radioactive Effluent Release Reports for 1983. The principal review guidelines were the plant's specific RETS, NUREG-0133, ''Preparation of Radiological Effluent Technical Specifications for Nuclear Power Plants'', and NRC Guidance on the Review of the Process Control Programs. The Licensee's submitted reports were found to be reasonably complete and consistent with the review guidelines. 7 refs

  12. Technical evaluation of RETS-required reports for Rancho Seco Nuclear Generating Station, Unit 1 for 1983

    International Nuclear Information System (INIS)

    Magleby, E.H.; Young, T.E.

    1985-01-01

    A review of the reports required by Federal regulations and the plant-specific Radiological Effluent Technical Specifications (RETS) for operations conducted during 1983 was performed. The periodic reports reviewed for the Rancho Seco Nuclear Generating Station, Unit 1 were the Semiannual Effluent Release Report, January 1, 1983 to June 30, 1983 and the Radiation Exposure, Environmental Protection, Effluent and Waste Disposal Report. The principal review guidelines were the plant's specific RETS which were based on NRC guidance given in NUREG-0133, ''Preparation of Radiological Effluent Technical Specifications for Nuclear Power Plants.'' The Licensee's submitted reports were found to be reasonably complete and consistent with the review guidelines

  13. Comprehensive analysis of RET common and rare variants in a series of Spanish Hirschsprung patients confirms a synergistic effect of both kinds of events

    Directory of Open Access Journals (Sweden)

    Castaño Luis

    2011-10-01

    Full Text Available Abstract Background RET is the major gene associated to Hirschsprung disease (HSCR with differential contributions of its rare and common, coding and noncoding mutations to the multifactorial nature of this pathology. In the present study, we have performed a comprehensive study of our HSCR series evaluating the involvement of both RET rare variants (RVs and common variants (CVs in the context of the disease. Methods RET mutational screening was performed by dHPLC and direct sequencing for the identification of RVs. In addition Taqman technology was applied for the genotyping of 3 RET CVs previously associated to HSCR, including a variant lying in an enhancer domain within RET intron 1 (rs2435357. Statistical analyses were performed using the SPSS v.17.0 to analyze the distribution of the variants. Results Our results confirm the strongest association to HSCR for the "enhancer" variant, and demonstrate a significantly higher impact of it in male versus female patients. Integration of the RET RVs and CVs analysis showed that in 91.66% of cases with both kinds of mutational events, the enhancer allele is in trans with the allele bearing the RET RV. Conclusions A gender effect exists on both the transmission and distribution of rare coding and common HSCR causing mutations. In addition, these RET CVs and RVs seem to act in a synergistic way leading to HSCR phenotype.

  14. The value of Ret-Hb and sTfR in the diagnosis of iron depletion in healthy, young children

    NARCIS (Netherlands)

    Uijterschout, L.; Domellöf, M.; Vloemans, J.; Vos, R.; Hudig, C.; Bubbers, S.; Verbruggen, S.; Veldhorst, M.; de Leeuw, T.; Teunisse, P. P.; van Goudoever, J. B.; Brus, F.

    2014-01-01

    Reticulocyte hemoglobin (Ret-Hb) content and soluble transferrin receptor (sTfR) are described as promising biomarkers in the analysis of iron status. However, the value of Ret-Hb and sTfR in the early detection of iron depletion, as frequently observed in children in high-income countries, is

  15. Zebrafish GDNF and its co-receptor GFRα1 activate the human RET receptor and promote the survival of dopaminergic neurons in vitro.

    Directory of Open Access Journals (Sweden)

    Tuulia Saarenpää

    Full Text Available Glial cell line-derived neurotrophic factor (GDNF is a ligand that activates, through co-receptor GDNF family receptor alpha-1 (GFRα1 and receptor tyrosine kinase "RET", several signaling pathways crucial in the development and sustainment of multiple neuronal populations. We decided to study whether non-mammalian orthologs of these three proteins have conserved their function: can they activate the human counterparts? Using the baculovirus expression system, we expressed and purified Danio rerio RET, and its binding partners GFRα1 and GDNF, and Drosophila melanogaster RET and two isoforms of co-receptor GDNF receptor-like. Our results report high-level insect cell expression of post-translationally modified and dimerized zebrafish RET and its binding partners. We also found that zebrafish GFRα1 and GDNF are comparably active as mammalian cell-produced ones. We also report the first measurements of the affinity of the complex to RET in solution: at least for zebrafish, the Kd for GFRα1-GDNF binding RET is 5.9 μM. Surprisingly, we also found that zebrafish GDNF as well as zebrafish GFRα1 robustly activated human RET signaling and promoted the survival of cultured mouse dopaminergic neurons with comparable efficiency to mammalian GDNF, unlike E. coli-produced human proteins. These results contradict previous studies suggesting that mammalian GFRα1 and GDNF cannot bind and activate non-mammalian RET and vice versa.

  16. Investigation of the bacterial retting community of kenaf (Hibiscus cannabinus) under different conditions using next-generation semiconductor sequencing

    Science.gov (United States)

    The use of the natural fibers requires the development of cost-efficient processing of fibers with consistent, uniform properties. The microbial communities associated with kenaf (Hibiscus cannabinus) plant fibers during retting were determined in an effort to identify possible means of accelerating...

  17. Risøs virksomhedsregnskab 1999. Opfølgning på planerne for året 1999

    DEFF Research Database (Denmark)

    Forskningscenter Risø, Roskilde

    2000-01-01

    Risøs Virksomhedsregnskab 1999 er en opfølgning på planerne for Risøs virksomhed i 1999. Risøs bestyrelse skal som led i resultatkontrakten med Forskningsministeriet aflægge årlige rapporter om opfyldelsen af de fastlagte resultatkrav. Derudover gives engenerel overordnet rapportering af årets re...

  18. Loss of p53 promotes anaplasia and local invasion in ret/PTC1-induced thyroid carcinomas.

    Science.gov (United States)

    La Perle, K M; Jhiang, S M; Capen, C C

    2000-08-01

    Papillary thyroid carcinomas in humans are associated with the ret/PTC oncogene and, following loss of p53 function, may progress to anaplastic carcinomas. Mice with thyroid-targeted expression of ret/PTC1 developed papillary thyroid carcinomas that were minimally invasive and did not metastasize. These mice were crossed with p53-/- mice to investigate whether loss of p53 would promote anaplasia and metastasis of ret/PTC1-induced thyroid tumors. The majority of p53-/- mice died or were euthanized by 17 weeks of age due to the development of thymic lymphomas, soft tissue sarcomas, and testicular teratomas. All ret/PTC1 mice developed thyroid carcinomas, but tumors in p53-/- mice were more anaplastic, larger in diameter, more invasive, and had a higher mitotic index than tumors in p53+/+ and p53+/- mice. Thyroid tumors did not metastasize in any of the experimental p53+/+ and p53+/- mice anaplasia and invasiveness of thyroid carcinomas.

  19. SorLA controls neurotrophic activity by sorting of GDNF and its receptors GFRα1 and RET

    DEFF Research Database (Denmark)

    Glerup, Simon; Lume, Maria; Olsen, Ditte

    2013-01-01

    is targeted to lysosomes and degraded while GFRα1 recycles, creating an efficient GDNF clearance pathway. The SorLA/GFRα1 complex further targets RET for endocytosis but not for degradation, affecting GDNF-induced neurotrophic activities. SorLA-deficient mice display elevated GDNF levels, altered dopaminergic...

  20. Phylogenetic analysis of the kenaf fiber microbial retting community by semiconductor sequencing of 16S rDNA amplicons

    Science.gov (United States)

    Kenaf, hemp, and jute have been used for cordage and fiber production since prehistory. To obtain the fibers, harvested plants are soaked in ponds where indigenous microflora digests pectins and other heteropolysaccharides, releasing fibers in a process called retting. Renewed interest in “green” ...

  1. Vindicación y elogio de la retórica deliberativa: glosas de Aristóteles

    Directory of Open Access Journals (Sweden)

    Vega Reñón, Luis

    2013-06-01

    Full Text Available Today we are witnessing the increasing interest in the argumentative rhetoric because of its close relationship with the public discourse. Two points have been highlighted in this regard: 1, the contribution of rhetoric to the critical revision of the ongoing programs of the so-called “deliberative democracy”; 2, the reading of Aristotle’s Rhetoric in line with these critical purposes. The aim of my paper is to develop this second point through an examination of the Aristotelian conception of rhetoric and his vindication of public deliberation.Hoy estamos asistiendo a un creciente interés por la retórica argumentativa debido a su estrecha relación con el discurso público. Tienen especial relieve dos puntos a este respecto: 1, la contribución de la retórica a la revisión crítica de los programas en curso de la llamada “democracia deliberativa”; 2, la lectura de la Retórica de Aristóteles en la línea de estos propósitos críticos. Mi artículo se propone desarrollar este segundo punto a través de un examen de la concepción aristotélica de la retórica y de su vindicación de la deliberación pública.

  2. Retórica fotográfica. Ingenio y provocación

    Directory of Open Access Journals (Sweden)

    Rafael Gómez Alonso

    2012-04-01

    Full Text Available La fotografía es uno de los medios visuales que más ha evolucionado, desde sus orígenes a mediados del siglo XIX hasta la actualidad, en sus formas de representación visual. La articulación de su lenguaje como medio de comunicación se vale de distintos modos de expresión, y en este sentido, la retórica juega un papel importante a la hora de ofrecer varias posibilidades de aplicación, en donde el ingenio y la utilización de sus capacidades estéticas (diseño, técnicas (instrumentos tecnológicos, culturales (reflejo de las prácticas sociales y argumentativas (cualidades narrativas son las claves de su sentido creativo.

  3. La retórica de lo extremo en la ultraderecha chilena

    Directory of Open Access Journals (Sweden)

    Juan Antonio González de Requena Farré

    2017-01-01

    Full Text Available Este artículo pretende caracterizar la ideología de la extrema de - recha chilena a través de su historia. Se realizó un análisis del discurso de los manifiestos y declaraciones de principios de cua - tro formaciones de ultraderecha de distintos momentos de la his- toria de Chile: el Movimiento Nacional Socialista, el Movimien - to Revolucionario Nacional Sindicalista, el Frente Nacionalista Patria y Libertad, así como Patria Nueva Sociedad. El enfoque retórico de la ideología ultraderechista permite reconstruir las autodescripciones ideológicas, las articulaciones del autoritaris- mo, los marcos figurativos y las principales construcciones argu - mentativas de la extrema derecha chilena.

  4. Relações retóricas estabelecidas por orações gerundiais adverbiais

    Directory of Open Access Journals (Sweden)

    Juliano Desiderato Antonio

    2012-01-01

    Full Text Available O objetivo deste trabalho é propor critérios para identificação das relações implícitas estabelecidas por orações gerundiais adverbiais em um corpus formado por elocuções formais (aulas e entrevistas. Para isso, tomam-se como fundamento teórico da pesquisa duas teorias funcionalistas, a Teoria da Estrutura Retórica do Texto (RST e a Gramática Discursivo-Funcional (GDF. Na visão da RST, além do conteúdo explícito veiculado pelas orações de um texto, há proposições implícitas que surgem das relações que se estabelecem entre partes do texto. Foram utilizados os parâmetros da GDF, factualidade, pressuposição, e as camadas dos níveis representacional e interpessoal em que ocorrem as orações para a identificação das relações retóricas estabelecidas pelas orações gerundiais adverbiais. Foram encontradas relações de meio, de resultado, de condição e de propósito, o que não significa que não se reconheça, neste trabalho, que outras relações como tempo (anterioridade, posterioridade, simultaneidade, concessão, causa, dentre outras, podem ser estabelecidas por orações gerundiais adverbiais. Os parâmetros da GDF demonstraram ser eficientes na identificação das relações.

  5. Bioelectricity generation from coconut husk retting wastewater in fed batch operating microbial fuel cell by phenol degrading microorganism

    International Nuclear Information System (INIS)

    Jayashree, C.; Arulazhagan, P.; Adish Kumar, S.; Kaliappan, S.; Yeom, Ick Tae; Rajesh Banu, J.

    2014-01-01

    Dual chamber microbial fuel cell (MFC) operated at fed batch mode for the treatment of retting wastewater has potently achieved both current generation and phenol removal. Hydraulic retention time (HRT) of the reactor was varied from 40 days to 10 days. COD (chemical oxygen demand) removal was 91% at 40 days HRT, with an initial COD concentration of 530 ± 50 g m −3 . Retting wastewater with an initial phenol concentration of 320 ± 60 g m −3 procured a highest phenol removal of 93% at 40 days HRT of the microbial fuel cell. Maximum power density of 362 mW m −2 was achieved using retting wastewater at HRT of 20 days with an internal resistance of 150 Ω in a dual chambered MFC. The bacterial strains in anode region, reported to be responsible for potential phenol removal, were identified as Ochrobactrum sp. RA1 (KJ408266), Ochrobactrum sp. RA2 (KJ408267) and Pesudomonas aeruginosa RA3 (KJ408268) using phylogenetic analysis. The study reveals that, dual chambered MFC effectively removed the phenol from retting wastewater along with power generation. - Highlights: • Maximum power density of 362 mW m −2 (150 Ω) was achieved at HRT of 20 days. • 91% COD removal and 93% phenol removal was observed at HRT of 40 days. • 25% coulombic efficiency was achieved in treatment of retting wastewater with MFC. • Phylogenetic analysis detect phenol degrading Ochrobactrum sp.RA1 in anode biofilm. • In addition, Ochrobactrum sp.RA2 and Pseudomonas aeruginosa RA3 were also isolated

  6. Retórica aplicada a la Enseñanza del Diseño Gráfico

    Directory of Open Access Journals (Sweden)

    Roberto Gamonal Arroyo

    2011-11-01

    Full Text Available Los conceptos fundamentales de la Retórica para la creación del discurso se pueden trasladar al Diseño Gráfico con la finalidad de construir piezas gráficas que son consideradas, a su vez, discursos visuales. En este sentido, tanto las operaciones retóricas como las figuras derivadas de ellas tienen un papel fundamental como elementos detonantes de la creatividad. Para evitar el uso de las figuras como un mero recurso estilístico, un error histórico cometido por la propia Retórica, éstas se convierten en la expresión figurada de un argumento en el que se modifica su grado cero para que resulte más llamativo e impactante a la audiencia a la que va dirigida el mensaje gráfico. A través de unas simples operaciones de adición, supresión, sustitución y permutación se producen variaciones de los elementos gráficos y de su grado cero de expresión (concepto del Grupo m que se cristalizan en figuras retóricas que generan nuevas composiciones con mayor potencia expresiva y creativa. En este artículo veremos cómo los estudiantes aplican estos conceptos retóricos para la conceptualización, creación y diseño de cubiertas para libros.

  7. Low dose irradiation of thyroid cells reveals a unique transcriptomic and epigenetic signature in RET/PTC-positive cells

    Energy Technology Data Exchange (ETDEWEB)

    Abou-El-Ardat, Khalil, E-mail: kabouela@sckcen.be [Radiobiology Unit, Molecular and Cellular Biology, GKD Building, Studiecentrum voor Kernenergie - Centre d' Etude de l' Energie Nucleaire (SCK-CEN), Boeretang 200, 2400 Mol (Belgium); Department of Molecular Biotechnology, Faculty of Bioscience Engineering, Universiteit Gent, 9000 Ghent (Belgium); Monsieurs, Pieter [Radiobiology Unit, Molecular and Cellular Biology, GKD Building, Studiecentrum voor Kernenergie - Centre d' Etude de l' Energie Nucleaire (SCK-CEN), Boeretang 200, 2400 Mol (Belgium); Anastasov, Natasa; Atkinson, Mike [Department of Radiation Sciences, Helmholtz Zentrum Muenchen, Munich (Germany); Derradji, Hanane [Radiobiology Unit, Molecular and Cellular Biology, GKD Building, Studiecentrum voor Kernenergie - Centre d' Etude de l' Energie Nucleaire (SCK-CEN), Boeretang 200, 2400 Mol (Belgium); De Meyer, Tim [Department of Molecular Biotechnology, Faculty of Bioscience Engineering, Universiteit Gent, 9000 Ghent (Belgium); Department of Applied Mathematics, Biometrics and Process Control, Faculty of Bioscience Engineering, Universiteit Gent, 9000 Ghent (Belgium); Bekaert, Sofie [Clinical Research Center, Faculty for Medicine and Health Sciences, Universiteit Gent, 185 De Pintelaan, 9000 Ghent (Belgium); Van Criekinge, Wim [Department of Molecular Biotechnology, Faculty of Bioscience Engineering, Universiteit Gent, 9000 Ghent (Belgium); and others

    2012-03-01

    The high doses of radiation received in the wake of the Chernobyl incident and the atomic bombing of Hiroshima and Nagasaki have been linked to the increased appearance of thyroid cancer in the children living in the vicinity of the site. However, the data gathered on the effect of low doses of radiation on the thyroid remain limited. We have examined the genome wide transcriptional response of a culture of TPC-1 human cell line of papillary thyroid carcinoma origin with a RET/PTC1 translocation to various doses (0.0625, 0.5, and 4 Gy) of X-rays and compared it to response of thyroids with a RET/PTC3 translocation and against wild-type mouse thyroids irradiated with the same doses using Affymetrix microarrays. We have found considerable overlap at a high dose of 4 Gy in both RET/PTC-positive systems but no common genes at 62.5 mGy. In addition, the response of RET/PTC-positive system at all doses was distinct from the response of wild-type thyroids with both systems signaling down different pathways. Analysis of the response of microRNAs in TPC-1 cells revealed a radiation-responsive signature of microRNAs in addition to dose-responsive microRNAs. Our results point to the fact that a low dose of X-rays seems to have a significant proliferative effect on normal thyroids. This observation should be studied further as opposed to its effect on RET/PTC-positive thyroids which was subtle, anti-proliferative and system-dependent.

  8. A novel germ-line point mutation in RET exon 8 (Gly(533)Cys) in a large kindred with familial medullary thyroid carcinoma

    OpenAIRE

    Silva, Adriana Madeira Alvares da [UNIFESP; Maciel, Rui Monteiro de Barros [UNIFESP; Dias-da-Silva, Magnus Régios [UNIFESP; Toledo, Silvia Regina Caminada de [UNIFESP; De Carvalho, Marcos B.; Cerutti, Janete Maria [UNIFESP

    2003-01-01

    Familial medullary thyroid carcinoma is related to germ-line mutations in the RET oncogene, mainly in cysteine codon 10 or 11, whereas noncysteine mutations in codons 13 - 15 are rare. We now report a new missense point mutation in exon 8 of the RET gene (1597G-->T) corresponding to a Gly(533)Cys substitution in the cystein-rich domain of RET protein in 76 patients from a 6-generation Brazilian family with 229 subjects, with ascendants from Spain. It is likely that the mutation causes familia...

  9. Establishment of a non-tumorigenic papillary thyroid cell line (FB-2) carrying the RET/PTC1 rearrangement.

    Science.gov (United States)

    Basolo, Fulvio; Giannini, Riccardo; Toniolo, Antonio; Casalone, Rosario; Nikiforova, Marina; Pacini, Furio; Elisei, Rossella; Miccoli, Paolo; Berti, Piero; Faviana, Pinuccia; Fiore, Lisa; Monaco, Carmen; Pierantoni, Giovanna Maria; Fedele, Monica; Nikiforov, Yuri E; Santoro, Massimo; Fusco, Alfredo

    2002-02-10

    A novel human thyroid papillary carcinoma cell line (FB-2) has been established and characterized. FB-2 cells harbor the RET/PTC1 chimeric oncogene in which the RET kinase domain is fused to the H4 gene. FB-2 cells neither formed colonies in semisolid media nor induced tumors after heterotransplant into severe combined immunodeficient mice. However, HMGI(Y), HMGI-C and c-myc genes, which are associated to thyroid cell transformation, were abundantly expressed in FB-2 cells but not in normal thyroid cells. FB-2 cells only partially retained the differentiated thyroid phenotype. In fact, the PAX-8 gene, which codes for a transcriptional factor required for thyroid cell differentiation, was expressed, while thyroglobulin, TSH-receptor and thyroperoxidase genes were not. Moreover, FB-2 cells produced high levels of interleukin (IL)-6 and IL-8. Copyright 2001 Wiley-Liss, Inc.

  10. Identification of Variants in RET and IHH Pathway Members in a Large Family With History of Hirschsprung Disease.

    Science.gov (United States)

    Sribudiani, Y; Chauhan, R K; Alves, M M; Petrova, L; Brosens, E; Harrison, C; Wabbersen, T; de Graaf, B M; Rügenbrink, T; Burzynski, G; Brouwer, R W W; IJcken, W F J van; Maas, S M; de Klein, A; Osinga, J; Eggen, B J L; Burns, A J; Brooks, A S; Shepherd, I T; Hofstra, R M W

    2018-03-27

    Hirschsprung disease (HSCR) is an inherited congenital disorder characterized by absence of enteric ganglia in the distal part of the gut. Variants in ret proto-oncogene (RET) have been associated with up to 50% of familial and 35% of sporadic cases. We searched for variants that affect disease risk in a large, multi-generational family with history of HSCR in a linkage region previously associated with the disease (4q31.3-q32.3) and exome wide. We performed exome sequencing analyses of a family in the Netherlands with 5 members diagnosed with HSCR and 2 members diagnosed with functional constipation. We initially focused on variants in genes located in 4q31.3-q32.3. However, we also performed an exome-wide analysis in which known HSCR or HSCR-associated gene variants predicted to be deleterious were prioritized for further analysis. Candidate genes were expressed in HEK293, COS-7, and Neuro-2a cells and analyzed by luciferase and immunoblot assays. Morpholinos were designed to target exons of candidate genes and injected into 1-cell stage zebrafish embryos. Embryos were allowed to develop and stained for enteric neurons. Within the linkage region, we identified 1 putative splice variant in the LPS responsive beige-like anchor protein gene (LRBA). Functional assays could not confirm its predicted effect on mRNA splicing or on expression of the mab-21 like 2 gene (MAB21L2), which is embedded in LRBA. Zebrafish that developed following injection of the lrba morpholino had a shortened body axis and subtle gut morphological defects, but no significant reduction in number of enteric neurons compared with controls. Outside the linkage region, members of 1 branch of the family carried a previously unidentified RET variant or an in-frame deletion in the glial cell line derived neurotrophic factor gene (GDNF), which encodes a ligand of RET. This deletion was located 6 base pairs before the last codon. We also found variants in the indian hedgehog gene (IHH) and its mediator

  11. VizieR Online Data Catalog: The 4 brightest red giants in the UFD galaxy Ret 2 (Roederer+, 2016)

    Science.gov (United States)

    Roederer, I. U.; Mateo, M.; Bailey, J. I., III; Song, Y.; Bell, E. F.; Crane, J. D.; Loebman, S.; Nidever, D. L.; Olszewski, E. W.; Shectman, S. A.; Thompson, I. B.; Valluri, M.; Walker, M. G.

    2018-03-01

    There are only four stars brighter than the horizontal branch that are confirmed members of Ret 2 (Simon et al. 2015, J/ApJ/808/95; Walker et al. 2015, J/ApJ/808/108). We observed these four stars using one arm of the Michigan/Magellan Fiber System (M2FS) and MSpec double spectrograph (Bailey et al. 2012SPIE.8446E..5GB; Mateo et al. 2012SPIE.8446E..4YM) mounted on the Nasmyth platform at the 6.5 m Landon Clay Telescope (Magellan II) at Las Campanas Observatory, Chile. We observed four high-probability members of Ret 2 and one blank sky position simultaneously on 2015 November 14 and 16, with a total integration time of 6.67 hr. Both observations were taken in dark time. (4 data files).

  12. Aproximaciones retóricas al conflicto armado colombiano: una revisión bibliográfica

    Directory of Open Access Journals (Sweden)

    Giohanny Olave

    2014-01-01

    Full Text Available Este artículo relaciona investigaciones interesadas en la retórica del conflicto armado colombiano. Tales indagaciones plantean problemas de investigación alrededor del carácter persuasivo de los discursos del conflicto, desde disciplinas diversas. La consulta bibliográfica de base se complementó con una encuesta electrónica autoadministrada, dirigida a investigadores colombianos del discurso. En los resultados, se explican las principales problematizaciones que emergen de la revisión, presentándolas como aproximaciones retóricas que los autores trabajan con una mayor orientación hacia el ethos , el pathos o el logos . Una mirada relacional entre estos trabajos esclarece las tendencias investigativas sobre la violencia en clave discursiva y apunta el valor de esas contribuciones para los estudios sobre el conflicto armado.

  13. Founder effect of the RET C611Y mutation in multiple endocrine neoplasia 2A in Denmark

    DEFF Research Database (Denmark)

    Mathiesen, Jes Sloth; Kroustrup, Jens Peter; Vestergaard, Peter

    2017-01-01

    BACKGROUND: Multiple endocrine neoplasia (MEN) 2A and 2B are caused by REarranged during Transfection (RET) germline mutations. In a recent nationwide study we reported of an unusually high prevalence (33%) of families with the C611Y mutation and hypothesized that this might be due to a founder...... effect. We conducted the first nationwide study of haplotypes in MEN2A families aiming to investigate the relatedness and occurrence of de novo mutations among Danish families carrying similar mutations. METHODS: The study included 21 apparently unrelated MEN2A families identified from a nationwide...... Danish RET cohort from 1994 to 2014. Twelve, two, two, three and two families carried the C611Y, C618F, C618Y, C620R and C634R mutation, respectively. Single nucleotide polymorphism chip data and identity by descent analysis were used to assess relatedness. RESULTS: A common founder mutation was found...

  14. Technical evaluation of RETS-required reports for Crystal River Nuclear Generating Plant, Unit 3, for 1983

    International Nuclear Information System (INIS)

    Magleby, E.H.; Young, T.E.

    1985-01-01

    A review was performed on the reports required by Federal regulations and the plant-specific Radiological Effluent Technical Specifications (RETS) for operations conducted at Florida Power Corporation's Crystal River Nuclear Plant, Unit 3, during 1983. The three periodic reports reviewed were (1) the Effluent and Waste Disposal Semiannual Report, January 1-June 30, 1983, (2) the Effluent and Waste Disposal Semiannual Report, July 1-December 31, 1983, and (3) the Annual Environmental Operating Report, Radiological, 1983. The principal review guidelines were the plant's specific RETS and NRC guidance given in NUREG-0133, ''Preparation of Radiological Effluent Technical Specifications for Nuclear Power Plants.'' The Licensee's submitted reports were found to be reasonably complete and consistent with the review guidelines

  15. Formas retóricas de dizer: o jornalista Celso Ming e seus artigos de opinião

    OpenAIRE

    Santana, Maiara Pereira de

    2015-01-01

    Esta dissertação, produzida na linha Texto e discurso nas modalidades oral e escrita, do Programa de Estudos em Língua Portuguesa da Pontifícia Universidade Católica de São Paulo (PUC-SP), tem por objetivo realizar uma leitura retórica de artigo opinativo, especificamente, o de domínio econômico, escrito pelo jornalista Celso Ming para o jornal O Estado de São Paulo. Para análise, adota-se a perspectiva da retórica, arte e técnica grega, que se atém aos discursos que são passíveis de persuasã...

  16. [Dose-Response Dependences for Frequency of RET/PTC Gene Rearrangements in Papillary Thyroid Carcinoma after Irradiation. Simple Pooling Analysis of Molecular Epidemiological Data].

    Science.gov (United States)

    Koterov, A N; Ushenkova, L N; Biryukov, A P

    2016-01-01

    On the basis of all possible publications on the theme included in the previously formed base of sources on molecular epidemiology of RET/PTC rearrangements in thyroid papillary carcinoma a pooled analysis ("simple pooling data") on determination of the dose-effect dependences for RET/PTC frequency in radiogenic carcinomas of various irradiated groups was performed. (They are groups subjected to radiotherapeutic exposure, residents near the Chernobyl nuclear power plant (CNPP) and victims of nuclear bombing). The tendency to Pearson linear correlation (r = 0.746; p = 0.148) between the frequency of RET/PTC and the estimated dose on thyroid in the regions affected by the CNPP accident was revealed. But this tendency was recognized to be random owing to abnormally low values of the indicator for the most contaminated Gomel region. The method tentatively called "case-control" showed reliable differences in thyroid dose values for carcinomas with RET/PTC and without those. The versatility of changes was found: the lack of RET/PTC for radiotherapeutic impacts was associated with higher doses, whereas in case of the CNPP accident and for nuclear bombing victims it was the opposite. Probably, in the first case the "cellular cleaning" phenomenon after exposure to very high doses took place. Search of direct Pearson correlations between average/median thyroid doses on groups and RET/PTC frequency in carcinomas of these groups showed a high reliability for the dose-effect dependences- at the continuous dose scale (for RET/PTC in total and RET/PTC1 respectively: r = 0.830; p = 0.002 and r = 0.906; p = 0.0003); while there was no significant correlation received for RET/PTC3. When using the weighting least square regression analysis (proceeding from the number of carcinomas in samples), the specified regularities remained. Attempts to influence the strength of correlation by exception ofthe data of all the samples connected with the accident on the CNPP did not significantly

  17. Somatotropinomas, but not nonfunctioning pituitary adenomas, maintain a functional apoptotic RET/Pit1/ARF/p53 pathway that is blocked by excess GDNF.

    Science.gov (United States)

    Diaz-Rodriguez, Esther; Garcia-Rendueles, Angela R; Ibáñez-Costa, Alejandro; Gutierrez-Pascual, Ester; Garcia-Lavandeira, Montserrat; Leal, Alfonso; Japon, Miguel A; Soto, Alfonso; Venegas, Eva; Tinahones, Francisco J; Garcia-Arnes, Juan A; Benito, Pedro; Angeles Galvez, Maria; Jimenez-Reina, Luis; Bernabeu, Ignacio; Dieguez, Carlos; Luque, Raul M; Castaño, Justo P; Alvarez, Clara V

    2014-11-01

    Acromegaly is caused by somatotroph cell adenomas (somatotropinomas [ACROs]), which secrete GH. Human and rodent somatotroph cells express the RET receptor. In rodents, when normal somatotrophs are deprived of the RET ligand, GDNF (Glial Cell Derived Neurotrophic Factor), RET is processed intracellularly to induce overexpression of Pit1 [Transcription factor (gene : POUF1) essential for transcription of Pituitary hormones GH, PRL and TSHb], which in turn leads to p19Arf/p53-dependent apoptosis. Our purpose was to ascertain whether human ACROs maintain the RET/Pit1/p14ARF/p53/apoptosis pathway, relative to nonfunctioning pituitary adenomas (NFPAs). Apoptosis in the absence and presence of GDNF was studied in primary cultures of 8 ACROs and 3 NFPAs. Parallel protein extracts were analyzed for expression of RET, Pit1, p19Arf, p53, and phospho-Akt. When GDNF deprived, ACRO cells, but not NFPAs, presented marked level of apoptosis that was prevented in the presence of GDNF. Apoptosis was accompanied by RET processing, Pit1 accumulation, and p14ARF and p53 induction. GDNF prevented all these effects via activation of phospho-AKT. Overexpression of human Pit1 (hPit1) directly induced p19Arf/p53 and apoptosis in a pituitary cell line. Using in silico studies, 2 CCAAT/enhancer binding protein alpha (cEBPα) consensus-binding sites were found to be 100% conserved in mouse, rat, and hPit1 promoters. Deletion of 1 cEBPα site prevented the RET-induced increase in hPit1 promoter expression. TaqMan qRT-PCR (real time RT-PCR) for RET, Pit1, Arf, TP53, GDNF, steroidogenic factor 1, and GH was performed in RNA from whole ACRO and NFPA tumors. ACRO but not NFPA adenomas express RET and Pit1. GDNF expression in the tumors was positively correlated with RET and negatively correlated with p53. In conclusion, ACROs maintain an active RET/Pit1/p14Arf/p53/apoptosis pathway that is inhibited by GDNF. Disruption of GDNF's survival function might constitute a new therapeutic route in

  18. EGFR, ALK, RET, KRAS and BRAF alterations in never-smokers with non-small cell lung cancer.

    Science.gov (United States)

    Dong, Y U; Ren, Weihong; Qi, Jun; Jin, B O; Li, Ying; Tao, Huiqing; Xu, Ren; Li, Yanqing; Zhang, Qinxian; Han, Baohui

    2016-04-01

    Non-small cell lung cancer (NSCLC), caused by various mutations in a spectrum of cancer driver genes, may have distinct pathological characteristics and drug responses. Extensive genetic screening and pathological characterization is required for the design of customized therapies to improve patient outcomes. Notably, NSCLC in never-smokers exhibits distinctive clinicopathological features, which are frequently associated with tumorigenic mutations, and thus may be treated as a unique disease entity. However, to the best of our knowledge, these mutations have not been extensively and accurately characterized in an NSCLC study with a large sample size. Therefore, the present study enrolled a large cohort of NSCLC patients, which consisted of 358 never-smokers, for the screening of genetic alterations in the epidermal growth factor receptor (EGFR), ret proto-oncogene (RET), anaplastic lymphoma kinase (ALK), Kirsten rat sarcoma viral oncogene homolog (KRAS) and B-Raf proto-oncogene serine/threonine kinase (BRAF) tumorigenic genes. It was identified that the mutation rate was 47.8, 7.5, 3.6, 1.4 and 0.3% for EGFR, ALK, KRAS, RET and BRAF, respectively. In addition, clinicopathological features associated with these mutations were characterized. EGFR mutations were more frequently observed in female and older patients. By contrast, KRAS mutations were more frequently detected in male patients, and ALK and RET translocations in younger patients. The cancer cells were frequently well-differentiated in carcinoma cases exhibiting EGFR mutations, however, were less differentiated in those with ALK translocations. In conclusion, the present study determined the frequency of oncogenic alterations and associated clinicopathological features in NSCLC exhibited by never-smokers using a large sample size. The results of the present study may enrich our knowledge of NSCLC in never-smokers and provide useful insights for improvement of the outcome of molecularly targeted therapies

  19. Microbiological and Biochemical Characterization of Cassava Retting, a Traditional Lactic Acid Fermentation for Foo-Foo (Cassava Flour) Production

    OpenAIRE

    Brauman, A.; Keleke, S.; Malonga, M.; Miambi, E.; Ampe, F.

    1996-01-01

    The overall kinetics of retting, a spontaneous fermentation of cassava roots performed in central Africa, was investigated in terms of microbial-population evolution and biochemical and physicochemical parameters. During the traditional process, endogenous cyanogens were almost totally degraded, plant cell walls were lysed by the simultaneous action of pectin methylesterase and pectate lysate, and organic acids (C2 to C4) were produced. Most microorganisms identified were found to be facultat...

  20. Weak randomness in device independent quantum key distribution and the advantage of using high dimensional entanglement

    OpenAIRE

    Huber, Marcus; Pawlowski, Marcin

    2013-01-01

    We show that in device independent quantum key distribution protocols the privacy of randomness is of crucial importance. For sublinear test sample sizes even the slightest guessing probability by an eavesdropper will completely compromise security. We show that a combined attack exploiting test sample and measurement choices compromises the security even with a linear size test sample and otherwise device independent security considerations. We explicitly derive the sample size needed to ret...

  1. Protein-tyrosine Phosphatase SHP2 Contributes to GDNF Neurotrophic Activity through Direct Binding to Phospho-Tyr687 in the RET Receptor Tyrosine Kinase*

    Science.gov (United States)

    Perrinjaquet, Maurice; Vilar, Marçal; Ibáñez, Carlos F.

    2010-01-01

    The signaling mechanisms by which neurotrophic receptors regulate neuronal survival and axonal growth are still incompletely understood. In the receptor tyrosine kinase RET, a receptor for GDNF (glial cell line-derived neurotrophic factor), the functions of the majority of tyrosine residues that become phosphorylated are still unknown. Here we have identified the protein-tyrosine phosphatase SHP2 as a novel direct interactor of RET and the first effector known to bind to phosphorylated Tyr687 in the juxtamembrane region of the receptor. We show that SHP2 is recruited to RET upon ligand binding in a cooperative fashion, such that both interaction with Tyr687 and association with components of the Tyr1062 signaling complex are required for stable recruitment of SHP2 to the receptor. SHP2 recruitment contributes to the ability of RET to activate the PI3K/AKT pathway and promote survival and neurite outgrowth in primary neurons. Furthermore, we find that activation of protein kinase A (PKA) by forskolin reduces the recruitment of SHP2 to RET and negatively affects ligand-mediated neurite outgrowth. In agreement with this, mutation of Ser696, a known PKA phosphorylation site in RET, enhances SHP2 binding to the receptor and eliminates the effect of forskolin on ligand-induced outgrowth. Together, these findings establish SHP2 as a novel positive regulator of the neurotrophic activities of RET and reveal Tyr687 as a critical platform for integration of RET and PKA signals. We anticipate that several other phosphotyrosines of unknown function in neuronal receptor tyrosine kinases will also support similar regulatory functions. PMID:20682772

  2. Protein-tyrosine phosphatase SHP2 contributes to GDNF neurotrophic activity through direct binding to phospho-Tyr687 in the RET receptor tyrosine kinase.

    Science.gov (United States)

    Perrinjaquet, Maurice; Vilar, Marçal; Ibáñez, Carlos F

    2010-10-08

    The signaling mechanisms by which neurotrophic receptors regulate neuronal survival and axonal growth are still incompletely understood. In the receptor tyrosine kinase RET, a receptor for GDNF (glial cell line-derived neurotrophic factor), the functions of the majority of tyrosine residues that become phosphorylated are still unknown. Here we have identified the protein-tyrosine phosphatase SHP2 as a novel direct interactor of RET and the first effector known to bind to phosphorylated Tyr(687) in the juxtamembrane region of the receptor. We show that SHP2 is recruited to RET upon ligand binding in a cooperative fashion, such that both interaction with Tyr(687) and association with components of the Tyr(1062) signaling complex are required for stable recruitment of SHP2 to the receptor. SHP2 recruitment contributes to the ability of RET to activate the PI3K/AKT pathway and promote survival and neurite outgrowth in primary neurons. Furthermore, we find that activation of protein kinase A (PKA) by forskolin reduces the recruitment of SHP2 to RET and negatively affects ligand-mediated neurite outgrowth. In agreement with this, mutation of Ser(696), a known PKA phosphorylation site in RET, enhances SHP2 binding to the receptor and eliminates the effect of forskolin on ligand-induced outgrowth. Together, these findings establish SHP2 as a novel positive regulator of the neurotrophic activities of RET and reveal Tyr(687) as a critical platform for integration of RET and PKA signals. We anticipate that several other phosphotyrosines of unknown function in neuronal receptor tyrosine kinases will also support similar regulatory functions.

  3. Break-apart interphase fluorescence in situ hybridization assay in papillary thyroid carcinoma: on the road to optimizing the cut-off level for RET/PTC rearrangements.

    Science.gov (United States)

    Colato, Chiara; Vicentini, Caterina; Cantara, Silvia; Pedron, Serena; Brazzarola, Paolo; Marchetti, Ivo; Di Coscio, Giancarlo; Chilosi, Marco; Brunelli, Matteo; Pacini, Furio; Ferdeghini, Marco

    2015-05-01

    Chromosomal rearrangements of the RET proto-oncogene is one of the most common molecular events in papillary thyroid carcinoma (PTC). However, their pathogenic role and clinical significance are still debated. This study aimed to investigate the prevalence of RET/PTC rearrangement in a cohort of BRAF WT PTCs by fluorescence in situ hybridization (FISH) and to search a reliable cut-off level in order to distinguish clonal or non-clonal RET changes. Forty BRAF WT PTCs were analyzed by FISH for RET rearrangements. As controls, six BRAFV600E mutated PTCs, 13 follicular adenomas (FA), and ten normal thyroid parenchyma were also analyzed. We performed FISH analysis on formalin-fixed, paraffin-embedded tissue using a commercially available RET break-apart probe. A cut-off level equivalent to 10.2% of aberrant cells was accepted as significant. To validate FISH results, we analyzed the study cohort by qRT-PCR. Split RET signals above the cut-off level were observed in 25% (10/40) of PTCs, harboring a percentage of positive cells ranging from 12 to 50%, and in one spontaneous FA (1/13, 7.7%). Overall, the data obtained by FISH matched well with qRT-PCR results. Challenging findings were observed in five cases showing a frequency of rearrangement very close to the cut-off. FISH approach represents a powerful tool to estimate the ratio between broken and non-broken RET tumor cells. Establishing a precise FISH cut-off may be useful in the interpretation of the presence of RET rearrangement, primarily when this strategy is used for cytological evaluation or for targeted therapy. © 2015 European Society of Endocrinology.

  4. Retórica contrastiva y enseñanza del discurso formal en lenguas afines

    Directory of Open Access Journals (Sweden)

    Pilar Robles Garrote

    2014-08-01

    Full Text Available Normal 0 21 false false false ES X-NONE X-NONE El presente artículo trata de evidenciar la utilidad de la retórica contrastiva en la enseñanza del discurso formal en lenguas afines, aportando algunos datos empíricos obtenidos en un análisis lingüístico cuyo objetivo principal es determinar los puntos en común y divergencias encontradas en algunos recursos estilísticos propios del lenguaje formal en lengua española e italiana. Es un estudio de carácter exploratorio realizado a partir de un corpus oral de conferencias dictadas en lengua española e italiana por oradores nativos. Tras analizar y comparar los recursos estilísticos utilizados por los informantes (preguntas, ejemplos, citas y reiteraciones, los resultados revelan que, si bien los recursos del discurso oral formal encontrados en las conferencias analizadas poseen características análogas, existen divergencias entre estas dos lenguas afines que pueden confluir en una percepción distinta del aspecto pragmático.

  5. Application of 119Sn Moessbauer spectroscopy to investigations of RET2-X2-type phases

    International Nuclear Information System (INIS)

    Goerlich, E.

    1991-01-01

    Moessbauer spectroscopy of 119 Sn is an effective tool to study nuclear hyperfine interactions which in turn are important as a source of information complementary to that supplied by ''classical'' methods. However, particularly when the effects are subtle, experimental conditions as well as data analysis should be handled with care. The attention is devoted primarily to the finite absorber thickness effects. As examples serve our recent results obtained from investigations of ternary tetragonal phases of RET 2 X 2 -type. In EuPd 2 Si 2 mixed valent system 119 Sn was used as probe which detects the influence of Eu-valency change at a distant site of Si. Electrical resistivity measurements in CeNi 2 Sn 2 may indicate a Kondo-type behaviour while Moessbauer effect leads to the conclusion in favour of a magnetically ordered state. The analysis of resonance absorption spectra of CeAg 2 Sn 2 using a full transmission integral indicates the presence of a metallic β-tin in the sample, while data fitting within the thin absorber approximation has lead to the opposite conclusion. Neither in CeNi 2 Sn 2 nor in ErNi 2 Sn 2 the temperature dependence of the recoil free factors alone cannot explain the observed broadening of spectra at low temperatures. (author). 14 refs, 13 figs

  6. Analysis of action of device with spring pins for picking up of retted flax straw

    Directory of Open Access Journals (Sweden)

    V. G. Chernikov

    2016-01-01

    Full Text Available Weather conditions in flax cultivation areas during harvesting time can be characterized with high rainfalls, relative humidity and, in some areas, extremely low temperature. Clogging of fields with stones, grass germination through flax swaths, often an absence of homogeneity on length and thickness of straw in swaths require working out new devices for straw lifting. Existing devices for picking up do not provide a high-quality lifting of flax swaths and have a low coefficient of reliability of the process. Researches and experimental-design works were carried out to create a constructive-technological scheme of the picking up device of cylindrical type with spring-loaded rigid pins. The mathematical model of the device operation when a pin touching an obstacle. The condition of balance of the mechanism under which the pin of a cilinder will operate technological process of picking up of retted flax straw without action of the safety device (spring was described. The offered method of calculation of operation of this device was introduced in a common flax swath lifter-turners

  7. Sermão I de Santa Catarina: Latim e Retórica

    Directory of Open Access Journals (Sweden)

    João Bortolanza

    2007-07-01

    Full Text Available Este artigo mostra um pequeno resultado do projeto de pesquisa Ánálise do Latim empregado por Vieira em seus Sermões’. O latim é a própria retórica de Vieira e o levantamento das citações latinas permite reconstruir todo seu labor intelectual. É o que me proponho demonstrar no Sermão I de Santa Catarina, que tem como epígrafe e mote apenas a expressão latina ne forte. A expressão é extraída da frase das virgens prudentes ne forte sufficiat nobis et vobis. Esse “para que não por acaso” passa a ser explorado a partir da etimologia forte > Fortuna, esta, por sua vez, representada pela roda, a roda da Fortuna, sempre instável. E a roda, com a palma e a espada, é um dos troféus da vitória da virgem mártir Catarina em sua imagem. Desfilam frases dos textos sagrados e de clássicos, como Sêneca, Plínio e Plutarco.

  8. Resonance energy transfer (RET)-Induced intermolecular pairing force: a tunable weak interaction and its application in SWNT separation.

    Science.gov (United States)

    Pan, Xiaoyong; Chen, Hui; Wang, Wei Zhi; Ng, Siu Choon; Chan-Park, Mary B

    2011-07-21

    This paper explores evidence of an optically mediated interaction that is active in the separation mechanism of certain selective agents through consideration of the contrasting selective behaviors of two conjugated polymers with distinct optical properties. The involvement of a RET-induced intermolecular pairing force is implied by the different illumination response behaviors. The magnitude of this interaction scales with the external stimulus parameter, the illumination irradiance (I), and thus is tunable. This suggests a facile technique to modify the selectivity of polymers toward specific SWNT species by altering the polymer structure to adjust the corresponding intermolecular interaction. This is the first experimental verification and application of a RET-induced intermolecular pairing force to SWNT separation. With this kind of interaction taken into account, reasonable interpretation of some conflicting data, especially PLE maps, can be easily made. The above conclusion can be applied to other substances as long as they are electrically neutral and there is photon-induced RET between them. The significant magnitude of this interaction makes direct manipulation of molecules/particles possible and is expected to have applications in molecular engineering. © 2011 American Chemical Society

  9. Thyroid nodules, polymorphic variants in DNA repair and RET-related genes, and interaction with ionizing radiation exposure from nuclear tests in Kazakhstan

    Science.gov (United States)

    Sigurdson, Alice J.; Land, Charles E.; Bhatti, Parveen; Pineda, Marbin; Brenner, Alina; Carr, Zhanat; Gusev, Boris I.; Zhumadilov, Zhaxibay; Simon, Steven L.; Bouville, Andre; Rutter, Joni L.; Ron, Elaine; Struewing, Jeffery P.

    2010-01-01

    Risk factors for thyroid cancer remain largely unknown except for ionizing radiation exposure during childhood and a history of benign thyroid nodules. Because thyroid nodules are more common than thyroid cancers and are associated with thyroid cancer risk, we evaluated several polymorphisms potentially relevant to thyroid tumors and assessed interaction with ionizing radiation exposure to the thyroid gland. Thyroid nodules were detected in 1998 by ultrasound screening of 2997 persons who lived near the Semipalatinsk nuclear test site in Kazakhstan when they were children (1949-62). Cases with thyroid nodules (n=907) were frequency matched (1:1) to those without nodules by ethnicity (Kazakh or Russian), gender, and age at screening. Thyroid gland radiation doses were estimated from fallout deposition patterns, residence history, and diet. We analyzed 23 polymorphisms in 13 genes and assessed interaction with ionizing radiation exposure using likelihood ratio tests (LRT). Elevated thyroid nodule risks were associated with the minor alleles of RET S836S (rs1800862, p = 0.03) and GFRA1 -193C>G (rs not assigned, p = 0.05) and decreased risk with XRCC1 R194W (rs1799782, p-trend = 0.03) and TGFB1 T263I (rs1800472, p = 0.009). Similar patterns of association were observed for a small number of papillary thyroid cancers (n=25). Ionizing radiation exposure to the thyroid gland was associated with significantly increased risk of thyroid nodules (age and gender adjusted excess odds ratio/Gy = 0.30, 95% confidence interval 0.05-0.56), with evidence for interaction by genotype found for XRCC1 R194W (LRT p value = 0.02). Polymorphisms in RET signaling, DNA repair, and proliferation genes may be related to risk of thyroid nodules, consistent with some previous reports on thyroid cancer. Borderline support for gene-radiation interaction was found for a variant in XRCC1, a key base excision repair protein. Other pathways, such as genes in double strand break repair, apoptosis, and

  10. Las retóricas del público. El espacio de consumo del arte como institución política

    Directory of Open Access Journals (Sweden)

    Bayón, Fernando

    2012-04-01

    Full Text Available This article aims to show how the space for leisure practices in the art sector is a political construction. To do this, the essay focuses on public (art audience as key concept. It argues that art audiences are critically engaged and politically significant communities, through which each society gives an institutional dimension to cultural practices. In dialogue with modern thinkers such as Adorno, Baudrillard, Warburg and Benjamin, or architects like Rem Koolhaas, the article presents audiences and publics from both a social and institutional points of view, understanding that the temporal and spatial dynamics behind their community boundaries are worth exploring. We think that there are at least two dominant forms of an emerging social rhetoric that are producing innovative ways of building the spaces for consuming cultural offer in the late modern society: we call them rhetorics of convergence and rhetorics of persuation.

    Este artículo pretende poner de manifiesto cómo el espacio de las prácticas de ocio cultural es una construcción política. Para ello, escoge como categoría central al público, en tanto formación comunitaria por medio de la cual cada sociedad institucionaliza de forma dinámica las prácticas de ocio asociadas a la oferta artística. En diálogo con pensadores como Adorno, Baudrillard, Warburg o Benjamin, se describen las dimensiones espaciales y temporales en que se desarrollan los vínculos comunitarios, específicos de la institución del “público” en el sector cultural. Para ello, el ensayo intenta identificar cuáles son las estrategias comunicativas que están produciendo esos espacios de presencia y esos tiempos de experiencia para las prácticas del ocio cultural en las sociedades del consumismo avanzado. Las he llamado retóricas de la convergencia y retóricas de la persuasión.

  11. Germline mutation of RET proto-oncogene’s exons 17 and 18 in Iranian medullary thyroid carcinoma patients

    Directory of Open Access Journals (Sweden)

    Marjan Zarif Yeganeh

    2017-03-01

    Full Text Available Background: Thyroid carcinoma is the most common endocrine malignancy. Medullary thyroid carcinoma (MTC approximately accounts for 5-10% of all thyroid carcinoma. Nowadays, it is obviously, the mutations in REarranged during transfection (RET proto-oncogene, especially, mutations in exons 10, 11 and 16 are associated with MTC pathogenesis and occurrence. Thus, early diagnosis of MTC by mutation detection in RET proto-oncogene allows to identify patients who do not have any developed symptoms. The aim of this study was to screening of germline mutations in RET proto-oncogene exons 17 and 18 in MTC patients and their first degree relatives in Iranian population. Methods: In this cross-sectional study, three hundred eleven participates (190 patients, 121 their relatives were referred to endocrine research center, Shahid Beheshti University of Medical Science during September 2013 until September 2015. The inclusion criteria were pathological and clinical diagnosis. After whole blood sampling, genomic DNA was extracted from peripheral blood leucocytes using the standard Salting Out/Proteinase K method. Nucleotide change detection in exons 17 and 18 was performed using PCR and direct DNA sequencing methods. Results: In this study, twenty missense mutations [CGC>TGC, c.2944C>T, p.Arg982Cys (rs17158558] which included 16 heterozygote and 4 homozygote mutations were found in codon 982 (exon 18. In the present study, 154 G>A (rs2742236 and 4 C>T (rs370072408 nucleotide changes were detected in exons 18 and intron 17 respectively. There was no mutation in exon 17. Conclusion: It seems that because of arginine to cysteine substitutions in RET tyrosine kinase protein structure and its polyphen score (0.955 and SIFT score (0.01 the mutation in codon 982 (exon 18 could be have pathogenic effects. On the other hands, the mentioned mutation frequency was 6.4% among MTC patients, so this mutation of exon 18 could be checked in genetic screening tests of RET

  12. Modulatory role of phospholipase D in the activation of signal transducer and activator of transcription (STAT-3 by thyroid oncogenic kinase RET/PTC

    Directory of Open Access Journals (Sweden)

    Kim Dong Wook

    2008-05-01

    Full Text Available Abstract Background RET/PTC (rearranged in transformation/papillary thyroid carcinomas gene rearrangements are the most frequent genetic alterations identified in papillary thyroid carcinoma. Although it has been established that RET/PTC kinase plays a crucial role in intracellular signaling pathways that regulate cellular transformation, growth, and proliferation in thyroid epithelial cells, the upstream signaling that leads to the activation of RET/PTC is largely unknown. Based on the observation of high levels of PLD expression in human papillary thyroid cancer tissues, we investigated whether PLD plays a role in the regulating the RET/PTC-induced STAT3 activation. Methods Cancer tissue samples were obtained from papillary thyroid cancer patients (n = 6. The expression level of PLD was examined using immunohistochemistry and western blotting. Direct interaction between RET/PTC and PLD was analyzed by co-immunoprecipitation assay. PLD activity was assessed by measuring the formation of [3H]phosphatidylbutanol, the product of PLD-mediated transphosphatidylation, in the presence of n-butanol. The transcriptional activity of STAT3 was assessed by m67 luciferase reporter assay. Results In human papillary thyroid cancer, the expression levels of PLD2 protein were higher than those in the corresponding paired normal tissues. PLD and RET/PTC could be co-immunoprecipitated from cells where each protein was over-expressed. In addition, the activation of PLD by pervanadate triggered phosphorylation of tyrosine 705 residue on STAT-3, and its phosphorylation was dramatically higher in TPC-1 cells (from papillary carcinoma that have an endogenous RET/PTC1 than in ARO cells (from anaplastic carcinoma without alteration of total STAT-3 expression. Moreover, the RET/PTC-mediated transcriptional activation of STAT-3 was synergistically increased by over-expression of PLD, whereas the PLD activity as a lipid hydrolyzing enzyme was not affected by RET

  13. Risk Profile of the RET A883F Germline Mutation: An International Collaborative Study.

    Science.gov (United States)

    Mathiesen, Jes Sloth; Habra, Mouhammed Amir; Bassett, John Howard Duncan; Choudhury, Sirazum Mubin; Balasubramanian, Sabapathy Prakash; Howlett, Trevor A; Robinson, Bruce G; Gimenez-Roqueplo, Anne-Paule; Castinetti, Frederic; Vestergaard, Peter; Frank-Raue, Karin

    2017-06-01

    The A883F germline mutation of the rearranged during transfection (RET) proto-oncogene causes multiple endocrine neoplasia 2B. In the revised American Thyroid Association (ATA) guidelines for the management of medullary thyroid carcinoma (MTC), the A883F mutation has been reclassified from the highest to the high-risk level, although no well-defined risk profile for this mutation exists. To create a risk profile for the A883F mutation for appropriate classification among the ATA risk levels. Retrospective analysis. International collaboration. Included were 13 A883F carriers. The intervention was thyroidectomy. Earliest age of MTC, regional lymph node metastases, distant metastases, age-related penetrance of MTC and pheochromocytoma (PHEO), overall and disease-specific survival, and biochemical cure rate. One and three carriers were diagnosed at age 7 to 9 years (median, 7.5 years) with a normal thyroid and C-cell hyperplasia, respectively. Nine carriers were diagnosed with MTC at age 10 to 39 years (median, 19 years). The earliest age of MTC, regional lymph node metastasis, and distant metastasis was 10, 20, and 20 years, respectively. Fifty percent penetrance of MTC and PHEO was achieved by age 19 and 34 years, respectively. Five- and 10-year survival rates (both overall and disease specific) were 88% and 88%, respectively. Biochemical cure for MTC at latest follow-up was achieved in 63% (five of eight carriers) with pertinent data. MTC of A883F carriers seems to have a more indolent natural course compared with that of M918T carriers. Our results support the classification of the A883F mutation in the ATA high-risk level. Copyright © 2017 Endocrine Society

  14. Key issues

    International Nuclear Information System (INIS)

    Cook, N.G.W.

    1980-01-01

    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  15. La retórica y el análisis de la tecnología y de la sociedad actuales. Presentación.

    Directory of Open Access Journals (Sweden)

    Giorgio De Marchis

    2013-02-01

    Full Text Available Es un honor para mí presentar el segundo monográfico dedicado a la retórica de la revista académica Icono 14. El anterior fue el primer número del volumen 3, en 2005. Pasa el tiempo, y queda claro que la retórica no muere, sino que se transforma. Esto es así porque la retórica es el estudio de la comunicación eficaz. Todo emisor desea que su comunicación sea lo más efectiva posible, esto es, que la comunicación logre los objetivos del comunicador. Creo que una de las fortalezas de la retórica clásica es que ha construido un andamiaje muy sólido, ordenado, que permite un análisis estructurado, y sin embargo flexible, que le facilita adaptarse a los cambios tecnológicos y sociales. Algunos artículos publicados en este monográfico sirven de ejemplo de dicha estructura trabada, pero también maleable del análisis retórico. El presente monográfico pretende integrar la retórica clásica con la tecnología actual, y ambas con las formas de comunicación social que los cambios tecnológicos han propiciado. En este número se publican nueve artículos que se ocupan de muy distintos temas, y que demuestran fehacientemente qué es la aproximación retórica actual. A continuación anotaré algunos breves comentarios sobre los artículos publicados para que el lector dirija su atención hacia aquellos textos que más le pudieran interesar.

  16. Association of RET Genetic Polymorphisms and Haplotypes with Papillary Thyroid Carcinoma in the Portuguese Population: A Case-Control Study

    Science.gov (United States)

    Santos, Marina; Azevedo, Teresa; Martins, Teresa; Rodrigues, Fernando J.; Lemos, Manuel C.

    2014-01-01

    Thyroid cancer has a multifactorial aetiology resulting from the interaction of genetic and environmental factors. Several low penetrance susceptibility genes have been identified but their effects often vary between different populations. Somatic point mutations and translocations of the REarranged during Transfection (RET) proto-oncogene are frequently found in thyroid cancer. The aim of this case-control study was to determine the effect of four well known RET single nucleotide polymorphisms (SNPs) on the risk for differentiated thyroid carcinoma. A total of 545 Portuguese patients and 543 controls were genotyped by PCR and restriction enzyme analysis, for the following SNPs: G691S (exon 11, rs1799939 G/A), L769L (exon 13, rs1800861 T/G), S836S (exon 14, rs1800862 C/T), and S904S (exon 15, rs1800863 C/G). The minor allele of S836S was overrepresented in patients with papillary thyroid carcinoma (PTC) when compared to controls (OR 1.57; 95% CI 1.05–2.35; p = 0.026). The GGTC haplotype was also overrepresented in PTC (OR 2.51; 95% CI 1.07–5.91; p = 0.029). No associations were found in follicular thyroid carcinoma (FTC). Multivariate logistic regression analysis showed no differences regarding gender, age at diagnosis, lymph node or distant metastasis. However, a near significant overrepresentation of the minor alleles of G691S and S904S was found in patients with tumours greater than 10 mm of diameter at diagnosis. These data suggest that the RET S836S polymorphism in exon 14 and the GGTC haplotype are risk factors for PTC, but not FTC, and that the G691S/S904S polymorphisms might be associated with tumour behaviour. PMID:25330015

  17. A prova retórica do logos no filme narrativo de ficção

    Directory of Open Access Journals (Sweden)

    Carolina Assunção e ALVES

    2016-08-01

    Full Text Available RESUMO O logos consiste na prova retórica técnica/artística, segundo (Aristóteles, 2000, em que o orador demonstra ou tenta demonstrar a verdade pelo discurso; ou seja, trata-se do uso do raciocínio lógico com o objetivo de fundar uma proposição persuasiva. Para autores como (Amossy, 2006 e (Olbrechts-Tyteca e Perelman, 2008, os gêneros discursivos, uma vez que sempre visam a algum tipo de impacto sobre o público, são providos de argumentatividade em diferentes graus e intenções. Neste artigo, pretendemos discutir possibilidades de emprego da prova retórica do logos no filme narrativo de ficção, sob a perspectiva da análise argumentativa do discurso e da teoria semiolinguística (Charaudeau, 2001. O método utilizado consiste na aplicação de algumas categorias do logos à análise argumentativo-discursiva de algumas sequências do filme O Poderoso Chefão II (The Godfather Part II, 1974, de Francis Ford Coppola, levando em consideração os elementos da linguagem cinematográfica envolvidos. Esta pesquisa permitiu verificar a proficuidade da abordagem do filme de ficção como objeto de estudo nessa área, bem como a relação intrínseca entre as provas retóricas do ethos, do pathos e do logos.

  18. IMPACT OF JUTE RETTING ON NATIVE FISH DIVERSITY AND AQUATIC HEALTH OF ROADSIDE TRANSITORY WATER BODIES: AN ASSESSMENT IN EASTERN INDIA

    Directory of Open Access Journals (Sweden)

    Dipankar Ghosh

    2015-09-01

    Full Text Available Roadside transitory water bodies being manmade depressions have a great ecological and socio-economic importance from years. The effects of agricultural runoffs, jute retting, macro-phytes infestations and inadequate rainfall in changed climate often degrade transitory water bodies’ environment while the biodiversity have impacted severely because of population pressure, over exploitation and indiscriminate use of fine meshed fishing gears as a whole. Physico-chemical and biological analysis with fish species composition, relative abundance, diversity indices like species richness, evenness and Shannon-Wiener index were carried out for pre-, during and post-jute retting season and for year mean as a whole to assess impact of jute retting on the roadside transitory water body’s environmental health and indigenous fish diversity at Sahebnagar village in Nadia District, India. All the physico-chemical parameters barring biochemical oxygen demand and water transparency remained more or less same or marginally got little changed during those three seasons. As much as 19 native fish species with varied relative abundances and dominances were identified. Jute retting impacted lower native fish diversity indices like Shannon-Wiener index values (1.94 to 2.68 clearly indicated poor to moderate pollution status of the transitory water body in that area during monsoon in particular and throughout the year in general. So we opined there should be some control over the intense jute retting in the road side transitory water bodies for sustainable management of these manmade resources.

  19. Cálculo vectorial discreto para problemas elípticos sobre retículas uniformes

    OpenAIRE

    Santos Gutiérrez, Roberto

    2004-01-01

    Esta tesina se enmarca dentro de los trabajos en el campo del análisis numérico denominados genéricamente como "discretizaciones miméticas de la mecánica del medio continuo". La idea consiste en establecer un cálculo vectorial sobre retículas uniformes siguiendo el modelo del caso continuo, de forma que se plantean los problemas elípticos directamente en medios discretos. Esto conduce a obtener operadores discretos análogos al gradiente, divergencia y laplaciano, y se demuestra que estos oper...

  20. Carlos Germán Belli y Jorge Eduardo Eielson. Un ensayo de retórica comparada

    OpenAIRE

    Fernández-Cozman, Camilo

    2016-01-01

    Carlos Germán Belli y Jorge Eduardo Eielson son dos poetas peruanos. El autor intenta comparar la obra de ambos poetas sobre la base del análisis de las figuras literarias y de las técnicas argumentativas. Se trata de una óptica de Retórica Comparada. Los dos poetas realizan una crítica de las estructuras de poder hegemónico y ello se evidencia en dos poemas representativos: "La ración" y "Cappella Sistina".

  1. The increased incidence of the RET p.Gly691Ser variant in French-Canadian vesicoureteric reflux patients is not replicated by a larger study in Ireland.

    LENUS (Irish Health Repository)

    Darlow, John M

    2012-02-01

    The p.Gly691Ser variant of the RET protein, resulting from the \\'A\\' allele of the SNP rs1799939 in exon 11 of the RET gene, was recently found to be present in a high proportion of primary vesicoureteric reflux (pVUR) patients in Quebec. We have determined the genotype of this SNP in 221 unrelated index cases of pVUR from the Irish population, in 190 full siblings of 160 of the index cases, and in 592 healthy controls. We found no significant difference in genotype or allele frequencies in patients and controls, and no tendency of affected siblings to share the same genotype. We also found no difference in the presence of additional phenotypic features such as duplex kidneys, between patients with and without the \\'A\\' allele, and no difference in grade of reflux. We find no evidence of any influence of RET SNP rs1799939 on pVUR phenotype.

  2. Imperfect conformation of experimental and epidemiological data for frequency of RET/РТС gene rearrangements in papillary thyroid carcinoma for the Chernobyl accident

    Directory of Open Access Journals (Sweden)

    Ushenkova L.N.

    2013-12-01

    Full Text Available In an overview and analytical study of the epidemiological data on the frequency of RET/РТС gene rearrangements in sporadic and radiogenic (patients after radiotherapy, residents of contaminated after the Chernobyl disaster areas, victims after the atomic bombings, etc. carcinomas of the thyroid gland were examined. In general, the observed epidemiological laws were confirmed in radiobiology experiments by irradiation of different cultures of thyroid cells and ex vivo with the exception of Chernobyl cohorts. Induction of RET/РТС gene rearrangements by 131l exposure in children carcinomas of Chernobyl residents in mice did not observe too. It is concluded that the situation with the frequency of RET/РТС rearrangements in thyroid carcinoma in Chernobyl cohorts once again confirms the multifactorial nature of the induction and development of these tumors with a contribution of radiation and non-radiation factors (iodine deficiency and different stresses.

  3. A interação retórico-discursiva e suas múltiplas variáveis

    Directory of Open Access Journals (Sweden)

    Melliandro Mendes Galinari

    2012-11-01

    Full Text Available O presente artigo procura construir uma visão de conjunto acercados elementos envolvidos numa interação retórico-discursiva e suasrespectivas designações teórico-conceituais. A enunciação, vista sobuma ótica argumentativa e entendida como um processo comunicativoestabelecido entre uma instância de produção e outra de recepção dodiscurso, institui-se pela atuação de inúmeras variáveis. Comoexemplo, pode-se citar os próprios argumentos veiculados pelodiscurso (logos, ethos e pathos, as modalidades possíveis de adesão(teses, ações e emoções, o gênero discursivo/textual e uma série defatores situacionais (orador, auditório, elementos dóxicos,características sócio-históricas, etc.. O artigo, enfim, salienta aimportância de se levar em consideração, conjuntamente, taiselementos durante uma análise discursiva e procura aproximar aAnálise do Discurso da Retórica e da Sofística.

  4. El argumento de probabilidad (τὸ εἰκός en la retórica griega

    Directory of Open Access Journals (Sweden)

    Heiner Mercado Percia

    2015-01-01

    Full Text Available Los discursos de oradores como Isócrates, Gorgias, Antifonte, Lisias, entre otros, e igualmente, los dos tratados de retórica que conservamos de la segunda mitad del siglo IV a. C no sólo pueden considerarse como piezas literarias construidas con gran habilidad o como manuales con recetas para aplicar, sino como fuente de conceptos de interés para la filosofía. En este artículo se analiza uno de esos conceptos, τὸ εἰκός. Traducido normalmente como “probable” o “verosímil”, los eikóta son recursos argumentativos utilizados desde los orígenes de la práctica de arte retórico, sobre todo en espacios judiciales y, particularmente, fueron usados en aquellos litigios en los que la falta de testigos o testimonios hacía difícil inclinar favorablemente al juez. Pero también los eikóta ocuparon el centro de la crítica platónica por ser definidos como opuestos a la verdad (ἀλήθεια.

  5. Retóricas sobre el fraccionamiento del Partido Liberal en Medellín: 1958-1986

    Directory of Open Access Journals (Sweden)

    Juan Carlos Arenas Gómez

    2006-01-01

    Full Text Available Este artículo pretende poner en evidencia los motivos y analizar las razones esgrimidas por los miembros de los partidos cuando protagonizan un proceso de fragmentación. Aborda las retóricas o conjunto de argumentos utilizados, de manera individual o colectiva, por los miembros del partido liberal en Medellín para justificar los procesos de fragmentación y su desmonte durante el Frente Nacional. El examen se estructura a partir del vínculo entre dichas retóricas y las problemáticas que afrontan las organizaciones partidistas y los individuos que actúan dentro de ellas para mantenerse vigentes: en primer lugar, la aplicación de reglas del juego impuestas tanto por el sistema político como por las autoridades del partido; en segundo lugar, las tensiones surgidas tanto alrededor de la selección de candidatos a cargos públicos como del reparto burocrático; en tercer lugar, las elecciones y los resultados que los partidos obtienen en ellas.

  6. Changes in Teachers' Beliefs and Classroom Practices Concerning Inquiry-Based Instruction Following a Year-Long RET-PLC Program

    Science.gov (United States)

    Miranda, Rommel J.; Damico, Julie B.

    2015-01-01

    This mixed-methods study examines how engaging science teachers in a summer Research Experiences for Teachers (RET) followed by an academic-year Professional Learning Community (PLC) focused on translating teacher research experiences to inquiry-based classroom lessons might facilitate changes in their beliefs and classroom practices regarding…

  7. Plasma levels of calcitonin in medullary thyroid carcinoma patients with and without the RET proto-oncogene mutations in exons 10 and 11

    Directory of Open Access Journals (Sweden)

    Samira Ehyayi

    2017-09-01

    Conclusion: Routine measurement of calcitonin has been investigated as a screening method for the diagnosis of medullary thyroid carcinoma patients. Nevertheless, additional data are required to definitely support routine measurement of calcitonin due to the role of RET proto-oncogene.

  8. Retórica de la historia. Un desafío al exceso de las nuevas tecnologías.

    Directory of Open Access Journals (Sweden)

    Pedro Javier Gómez Martínez

    2013-01-01

    Full Text Available El presente artículo se propone analizar un cierto tipo de figuras retóricas que se da en la obra audiovisual en el nivel de la propia historia, afectando al plano del contenido antes que al de la expresión. Hemos utilizado como caso de estudio la serie televisiva Pulseres vermelles ("Pulseras rojas", 2011, creada por Albert Espinosa y dirigida por Pau Freixas. El formato ha sido exportado más allá de nuestras fronteras. Steven Spielberg ha adquirido los derechos. Con un apreciable éxito de público y crítica, esta serie ha conquistado el corazón de numerosos espectadores a partir de temáticas emocionales de enorme compromiso, valiéndose además de un aparato retórico muy eficaz, parte del cual analizaremos aquí. Dichas circunstancias inducen a reflexionar sobre la importancia de la historia frente al discurso. Defendemos que la serie da prioridad a una retórica del contenido sobre la retórica de la expresión.

  9. Regulation of the Na,K-ATPase gamma-subunit FXYD2 by Runx1 and Ret signaling in normal and injured non-peptidergic nociceptive sensory neurons.

    Directory of Open Access Journals (Sweden)

    Stéphanie Ventéo

    Full Text Available Dorsal root ganglia (DRGs contain the cell bodies of sensory neurons which relay nociceptive, thermoceptive, mechanoceptive and proprioceptive information from peripheral tissues toward the central nervous system. These neurons establish constant communication with their targets which insures correct maturation and functioning of the somato-sensory nervous system. Interfering with this two-way communication leads to cellular, electrophysiological and molecular modifications that can eventually cause neuropathic conditions. In this study we reveal that FXYD2, which encodes the gamma-subunit of the Na,K-ATPase reported so far to be mainly expressed in the kidney, is induced in the mouse DRGs at postnatal stages where it is restricted specifically to the TrkB-expressing mechanoceptive and Ret-positive/IB4-binding non-peptidergic nociceptive neurons. In non-peptidergic nociceptors, we show that the transcription factor Runx1 controls FXYD2 expression during the maturation of the somato-sensory system, partly through regulation of the tyrosine kinase receptor Ret. Moreover, Ret signaling maintains FXYD2 expression in adults as demonstrated by the axotomy-induced down-regulation of the gene that can be reverted by in vivo delivery of GDNF family ligands. Altogether, these results establish FXYD2 as a specific marker of defined sensory neuron subtypes and a new target of the Ret signaling pathway during normal maturation of the non-peptidergic nociceptive neurons and after sciatic nerve injury.

  10. Who Are the Science Teachers That Seek Professional Development in Research Experience for Teachers (RET's)? Implications for Teacher Professional Development

    Science.gov (United States)

    Saka, Yavuz

    2013-01-01

    To address the need to better prepare teachers to enact science education reforms, the National Science Foundation has supported a Research Experience for Teachers (RET's) format for teacher professional development. In these experiences, teachers work closely with practicing scientists to engage in authentic scientific inquiry. Although…

  11. Influencia de la retórica musical de Los Beatles en los “jingles” y en la publicidad

    Directory of Open Access Journals (Sweden)

    Anton Alvarez Ruiz

    2013-01-01

    Full Text Available Este artículo explora de qué manera los jingles publicitarios se han visto influidos por la música de The Beatles. Para ello, utiliza una metodología descriptiva, comparativa y diacrónica. Tras estudiar brevemente la historia e importancia de los jingles, analizando algunas características de las canciones de The Beatles y su semejanza con los jingles publicitarios. En las canciones mencionadas se detallan las principales figuras retóricas encontradas, tanto en los textos como en las frases musicales y su influencia en la música publicitaria. También se estudia la única pieza publicitaria conocida realizada por The Beatles en su carrera. Por último, se analiza la posterior utilización de sus canciones y su imagen en varias campañas muy significadas, realizadas por la publicidad comercial en las últimas décadas.

  12. Effect of harvest time and field retting duration on the chemical composition, morphology and mechanical properties of hemp fibers

    DEFF Research Database (Denmark)

    Liu, Ming; Fernando, Dinesh; Daniel, Geoffrey

    2015-01-01

    tThe large variability in the mechanical properties of hemp fibers is an issue in relation to their use inhigh-grade composites. The objective of the present study was to determine the optimal growth stage forharvesting hemp fibers for use in composites and to evaluate the effect of field retting......% at seed maturity.A highly significant reduction in cellulose deposition in fiber cell walls was reflected by reduced fiberwall thickness with plant maturity and was related to the development and ripening of hemp seeds.A statistically significant increase in lignin deposition and a slight decrease...... in pectins in hemp fibercell walls were also noted with stem maturity. Microscopy observations and histochemical analyzescorroborated the results from the chemical analyzes and revealed variations in morphological aspectsand spatial micro-distributions of carbohydrates and lignin within the cell structure...

  13. Apelo ao consenso e impossibilidades da retórica: o caso do XI governo constitucional português

    OpenAIRE

    Lopo, Teresa Teixeira

    2016-01-01

    Resumo Neste artigo analisa-se como se formulou o apelo ao consenso no discurso pedagógico oficial do XI governo constitucional português, considerando os valores orientadores do processo de decisão e as crenças associadas ao impacto da política educativa e os seus resultados, em termos dos consensos alcançados na relação com os partidos políticos com representação parlamentar. Verificou-se ter sido uma construção retórica feliz do discurso, a desencadear, para além da concordância naturalmen...

  14. ExRET-Opt: An automated exergy/exergoeconomic simulation framework for building energy retrofit analysis and design optimisation

    International Nuclear Information System (INIS)

    García Kerdan, Iván; Raslan, Rokia; Ruyssevelt, Paul; Morillón Gálvez, David

    2017-01-01

    Highlights: • Development of a building retrofit-oriented exergoeconomic-based optimisation tool. • A new exergoeconomic cost-benefit indicator is developed for design comparison. • Thermodynamic and thermal comfort variables used as constraints and/or objectives. • Irreversibilities and exergetic cost for end-use processes are substantially reduced. • Robust methodology that should be pursued in everyday building retrofit practice. - Abstract: Energy simulation tools have a major role in the assessment of building energy retrofit (BER) measures. Exergoeconomic analysis and optimisation is a common practice in sectors such as the power generation and chemical processes, aiding engineers to obtain more energy-efficient and cost-effective energy systems designs. ExRET-Opt, a retrofit-oriented modular-based dynamic simulation framework has been developed by embedding a comprehensive exergy/exergoeconomic calculation method into a typical open-source building energy simulation tool (EnergyPlus). The aim of this paper is to show the decomposition of ExRET-Opt by presenting modules, submodules and subroutines used for the framework’s development as well as verify the outputs with existing research data. In addition, the possibility to perform multi-objective optimisation analysis based on genetic-algorithms combined with multi-criteria decision making methods was included within the simulation framework. This addition could potentiate BER design teams to perform quick exergy/exergoeconomic optimisation, in order to find opportunities for thermodynamic improvements along the building’s active and passive energy systems. The enhanced simulation framework is tested using a primary school building as a case study. Results demonstrate that the proposed simulation framework provide users with thermodynamic efficient and cost-effective designs, even under tight thermodynamic and economic constraints, suggesting its use in everyday BER practice.

  15. Book Review: Zarzo, E. (2016, Memoria Retórica y Experiencia Estética. Retórica, Estética y Educación. Madrid: Dykinson

    Directory of Open Access Journals (Sweden)

    Davide Mombelli

    2016-10-01

    Full Text Available Memoria retórica y experiencia estética. Retórica, Estética y Educación, recently published by Dykinson, is a fundamental body of research on rhetoric memory and aesthetic experience, two objects of study which, although having generated much literature separately, have not been considered in their reciprocity until now. The author, Esther Zarzo, who earned her Ph.D. in Philosophy, has published several investigations of both a theoretical and practical nature concerning the treatment and development of the faculty of memory. From among her theoretical works, standouts include “Historia, memoria y tiempo” (2015a, which addresses the relationship between memory and history from a metaphysical approach in order to explain some of the mnemonic aporiae underlying historical knowledge; and from among her work of a practical nature standouts include, “La mirada topológica” (2013, focused on the media of today's exploitation of the image, and, "The art of memory in the Digital Age"(2015b, in which different implementation strategies of the classical rhetorical techniques found in Virtual Learning Environments are considered. Regarding the investigation’s second object, the aesthetic experience, it is important to highlight the author’s editing work carried out in collaboration with Prof. Pedro Aullón de Haro of the fundamental work by Alfonso Reyes, El Deslinde(2014, whose concept of literary experience is crucial to understanding the text at hand. As Esther Zarzo explains in the introduction, the choice of such objects of study is justified by the need to analyse the epistemological consequences of the revolution produced by electronic media that enable the external storage and transmission of information, since any modifications to the way of organising and accessing content substantially affects the individual and collective experience, both in regard to knowledge and to self-knowledge, along with the experience of time. According

  16. Leerse a sí mismo: hermenéutica, política y retórica en Thomas Hobbes

    Directory of Open Access Journals (Sweden)

    María José Rossi

    2014-11-01

    Full Text Available El reconocimiento del conflicto como realidad constitutiva de lo humano y la necesidad de un cierre que pasa por la fijación de la palabra justa encuentran en Hobbes su primera formulación. El pasaje de la instancia retórico-interpretativa a la axiomático-científica se da en Leviatan a través de tres momentos: introspectivo, contractual, estadual; su despliegue permite reconocer a la hermenéutica como resorte imprescindible para la implantación de un orden político fundado en la articulación entre ser (una antropología, decir (una retórica y actuar (una praxis. El intérprete resulta así un operador clave en el ajuste de las instancias natural y político-social

  17. O enigma do espelho. A retórica do silêncio nas Confissões de Agostinho de Hipona

    OpenAIRE

    Ricardo Reali Taurisano

    2014-01-01

    Três eram as principais tarefas da retórica clássica: instruir, deleitar e mover as almas à ação. Nas Confissões, contudo, percebe-se que elas são excedidas por um emprego nada convencional dos recursos da ars, de que rhetor Agostinho era mestre, a fim de perse-guir finalidade filosófica ulterior: dizer o indizível. Trata-se do uso duma palavra retórica que se quer circular, tautócrona, oblíqua, poética, oracular e paradoxal, em sua eloquência silenciosa. Numa primeira parte, pretende-se ress...

  18. ADOPTION OF RENEWABLE ENERGY TECHNOLOGIES (RET) IN TOURISM INDUSTRY- (A CASE OF OSOGBO AND OLORUNDA LOCAL GOVERNMENT AREAS IN OSUN STATE, NIGERIA)

    OpenAIRE

    Sonubi, O.K.; Ogunjimi, A. A.; Adeyemo, A. I.

    2017-01-01

    Hotel accommodation in Nigeria is comparatively more expensive than its neighbours in the sub region of West Africa. It is one of the most expensive globally. This is attributable to its operating environment. Any sustainable means of reducing running costs would be most welcome. A study on adoption of renewable energy technologies (RET) was conducted in Osogbo and Olorunda Local Government Areas of Osun State, Nigeria. Data were obtained from registered hotels in the two local government are...

  19. Retórica de influência social e negociação, segundo poder/reconhecimento na sociedade

    Directory of Open Access Journals (Sweden)

    Edson Alves de Souza Filho

    2014-04-01

    Full Text Available Estudamos o modo de negociar a pressão provocada por personagens considerados mais ou menos poderosos/reconhecidos na sociedade perante a identificação étnica do participante. Tratamos os fenômenos segundo as teorias de influência social ou retóricas de ação social. Trabalhamos com situações simuladas de pressão para recriar experiências possíveis de interação. Participaram 207 estudantes de ensino médio de escolas públicas estaduais, identificados como negros, brancos e morenos. Os resultados indicaram retóricas/ações como recusas, aceitação e não decisão às pressões. As retóricas/ações antecipadas foram de cordialidade, interesse próprio, hostilidade, interesse do outro. Os brancos tenderam a aceitar mais a pressão de personagens poderosos e os negros, em menor proporção, a recusar. Quanto aos personagens minoritários, houve aceitação da pressão nos grupos, indicando menor controvérsia. Discutimos os resultados nos marcos da dinâmica de relações entre grupos na sociedade.

  20. Associations between RET tagSNPs and their haplotypes and susceptibility, clinical severity, and thyroid function in patients with differentiated thyroid cancer.

    Directory of Open Access Journals (Sweden)

    Caiyun He

    Full Text Available It is unclear whether common genetic variants of the RET proto-oncogene contribute to disease susceptibility, clinical severity, and thyroid function in differentiated thyroid cancer (DTC.A total of 300 DTC patients and 252 healthy controls were enrolled in this study. Seven RET tagging single nucleotide polymorphisms were genotyped using the KASPar platform.Subgroup analysis showed that concomitant thyroid benign diseases were less likely to occur in DTC subjects with the rs1799939 AG or AG plus AA genotypes (odds ratio (OR = 1.93 and 1.88, P = 0.009 and 0.011, respectively. A rare haplotype, CGGATAA, was associated statistically with a reduced risk of DTC (OR = 0.18, P = 0.001. Concerning the aggressive features of DTC, higher level of N stage was more likely to occur in subjects carrying the wild-type genotypes at rs1800860 site (for dominant model: OR = 0.48, P = 0.008. Another rare haplotype, CAAGCGT, conferred increased risk for the occurrence of distant metastasis (OR = 7.57, P = 0.009. Notably, higher thyroid stimulating hormone levels and lower parathyroid hormone levels were found in patients with rs2075912, rs2565200, and rs2742240 heterozygotes and rare homozygotes; similar results were observed between PTH levels and rs1800858.This study provided useful information on RET variants that should be subjected to further study.

  1. Delta-He, Ret-He and a New Diagnostic Plot for Differential Diagnosis and Therapy Monitoring of Patients Suffering from Various Disease-Specific Types of Anemia.

    Science.gov (United States)

    Weimann, Andreas; Cremer, Malte; Hernáiz-Driever, Pablo; Zimmermann, Mathias

    2016-01-01

    The present study was aimed to prove the usefulness of a new diagnostic plot (Hema-Plot), illustrating the relationship between the hemoglobin content of reticulocytes (Ret-He) as a marker of functional iron deficiency and the difference between the reticulocyte and erythrocyte hemoglobin content (Delta-He) as a marker of an impaired hemoglobinization of newly formed reticulocytes occurring during inflammatory processes, to differentiate between various disease-specific types of anemia. A complete blood and reticulocyte count was performed on routine EDTA blood samples from 345 patients with and without various disease-specific types of anemia using the Sysmex XN-9000 hematology analyzer: blood healthy newborns (n = 23), blood healthy adults (n = 31), patients suffering from anemia of chronic disease (ACD) due to diverse oncological, chronic inflammatory, or autoimmune diseases (total n = 138) with (n = 65) and without therapy (n = 73), patients with thalassemia and/or hemoglobinopathy (n = 18), patients with iron deficiency anemia (IDA) (n = 35), patients with a combination of ACD and IDA (n = 17), as well as patients suffering from sepsis (total n = 83) with (n = 32) and without therapy (n = 51). The results for Ret-He, Delta-He, and C-reactive protein (CRP) were statistically compared (Mann-Whitney U Test) between the particular patient groups and the diagnostic plots were drawn. Delta-Hemoglobin showed a statistically significant difference between blood healthy newborns and blood healthy adults (p ≤ 0.05), while Ret-He and C-reactive protein did not. In addition, of all three biomarkers only Delta-He showed a statistically significant difference (p ≤ 0.05) between the ACD/IDA and IDA cohort. Delta-He, Ret-He, and CRP showed a statistically significant difference between patient cohorts with and without therapy suffering from ACD, ACD/IDA, and sepsis before and after medical therapy (p ≤ 0.05). The Hema-Plot illustrated the dynamic character of Ret-He and

  2. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  3. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  4. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  5. Ciberlenguaje y principios de retórica clásica. Redes sociales: el caso Facebook

    Directory of Open Access Journals (Sweden)

    Inmaculada Berlanga

    2010-05-01

    Full Text Available Las Tecnologías de la Información y la Comunicación (TICs han propiciado cambios en las formas de comunicarnosy relacionarnos en la sociedad. Como concreción de esta nueva realidad destaca el espectacular auge alcanzadopor las redes sociales on line. El discurso oral se ve enriquecido con el lenguaje icónico y el audiovisual, privilegiadosen la cultura de hoy, por ello, esta investigación se pregunta si el discurso empleado en las redes sociales favorece elobjetivo planteado por estas plataformas tecnológicas al ayudar a compartir información. Se trata de un trabajo decampo que analiza el lenguaje, tanto de la interfaz de la red como el de los usuarios que participan en una de las redessociales más populares de hoy: Facebook. El estudio recorre las tres dimensiones del proceso comunicativo: sintáctica,semántica y pragmática y a través de pantallas se capturan otros elementos que configuran el contexto de este procesoque le confieren dinamismo y creatividad a la interacción. Se plantea la conveniencia de mirar a los personajes que alo largo de la historia han brillado en el arte de comunicar y recuperar algunos parámetros de la retórica clásica en loque atañe a la correcta construcción del discurso y a su veracidad. Finalmente, reclama planteamos algunos elementosteórico del ciberlenguaje y la necesidad de aprovechar la potencialidad que brindan las redes sociales en cuanto asu capacidad de inmediatez, intuitividad e interactividad, para humanizar la conversación con lenguajes atractivos,eficaces, cercanos y correctos.

  6. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  7. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  8. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  9. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  10. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  11. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  12. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  13. Análisis retórico-pragmático de la publicidad de cosméticos y productos de belleza en revistas femeninas

    OpenAIRE

    Jesús Alonso, Beatriz de

    2015-01-01

    Se trata de un análisis retórico-pragmático de gráficas publicitarias en revistas de moda conocidas como Vogue, Elle, Cosmopolitan, Telva y Glamour. Además, se hace un estudio de estereotipos y prototipos de la mujer en la actual sociedad y recoge una bibliografía relevante en torno a la materia. En el análisis se reflejan dos partes: una teórica y otra de imagen que explican los conceptos más relevantes del trabajo. Grado en Publicidad y Relaciones Públicas

  14. Sobre el sentimiento de vergüenza en la Ética Nicomaquea y la Retórica de Aristóteles

    OpenAIRE

    Gil Blasco, Marta

    2013-01-01

    En el siguiente estudio examinaremos el sentimiento de vergüenza desde dos planteamientos distintos formulados por Aristóteles: el de la Retórica, por una parte, y el de la Ética Nicomaquea, por otra, con la finalidad de dar cuenta de las diferencias, así como de los puntos de confluencia que existen entre ambos. Asimismo, consideraremos la intrincada conexión que existe entre la agencia humana y cuestiones tales como la voluntariedad, la responsabilidad y la culpa, así como el papel fundamen...

  15. Retórica vs. Comportamiento en las relaciones comerciales. Un análisis de las relaciones de Venezuela hacia Estados Unidos. Periodo 2007-2012

    OpenAIRE

    Osorio Quevedo, Alejandra

    2015-01-01

    El objetivo de esta monografía es analizar la incongruencia entre la retórica antiestadounidense empleada por Hugo Chávez durante su segundo mandato presidencial y las relaciones comerciales entre Venezuela y Estados Unidos, caracterizadas por la continua y considerable exportación de crudo venezolano. Por consiguiente, tras una descripción del discurso y de la política exterior del entonces mandatario, aunada a la exposición de estadísticas del comercio bilateral de crudo venezolano; se estu...

  16. Didáctica de la Literatura Comparada: Las figuras retóricas en la literatura y en otras semióticas

    Directory of Open Access Journals (Sweden)

    José Enrique Peláez Malagón

    2011-01-01

    Full Text Available Dentro del campo de la teoría literaria nos encontramos con las llamadas figuras retóricas, elemento imprescindible a la hora de abordar cualquier comentario de texto que quiera centrarse en lo estrictamente literario. Una forma de abordar este problema es utilizar la literatura comparada, esto es, buscar en la pintura, la música, el cine o la publicidad, referentes de los mismos recursos estilísticos que ayuden a comprender mejor y a asimilar toda una serie de conceptos, muchas de las veces un tanto oscuros para un alumno cuya lengua materna no es el español.

  17. Tópica de la responsabilidad. Reivindicación de la retórica para la ciudadanía moderna

    OpenAIRE

    José Luis Ramírez

    2003-01-01

    En este ensayo se parte del pensamiento de Aristóteles, para formular una tópica de la responsabilidad basada en la retórica, la lógica y la política. Tres espacios de vida en los cuales se debe desarrollar la personalidad del buen ciudadano, ése que practica el arte del correcto pensar, del bien hablar y del justo obrar. Una nueva ciudadanía social es impensable sin esos elementos que ya suponía el estagirista como necesarios e insustituibles para la concreción del...

  18. Ecletismo e retórica na filosofia brasileira: de Silvestre Pinheiro Ferreira (1769-1846) ao frei Francisco do Monte Alverne (1784-1858)

    OpenAIRE

    Duran, Maria Renata da Cruz

    2015-01-01

    Resumo Este artigo trata da filosofia eclética de Victor Cousin conforme seus repetidores brasileiros do início do século XIX: Silvestre Pinheiro Pereira e frei Francisco do Monte Alverne. O objetivo principal é estudar as relações entre o ecletismo e a retórica em prol da justificação dos limites, da dispersão e da superficialidade do debate filosófico local. Revisando as obras de Antônio Paim, Laerte Ramos de Carvalho e Maria Beatriz Nizza da Silva, destacou-se, especialmente, alguns pressu...

  19. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  20. Havde Friedman alligevel ret?

    DEFF Research Database (Denmark)

    Koch, Carsten Allan

    2005-01-01

    Den amerikanske økonom Milton Friedmans artikel om virksomheders sociale ansvar, The Social Responsibility of Business is to Increase Its Profit, er en af de mest kontroversielle bidrag til litteraturen om virksomheders ledelse og sociale ansvar. Men Friedmans artikel er, omend nok undervurderet,...... profit er til gavn for det økonomiske systems funktionsmåde, og at en uddeling af en ikketriviel andel af den vil svække denne rolle. Dette er analysens hovedresultat. Derudover præsenteres en række modifikationer til det ovenstående hovedresultat....

  1. Universelle rettigheder - oplysningstidens ret?

    DEFF Research Database (Denmark)

    Schaumburg-Müller, Sten

    2007-01-01

    Ideen om universelle rettigheder er ældre end Oplysningstiden, men i perioden blev universelle rettigheder gennemført i USA og Frankrig, ligesom perioden indeholdt kritik af forestillingen om universelle rettigheder.......Ideen om universelle rettigheder er ældre end Oplysningstiden, men i perioden blev universelle rettigheder gennemført i USA og Frankrig, ligesom perioden indeholdt kritik af forestillingen om universelle rettigheder....

  2. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  3. Caminhos retóricos e sorrisos incômodos : argumentação e humor em "A encalhada", de Ingrid Guimarães e Aloísio Abre

    OpenAIRE

    Ferraz, Luana

    2015-01-01

    Esta dissertação aborda a construção retórica da comicidade em peças teatrais. Para tanto, propõe a investigação das estratégias retóricas que enfatizam o efeito cômico no esquete “A encalhada”, de Ingrid Guimarães e Aloísio de Abreu – uma das nove cenas que compõem o espetáculo Cócegas (EMI, 2004), interpretado pelas atrizes brasileiras Heloísa Périssé e Ingrid Guimarães. O embasamento teórico para este trabalho é fornecido, principalmente, pelos tratados da Retórica Antiga...

  4. Tendencias de la Comunicación del Tercer Sector en la web 2.0: Análisis retórico de los tropos

    Directory of Open Access Journals (Sweden)

    Isidoro Arroyo Almaraz

    2013-08-01

    Full Text Available Los grandes éxitos de determinados mensajes a través de las redes sociales han hecho que este nuevo “medio” se vea como un modelo muy interesante para el Tercer Sector. En este artículo llevamos a cabo el análisis de aspectos formales y de contenido de las comunicaciones del Tercer Sector en las redes sociales y se determinan las tendencias que se repiten  destacando, entre otros,  el uso retórico de los tropos. Se percibe una tendencia hacia la similitud de los mensajes estudiados en sus aspectos narrativos, expresivos, persuasivos y retóricos. Los mensajes de carácter social distribuidos a través de las redes sociales muestran, en su construcción, perfiles uniformes y homogéneos en sus aspectos formales. Se concluye que utilizan las mismas piezas ya usadas en otros medios por lo que se infiere que no piensan en las bondades de las redes sociales para aprovechar los recursos específicos de éstas.  

  5. Analysis of RET promoter CpG island methylation using methylation-specific PCR (MSP), pyrosequencing, and methylation-sensitive high-resolution melting (MS-HRM): impact on stage II colon cancer patient outcome.

    Science.gov (United States)

    Draht, Muriel X G; Smits, Kim M; Jooste, Valérie; Tournier, Benjamin; Vervoort, Martijn; Ramaekers, Chantal; Chapusot, Caroline; Weijenberg, Matty P; van Engeland, Manon; Melotte, Veerle

    2016-01-01

    Already since the 1990s, promoter CpG island methylation markers have been considered promising diagnostic, prognostic, and predictive cancer biomarkers. However, so far, only a limited number of DNA methylation markers have been introduced into clinical practice. One reason why the vast majority of methylation markers do not translate into clinical applications is lack of independent validation of methylation markers, often caused by differences in methylation analysis techniques. We recently described RET promoter CpG island methylation as a potential prognostic marker in stage II colorectal cancer (CRC) patients of two independent series. In the current study, we analyzed the RET promoter CpG island methylation of 241 stage II colon cancer patients by direct methylation-specific PCR (MSP), nested-MSP, pyrosequencing, and methylation-sensitive high-resolution melting (MS-HRM). All primers were designed as close as possible to the same genomic region. In order to investigate the effect of different DNA methylation assays on patient outcome, we assessed the clinical sensitivity and specificity as well as the association of RET methylation with overall survival for three and five years of follow-up. Using direct-MSP and nested-MSP, 12.0 % (25/209) and 29.6 % (71/240) of the patients showed RET promoter CpG island methylation. Methylation frequencies detected by pyrosequencing were related to the threshold for positivity that defined RET methylation. Methylation frequencies obtained by pyrosequencing (threshold for positivity at 20 %) and MS-HRM were 13.3 % (32/240) and 13.8 % (33/239), respectively. The pyrosequencing threshold for positivity of 20 % showed the best correlation with MS-HRM and direct-MSP results. Nested-MSP detected RET promoter CpG island methylation in deceased patients with a higher sensitivity (33.1 %) compared to direct-MSP (10.7 %), pyrosequencing (14.4 %), and MS-HRM (15.4 %). While RET methylation frequencies detected by nested

  6. Key Facts about Tularemia

    Science.gov (United States)

    ... Submit What's this? Submit Button Key Facts About Tularemia Recommend on Facebook Tweet Share Compartir This fact ... and Prevention (CDC) Tularemia Web site . What is Tularemia? Tularemia is a potentially serious illness that occurs ...

  7. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  8. The Key Lake project

    International Nuclear Information System (INIS)

    Glattes, G.

    1985-01-01

    Aspects of project financing for the share of the Canadian subsidiary of Uranerzbergbau-GmbH, Bonn, in the uranium mining and milling facility at Key Lake, Saskatchewan, by a Canadian bank syndicate. (orig.) [de

  9. Differential expression of galectin-3, CK19, HBME1, and Ret oncoprotein in the diagnosis of thyroid neoplasms by fine needle aspiration biopsy

    Directory of Open Access Journals (Sweden)

    Saleh Husain

    2009-01-01

    Full Text Available Background: Fine needle aspiration biopsy (FNAB is a common and excellent procedure for the evaluation of thyroid lesions that require surgical resection. At times, the FNAB diagnosis can be difficult, particularly of follicular-patterned lesions. Previous studies have shown that some immunohistochemical (IHC markers may be helpful in establishing more accurate diagnosis. In this study, our goal was to evaluate four of the recently investigated markers in differentiating benign from malignant thyroid nodules on FNABs. Materials and Methods: We performed IHC staining of galectin-3, Ret oncoprotein (Ret, HBME-1, and cytokeratin 19 (CK19, on cell block sections of thyroid FNAB cases that had corresponding surgical resections. They included 44 benign lesions (37 hyperplastic or cellular nodules, HN; and 7 follicular adenomas, FA and 27 malignant tumors (6 follicular carcinoma, FC; 19 classic papillary carcinoma, PTC; and 2 follicular variant of papillary carcinoma, FVPC. The stains were done according to the standard avidin-biotin-peroxidase method. Results: Statistical analysis showed that immunoexpression was significantly higher in the malignant group for all four markers. The sensitivity for positive expression for all benign lesions versus malignant tumors was as follows: 10/44 (22.7% versus 25/27 (92.6% for galectin-3; 14/44 (31.8% versus 23/27 (85% for Ret; 12/44 (27.3% versus 24/27 (88.8% for HBME-1; and 13/44 (29.5% versus 23/27 (85% for CK19. The sensitivity and specificity was highest for galectin-3 (92.6% and 77.3%, respectively followed by HMBE-1 (88.9% and 72.7%, respectively. When combining the markers′ expressions, the panel of galectin-3 + HBME-1 showed the highest sensitivity and specificity (90.7% and 75%, respectively, but this was, however, lower than galectin-3 alone (92.3% and 77.3%, respectively. Conclusion: We conclude that galectin-3 is the best single marker in differentiating benign from malignant thyroid lesions with

  10. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  11. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  12. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  13. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  14. Turn key contracts

    International Nuclear Information System (INIS)

    Feretic, D.

    1975-01-01

    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW) [de

  15. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  16. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  17. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  18. Mutation analysis of the RET proto-oncogene in Dutch families with MEN 2A, MEN 2B and FMTC : Two novel mutations and one de novo mutation for MEN 2A

    NARCIS (Netherlands)

    Landsvater, RM; Jansen, RPM; Hofstra, RMW; Buys, CHCM; Lips, CJM; vanAmstel, HKP

    Hereditary C-cell carcinoma is encountered in multiple endocrine neoplasia type 2A (MEN 2A), MEN 2B, and familial medullary thyroid carcinoma (FMTC). Mutations of the RET proto-oncogene are associated with all three diseases. To obtain an insight into the molecular heterogeneity of MEN 2 syndromes

  19. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  20. Risøs årsrapport 2005. Opfølgning på planerne for året 2005

    DEFF Research Database (Denmark)

    2006-01-01

    Risøs årsrapport 2005 er en opfølgning på planerne for Risøs virksomhed i 2005. Risøs bestyrelse skal som led i resultatkontrakten med Ministeriet for Videnskab, Teknologi og Udvikling aflægge årlige rapporter om opfyldelsen af de fastlagte resultatkrav.Nærværende rapport indeholder data til brug...... for denne vurdering. Derudover gives et billede af Risøs økonomi og faglige aktiviteter, der relateres til Risøs mission, vision og strategi. Rapportering af årets resultater er baseret på det interneplanlægnings- og opfølgningssystem, og rapporten er opbygget efter Økonomistyrelsens nye koncept...... for årsrapporter....

  1. Le système de sûreté lyonnais selon les arrêtés du 6 décembre 1833

    Directory of Open Access Journals (Sweden)

    Amos Frappa

    2010-01-01

    Full Text Available Le 6 décembre 1833, le maire de Lyon Gabriel Prunelle adopte trois arrêtés instaurant un service de sûreté. Il s’agit de la seconde ville française à se doter d’un groupe de policiers spécialisé dans la recherche et l’arrestation des malfaiteurs. Un an plus tôt, le préfet de police Gisquet met à profit l’expérience de «  la Rousse », surnom donné à la brigade de l’ancien bagnard Vidocq, pour équiper la capitale d’une telle structure. Le premier des textes du 6 décembre 1833 fixe les attributi...

  2. RET/PTC and PAX8/PPARγ chromosomal rearrangements in post-Chernobyl thyroid cancer and their association with I-131 radiation dose and other characteristics

    Science.gov (United States)

    Leeman-Neill, Rebecca J.; Brenner, Alina V.; Little, Mark P.; Bogdanova, Tetiana I.; Hatch, Maureen; Zurnadzy, Liudmyla Y.; Mabuchi, Kiyohiko; Tronko, Mykola D.; Nikiforov, Yuri E.

    2012-01-01

    Background Childhood exposure to I-131 from the 1986 Chernobyl accident led to a sharp increase in papillary thyroid carcinoma (PTC) incidence in regions surrounding the reactor. Data concerning the association between genetic mutations in PTCs and individual radiation doses are limited. Methods We performed mutational analysis of 62 PTCs diagnosed in a Ukrainian cohort of patients who were Chernobyl tumors and show different associations for point mutations and chromosomal rearrangements with I-131 dose and other factors. These data support the relationship between chromosomal rearrangements, but not point mutations, and I-131 exposure and point to a possible role of iodine deficiency in generation of RET/PTC rearrangements in these patients. PMID:23436219

  3. Detection of PAX8/PPARG and RET/PTC Rearrangements Is Feasible in Routine Air-Dried Fine Needle Aspiration Smears

    DEFF Research Database (Denmark)

    Ferraz, Carolina; Rehfeld, Christian; Krogdahl, Annelise

    2012-01-01

    Background: The diagnostic limitations of fine needle aspiration (FNA), like the indeterminate category, can be partially overcome by molecular analysis. As PAX8/PPARG and RET/PTC rearrangements have been detected in follicular thyroid carcinomas (FTCs) and papillary thyroid carcinomas (PTCs......), their detection in FNA smears could improve the FNA diagnosis. To date, these rearrangements have never been analyzed in routine air-dried FNA smears, but only in frozen tissue, formalin-fixed paraffin-embedded (FFPE) tissue, and in fresh FNA material. Fixed routine air-dried FNA samples have hitherto been judged...... as generally not suitable for testing these rearrangements in a clinical setting. Therefore, the objective of the present study was to investigate the feasibility of extracting RNA from routine air-dried FNA smears for the detection of these rearrangements with real-time polymerase chain reaction (RT...

  4. The history of NATO TNF policy: The role of studies, analysis and exercises conference proceedings. Volume 3: Papers by Gen. Robert C. Richardson III (Ret.)

    Energy Technology Data Exchange (ETDEWEB)

    Rinne, R.L. [ed.

    1994-02-01

    This conference was organized to study and analyze the role of simulation, analysis, modeling, and exercises in the history of NATO policy. The premise was not that the results of past studies will apply to future policy, but rather that understanding what influenced the decision process-and how-would be of value. The structure of the conference was built around discussion panels. The panels were augmented by a series of papers and presentations focusing on particular TNF events, issues, studies, or exercises. The conference proceedings consist of three volumes. Volume 1 contains the conference introduction, agenda, biographical sketches of principal participants, and analytical summary of the presentations and discussion panels. Volume 2 contains a short introduction and the papers and presentations from the conference. This volume contains selected papers by Brig. Gen. Robert C. Richardson III (Ret.).

  5. A newly detected mutation of the RET protooncogene in exon 8 as a cause of multiple endocrine neoplasia type 2A.

    Science.gov (United States)

    Bethanis, Sotirios; Koutsodontis, George; Palouka, Theodosia; Avgoustis, Christos; Yannoukakos, Drakoulis; Bei, Thalia; Papadopoulos, Savas; Linos, Dimitrios; Tsagarakis, Stylianos

    2007-01-01

    Multiple endocrine neoplasia type 2A (MEN2A) is a syndrome of familial neoplasias characterized by medullary thyroid carcinoma (MTC), pheochromocytoma and hyperplasia of the parathyroid glands. RET protooncogene mutations are responsible for MEN 2A. Mutations in exons 10 or 11 have been identified in more than 96% of patients with MEN 2A. We herein report for the first time a patient with MEN 2A harboring a mutation (Gly(533)Cys) in exon 8. A 66-year old male patient was referred to our department for bilateral adrenal nodules. The patient's family history was remarkable in that his mother had pheochromocytoma. Biochemical evaluation and findings of the magnetic resonance imaging of the adrenals were compatible with the diagnosis of bilateral pheochromocytomas. The patient underwent laparoscopic bilateral adrenalectomy and histological examination confirmed the preoperative diagnosis of pheochromocytoma. Absence of phenotypic characteristics of VHL or NF1 and elevated calcitonin levels both basal and post pentagastrin stimulation, raised the possibility of MEN 2A syndrome. Total thyroidectomy was performed and histological examination showed the presence of MTC. Direct sequencing of exon 8 from the patient's genomic DNA revealed the mutation c.1,597G-->T (Gly533Cys). Although this missense point mutation has been associated with familial MTC (FMTC), to the best of our knowledge mutations in exon 8 have not previously been identified in patients with MEN 2A. In conclusion, in patients with clinical suspicion of MEN 2A syndrome, analysis of RET exon 8 should be considered when the routine evaluation of MEN 2A-associated mutations is negative. Furthermore, patients with FMTC and exon 8 mutations should also be screened for pheochromocytoma.

  6. La articulación retórico-estilística de las perífrasis verbales de infinitivo y gerundio en "Pedro Páramo"

    Directory of Open Access Journals (Sweden)

    Adriana Ávila-Figueroa

    2012-07-01

    Full Text Available ResumenEl tema de las perífrasis verbales es uno de los más complejos y debatidos en la tradición gramatical. Las descripciones propuestas en las gramáticas y estudios dedicados al tema de las perífrasis verbales explican principalmente tres valores: temporal, aspectual y modal. Gómez Torregop señala que entre estos valores es posible añadir el estilístico. El propósito de este trabajo es describir el uso de las perífrasis verbales de infinitivo y gerundio en la novela mexicana "Pedro Páramo" de Juan Rulfo y su articulación retórico-estilística.Palabras clave: figuras retóricas, perífrasis verbales, estilística, infinitivo y gerundio.AbstractThe verbal periphrasis is one of the more complex and debated topics in the grammatical tradition. The current descriptions proposed by the main reference grammars as well as by most of the works dedicated to the verbal periphrasis explain three main values: temporal, aspectual and modal. Gómez Torrego points that between these values is possible to add the stylistic one. The purpose of this article is to describe the use of the infinite and gerundive verbal periphrasis in the mexican novel "Pedro Páramo" by Juan Rulfo and its rhetorical and stylistic articulation.Keywords: rhetorical figures, verbal periphrasis, stylistics, infinitive and gerundive.

  7. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  8. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  9. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  10. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  11. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  12. Key figures. Year 2006

    International Nuclear Information System (INIS)

    2006-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2006. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  13. Key figures. Year 2005

    International Nuclear Information System (INIS)

    2005-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2005. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  14. A rare mutation in the RET-protooncogen associated with mixed medullary-follicular micro-carcinoma of the thyroid gland

    Energy Technology Data Exchange (ETDEWEB)

    Richter, K.; Huwe, A.; Boldt, H.; Dresel, S. [Nuklearmedizinische Klinik, HELIOS-Klinikum Berlin-Buch (Germany); Geipel, D. [St.-Hedwig-Krankenhaus, Bereich Endokrine Chirurgie (Germany); Mairinger, T. [Inst. fuer Pathologie, HELIOS-Klinikum Emil von Behring (Germany); Schwabe, M. [Inst. fuer Pathologie, Charite Berlin Campus Mitte (Germany)

    2008-07-01

    Medullary thyroid carcinoma (MTC) arises from parafollicular C-cells of the thyroid and accounts for 1% to 10% of all thyroid cancers (1). MTC can be sporadic or hereditary. Hereditary MTC represents 20% to 30% of all MTC with an autosomal dominant pattern of transmission and a high degree of penetrance (>90%). It can be transmitted as a single entity (sporadic), familial MTC (FMTC), or it can arise as part of a multiple endocrine neoplasia (MEN) syndrome type 2A or 2B. Both genders are equally affected. (1, 9) The identification of hereditary MTC has been facilitated in recent years by the direct analysis of germline point mutations of the RET(rearranged during transfection)-protooncogene, a 21 exon gene that encodes a plasma membrane-bound tyrosine kinase receptor, localised on chromosome 10q11.2, which is expressed in tissues derived from the neural crest. To date codon mutations in nine different exons were identified (7, 8, 16, 22, 29) causing MEN 2A (MTC in combination with pheochromocytoma and hyperparathyroidism, including rare variants with Hirschsprung's disease and cutaneous lichen amyloidosis), FMTC (MTC as a sole disease phenotype) and MEN 2B (MTC in combination with pheochromocytoma, multiple mucosa neuromas, and marfanoid habitus). The most common mutation, accounting for over 80% of all mutations associated with MEN 2A (or Sipple's) syndrome affects codon 634 in exon 11 of the RET-protooncogene. Other mutations affect codon 630 in exon 11, and codons 609, 611, 618, 620 in exon 10 - they also cause FMTC, although some have a classic MEN 2A syndrome. 5% to 10% of families with FMTC have mutations that affect codons 768, 790, 791 in exon 13: codons 804, 844 in exon 14, and codon 891 in exon 15 (3, 4, 10). The much more aggressive MEN 2B is caused by a single mutation converting a methionine into a threonine at codon 918 in exon 16, and has been identified in approximately 95% of patients with MEN 2B. Other rare mutations associated with MEN 2

  15. A retórica da reeleição: mapeando os discursos dos Programas Eleitorais (HGPE em 1998 e 2006

    Directory of Open Access Journals (Sweden)

    Mônica Machado

    2009-06-01

    Full Text Available O artigo avalia a produção dos discursos do HGPE na TV dos partidos de dois candidatos à reeleição para a Presidência da República: Fernando Henrique (PSDB em 1998 e Luiz Inácio Lula da Silva (PT em 2006. É objeto de reflexão indagar até que ponto as campanhas orientadas para reconduzir o mandatário ao poder têm estruturas estratégicas discursivas similares nos dois contextos, apesar de inscrições partidárias e orientações políticas distintas. Como metodologia, utiliza procedimentos para entender os elementos retóricos de cada campanha e apreender as estratégias de persuasão. Nota-se que o estímulo ao voto retrospectivo, o discurso a favor da continuidade da gestão administrativa, o lugar de autoridade do candidato-Presidente e a ênfase em discurso programático de cunho econômico são enunciados proferidos pelos mandatários nos dois contextos. É lícito supor, então, que a retórica da reeleição favorece posições privilegiadas na disputa.The article evaluates the production of the speeches of electoral advertising in TV of the two presidential candidates: Fernando Henrique (PSDB in 1998 and Luis Inácio Lula of Silva (PT in 2006. Therefore, the point is to investigate to what extent the campaigns show discursive strategic structures - similar in the two contexts - in spite of supporting registrations and different political orientations. The methodology uses procedures to understand the rhetorical elements of each campaign and persuasion strategies. In both campaigns one observes the incentive to the retrospective vote, the speech in favor of the continuity of the administration, the place of the candidate-president's authority, the emphasis in speech of economical issues. One can suggest that the rhetoric of the reelection favors positions in the electoral dispute.

  16. Smooth Phase Interpolated Keying

    Science.gov (United States)

    Borah, Deva K.

    2007-01-01

    Smooth phase interpolated keying (SPIK) is an improved method of computing smooth phase-modulation waveforms for radio communication systems that convey digital information. SPIK is applicable to a variety of phase-shift-keying (PSK) modulation schemes, including quaternary PSK (QPSK), octonary PSK (8PSK), and 16PSK. In comparison with a related prior method, SPIK offers advantages of better performance and less complexity of implementation. In a PSK scheme, the underlying information waveform that one seeks to convey consists of discrete rectangular steps, but the spectral width of such a waveform is excessive for practical radio communication. Therefore, the problem is to smooth the step phase waveform in such a manner as to maintain power and bandwidth efficiency without incurring an unacceptably large error rate and without introducing undesired variations in the amplitude of the affected radio signal. Although the ideal constellation of PSK phasor points does not cause amplitude variations, filtering of the modulation waveform (in which, typically, a rectangular pulse is converted to a square-root raised cosine pulse) causes amplitude fluctuations. If a power-efficient nonlinear amplifier is used in the radio communication system, the fluctuating-amplitude signal can undergo significant spectral regrowth, thus compromising the bandwidth efficiency of the system. In the related prior method, one seeks to solve the problem in a procedure that comprises two major steps: phase-value generation and phase interpolation. SPIK follows the two-step approach of the related prior method, but the details of the steps are different. In the phase-value-generation step, the phase values of symbols in the PSK constellation are determined by a phase function that is said to be maximally smooth and that is chosen to minimize the spectral spread of the modulated signal. In this step, the constellation is divided into two groups by assigning, to information symbols, phase values

  17. Retórica clásica y redes on line: dos realidades convergentes y análogas. Perspectivas y prospectivas de 9 expertos en Comunicación

    Directory of Open Access Journals (Sweden)

    Inma Berlanga

    2013-01-01

    Full Text Available El presente trabajo pretende probar la relación entre la retórica clásica y las redes sociales on line como realidades convergentes y análogas, así como las sinergias que entre ellas se establecen en aras de una comunicación más persuasiva y eficaz. Para este objetivo se sirve de la técnica cualitativa de la entrevista en profundidad a expertos en el tema, que resellen nuestra hipótesis sobre estas mutuas transferencias. En un momento de éxtasis de la comunicación, mediado por el boom de las redes on line, redescubrir los principios retóricos originales puede ser de alta pertinencia a fin de devolver a la comunicación su faceta más humana y creativa.

  18. Traducción y educación para la comunicación social: el ejercicio de la traducción en la instrucción retórica

    OpenAIRE

    Chico Rico, Francisco

    2008-01-01

    Este trabajo de investigación se centra fundamentalmente en los debates disciplinares latinos en torno a la traducción y a su importancia para la formación del orador en particular y para la educación para la comunicación social en general. En este contexto se aborda el ejercicio de la traducción tanto en el marco de la teoría retórica como en el dominio de la teoría gramatical, así como en el seno de las relaciones entre aquél y éste, ya que si la teoría retórica consideró la traducción fund...

  19. Opfyldelsesværnetinget for løsørekøb i europæisk ret

    DEFF Research Database (Denmark)

    Steensgaard, Kasper

    2012-01-01

    Med indførelsen af Bruxelles I-forordningen skete der et afgørende skift i reguleringen og fortolkningen af opfyldelsesværneting i europæisk procesret. I køb af løsøre og tjenesteydelser skal stedet for opfyldelse i procesretlig henseende nu fastlægges efter en autonom EU-retlig regel. Efter en...... årrække med usikkerhed om, hvilken retsstilling den nye regel medførte, har EU-domstolen med afgørelsen i Car Trim v KeySafety Systems forsøgt at komme med en afklaring - det er imidlertid kun lykkedes delvist....

  20. Estratégias Retóricas de Legitimação nos Relatórios da Administração: Respostas ao Movimento Antitabagista

    Directory of Open Access Journals (Sweden)

    Susana Cipriano Dias Raffaelli

    2017-05-01

    Full Text Available O movimento antitabagista brasileiro impulsionou o desenvolvimento de peças regulatórias que desafiaram a legitimidade das empresas do setor. As organizações podem adotar ações estratégicas retóricas, visando ganhar, manter ou recuperar legitimidade. Tais ações são evidenciadas em Relatórios da Administração (RA por se caracterizarem como instrumentos de comunicação social. Desse modo, o presente artigo almeja identificar como a empresa líder do setor tabagista, a Souza Cruz S/A, utilizou os conteúdos dos RAs como instrumento de estratégia retórica de legitimação, no período de 1986 a 2012. O Institucionalismo Organizacional foi utilizado como referencial teórico, e a metodologia para tratamento dos dados foi a análise de conteúdo. Evidenciou-se que a Souza Cruz S/A empreendeu esforços para manter sua legitimidade no período analisado, intensificando o uso de apelos retóricos (ethos, pathos e logos em defesa dos argumentos: (a fumar é uma escolha racional adulta; (b a legislação favorece o comércio ilegal de cigarros; e (c as atividades da empresa beneficiam a sociedade. Assim, este trabalho destaca os RAs como fonte de análise em estudos organizacionais, evidencia a retórica como possibilidade estratégica e propícia aos gestores reflexões acerca da influência do ambiente nas estratégias organizacionais.

  1. As necessidades e os desejos na formação discursiva do marketing: base consistente ou retórica legitimadora?

    Directory of Open Access Journals (Sweden)

    Vinícius Andrade Brei

    Full Text Available Neste artigo realizamos uma análise crítica da gênese histórica da área de marketing até sua constituição atual, com um foco principal: verificar se as necessidades e os desejos dos clientes são base consistente da formação histórica, discursiva, do marketing ou, apenas, retórica legitimadora para a atuação da área. Adotamos uma orientação filosófico-epistemológica baseada na teoria do discurso proposta por Michel Foucault, que nos permitiu constatar que a centralidade das necessidades e dos desejos dos clientes no discurso contemporâneo do marketing é resultado de uma série de transformações e disputas históricas pela hegemonia de uma determinada idéia ou ponto de vista, mas sempre ancorada em condições socioeconômicas, ambientais, favoráveis às transformações ocorridas. Em outras palavras, concluímos que as transformações discursivas, constituintes da área, foram o resultado de um processo produzido social e historicamente, tendo ocorrido muito mais como um resultado de mudanças na economia e no mundo empresarial do que como uma espécie de "vocação" natural do marketing.

  2. Entre la retórica legal y eclesiástica:una misión antiesclavista en el siglo XVII

    Directory of Open Access Journals (Sweden)

    Rebeca Moreno Orama

    2015-06-01

    Full Text Available En 1537 la Iglesia prohibió la esclavitud de los amerindios, y no sería sino hasta 1839 que hiciera lo mismo con la esclavitud africana. Entre los siglos entre una postura a la otra, la impugnación religiosa de la esclavitud africana estuvo en manos de unos cuantos misioneros. Este trabajo discute cómo a través del empleo de la retórica legal y eclesiástica, el capuchino Francisco José de Jaca construye en su Resolución (La Habana, 1681un proyecto misionero alterno, centrado en la denuncia del cuerpo católico envuelto en la esclavitud y no en la evangelización de los africanos. In 1537 the Catholic Church prohibited Amerindian slavery, but not until 1839 would they do the same with African slavery. Between the centuries that span from one position to the other, religious condemnation of African slavery was in the hands of but a few missionaries. This work discusses how, through the employment of legal and ecclesiastic rhetoric, the Capuchin monk Francisco José de Jaca constructs in his Resolución (Havana, 1681 an alternative missionary project, focused on the denunciation of the Catholic body involved in the slavery institution and not on the evangelization of Africans.

  3. ¿Qué significa estar bien informado? Retóricas, percepciones y actitudes ante el problema del etiquetado de los alimentos transgénicos

    Directory of Open Access Journals (Sweden)

    JÓSEAN LARRIÓN

    2016-01-01

    Full Text Available En este trabajo realizo un estudio de caso de la controversia sobre el etiquetado de los alimentos transgénicos, centrándome en España y la Unión Europea. Inicialmente, comparo los discursos sociales que conciben el etiquetado fundamentalmente como un problema o como una solución. Después, analizo las principales respuestas legislativas y los aspectos concretos que en este ámbito siguen siendo polémicos. A continuación, expongo los límites del modelo del déficit cognitivo y el problema de establecer qué información es relevante o irrelevante. El trabajo concluye mostrando la presencia de las retóricas de la seguridad y el riesgo, y proponiendo un esquema de posiciones sociales ante el consumo de transgénicos, su etiquetado diferencial y el quehacer científico en nuestras sociedades.

  4. A trapaça e os trapaceiros: algumas sugestões para uma abordagem retórica dos gêneros do discurso

    Directory of Open Access Journals (Sweden)

    Marco Antônio Gutierrez

    2010-07-01

    Full Text Available http://dx.doi.org/10.5007/1807-9288.2008v4n2p33 A correspondência indesejada (spam representa na melhor hipótese um incômodo e, na pior, um risco à segurança e à privacidade dos usuários. No entanto, trata-se de fenômeno típico do uso massivo da Internet e só isso parece-nos suficiente para indicar a necessidade de sua compreensão. O presente artigo aborda uma das categorias mais insidiosas desse tipo de correspondência – as mensagens de Cavalo de Tróia, elaboradas por criminosos com o objetivo de instalar programas maliciosos nos computadores de usuários incautos. Nossa abordagem, porém, será eminentemente retórica, buscando compreender o fenômeno como um jogo argumentativo, como parte de um contexto mais amplo destinado a situar e categorizar gêneros emergentes do discurso em meio digital.

  5. Las jerarquías étnicas y la retórica del multiculturalismo estatal en San José del Guaviare

    Directory of Open Access Journals (Sweden)

    Carlos del Cairo

    2011-01-01

    Full Text Available Este artículo analiza las tensiones entre las jerarquías étnicas en San José del Guaviare y la valoración positiva de la diversidad cultural que introdujo la retórica del multiculturalismo estatal. En particular, describe la posición diferencial que ocupa la gente jiw, tucano y nukak de acuerdo con las jerarquías elaboradas por los "blancos" del pueblo, los tucanos y los funcionarios estatales. Las características de estas jerarquías permiten cuestionar tres reduccionismos constitutivos del multiculturalismo estatal colombiano, a saber, la presunción de la unidad en la diversidad étnica, la esencialización de la diferencia cultural y la reificación de la comunidad. El artículo destaca la importancia de analizar las percepciones sobre la diferencia cultural en procesos que van más allá de la formalidad multicultural que exaltan las instituciones estatales.

  6. Retórica y divulgación científica. Una propuesta para la web de empresas biotecnológicas

    Directory of Open Access Journals (Sweden)

    María Luisa García Hernández

    2017-03-01

    Full Text Available La retórica como teoría de la argumentación y de la persuasión se relaciona con un modo específico de enfocar la divulgación científica, que ya no se concibe como mera alfabetización, sino como un diálogo. Tal cambio implica la participación activa de la sociedad en la toma de decisiones sobre la orientación de la ciencia. Con ese marco, entendemos que empresas como las biotecnológicas, cuya actividad despierta entre la ciudadanía filias y fobias que pueden marcar su devenir, deben tomar un papel activo en esas conversaciones. Sobre ese planteamiento hemos seleccionado una muestra constituida por pymes biotecnológicas asentadas en cuatro parques tecnológicos de Andalucía. Hemos analizado los textos de las páginas de inicio de 29 pymes; porque entendemos que esos relatos, propios y no intermediados, nos permiten conocer si consideran a la ciudadanía como auditorio de interés al que dirigirse, primer paso para hacer de la divulgación el eje de su comunicación corporativa. La respuesta es negativa.

  7. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  8. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  9. Análisis de retóricas políticas y periodísticas a raíz de las elecciones presidenciales colombianas de 2006

    Directory of Open Access Journals (Sweden)

    Adriana María Ángel Botero

    2008-01-01

    Full Text Available Se analizan las retóricas empleadas por los candidatos a la Presidencia de la República de Colombia en la campaña electoral de 2006 y las de los periodistas que los entrevistaron a través de las cadenas radiales con mayor audiencia nacional. Para dar cuenta de las retóricas se recurre a los planteamientos de Bourdieu y a las categorías de análisis de conversación propuestas por Potter y Verón. Una vez realizados los análisis intra y extradiscursivo a las entrevistas radiales, se explican los mecanismos a partir de los cuales los periodistas construyen su discurso basándose en retóricas como las de la objetividad, y el maniqueísmo; y se exponen las características a través de las cuales los políticos configuran un discurso basado en la estructura del relato.

  10. Metáfora: a funcionalidade do tropo na articulação da retórica e da filosofia na mundividência renascentista

    Directory of Open Access Journals (Sweden)

    Ana C. Martins

    2009-12-01

    Full Text Available Desde os fundamentos aristotélicos que o processo de metapherein, assente na similitudo e transferência semântica, concilia, de forma promissora, a argumentação retórica e a problematização filosófica, forma e conteúdo, res et uerba. Os humanistas quinhentistas, fiéis a esta indissociabilidade e na esteira do ideal de imitativo e aemulatio do legado da Antiguidade Clássica, rentabilizaram as virtualidades e potencialidades da metáfora, convertendo o tropo num instrumento de pedagogia, de génese e criação literárias. A historiografia renascentista é pejada, por isso, de tratados e colectâneas, repositórios enciclopédicos de sentenças morais, que estão a serviço da formação integral e que espelham um escrupuloso e afincado trabalho filológico. O homem renascentista é, assim, instigado a reflectir sobre a sua natura, diante da sua condição dual, dos seus vícios e virtudes, das suas forças e fragilidades, e a leitura metafórica ajuda-o, neste sentido, a redimensionar o mundo e a projectarse nele, a representar, a conhecer e a descobrir(-se na sua condição polimórfica, nas suas misérias e nos seus sonhos.

  11. La (reconstrucció visual i retòrica de Jaume I a la Festa de l’Estendard de Mallorca durant l’època foral

    Directory of Open Access Journals (Sweden)

    Francesc Granell Sales

    2017-06-01

    Full Text Available Resum: L’article pretén adverar de quina manera es configurava i s’identificava la figura del rei en Jaume a la Festa de l’Estendard, la commemoració anual de la conquesta cristiana de la ciutat de Mallorca, mitjançant l’anàlisi dels elements visuals i retòrics planificats per al desenvolupament d’aquella. Cal parar atenció, concretament, a dos d’aquests elements: el portaestandard que anava a cavall ben abillat amb armadura i altres objectes i l’eloqüent prèdica –coneguda com el Sermó de la Conquesta– que pronunciava un clergue acreditat per a tal funció.   Paraules clau: Jaume I, imatge règia, festes de la Baixa Edat Mitjana, iconografia del poder, Regne de Mallorca Abstract: This paper attempts to discuss the manner in which the image of king James I was customized and established in the Festa de l’Estendard, the annual commemoration ceremony of the christian conquest of the city of Mallorca. We will do so through an analysis of the visual and rhetorical elements planned for the unfolding of the ritual. One should focus particular attention on two of these elements: the standard bearer on horseback well attired in armour and other objects and the speech known as the «Sermó de la Conquesta» delivered by a cleric. Keywords: James I of Aragon, Royal Image, Late Medieval Ceremonies, Iconography of Power, Kingdom of Mallorca

  12. Argumentos Comestibles. La construcción retórica de la percepción pública de los alimentos transgénicos

    Directory of Open Access Journals (Sweden)

    Herrera Racionero, Paloma

    2005-04-01

    Full Text Available The main goal of this paper is to analyze how the difíerent types of reasons are constructed in order to créate one public perception or another about genetically modified food. Despite the apparent newness of this kind of foods, these reasons can be assimilated to two fiindamental discourse formations with ampie presence in all the scientific discoveríes. When modelling our analysis on these two rhetorical strategies —that we called 'illustrate' and 'romantic'— the latent presuppositions of the social agents considered and the preconceptions that these agents try to induce in the public opinión are shown. It is also shown a series of important shades and directions that usually escape to the more common analysis in terms of 'pros' and 'cons' genetically modified food.

    El objetivo de este trabajo es analizar cómo se construyen los diferentes tipos de argumentos orientados a crear una u otra percepción pública de los alimentos transgénicos. No obstante la aparente novedad de este tipo de alimentos, dichos argumentos pueden asimilarse a dos tipos fundamentales de formaciones discursdivas de amplia tradición ante las diferentes aportaciones de la ciencia. Al modelar nuestro análisis sobre estas dos estrategias retóricas —que llamamos ilustrada y romántica—se ponen de manifiesto los presupuestos latentes de los agentes sociales y las preconcepciones que estos agentes tratan de inducir en la opinión pública, así como una serie de importantes matices y orientaciones que suelen escapar a un análisis en términos de 'pros* y 'contras' de los alimentos transgénicos.

  13. Modèle conceptuel commun pour la supervision des systèmes de sûreté du CERN

    CERN Document Server

    Hammouti, L

    2000-01-01

    La supervision des systèmes de sûreté des accélérateurs et des zones expérimentales du CERN est gérée spécifiquement d'une machine à l'autre. Chaque programme a été conçu et réalisé au moyen de la technologie de l'époque et sans suivre un modèle conceptuel commun. La situation actuelle risque de poser des problèmes importants pour l'avenir. En effet la disparité des systèmes de supervision et la nécessité de les faire évoluer ou de les renouveler alourdissent sensiblement la charge de travail ainsi que le coût de la maintenance. D'autre part, il est difficile, voire impossible, de les faire communiquer entre eux, or cela constitue une des requêtes principales de l'opération pour une meilleure coordination de l'exploitation. Le but de ce document consiste à présenter les bases d'un modèle conceptuel unique, en cours d'élaboration dans le cadre du LHC, afin de répondre aux problèmes et aux requêtes posés. Ce modèle servira de référence pour le renouvellement et l'évolution ...

  14. COMPREENDER OS DIREITOS HUMANOS EM CABO VERDE: da retórica político-filosófica à praxis jurídica

    Directory of Open Access Journals (Sweden)

    Nataniel Andrade Monteiro

    2016-07-01

    Full Text Available O artigo procura analisar a coerência entre a retórica político-filosófica e a praxis jurídica, tendo como locus de análise os direitos humanos em Cabo Verde. Numa perspectiva histórica, a afirmação dos direitos humanos aconteceu de forma paulatina num processo de sucessivas lutas e revindicações que culminaram em 1948 com a Declaração Universal dos Direitos Humanos. A Declaração é protegida pelo ordenamento jurídico de diferentes Estados e é um dos temas mais debatidos a nível mundial. O caso de Cabo Verde não constitui excepção a este fenómeno, apesar de ser um Estado modelo em África em matéria de direitos humanos. Porém, existem preocupações no que se refere às denúncias de violações constantes como sejam: a morosidade da justiça, as condições precárias das instalações prisionais, os abusos por parte de agentes policiais, a hostilidade contras as mulheres e os abusos contra as crianças. Deste modo, procuramos compreender esta problemática à luz da filosofia política contemporânea, analisando para o efeito um conjunto de perspectivas que configuram a retórica político-filosófica e a práxis jurídica. Palavras-chave: Democracia; Direitos Humanos; Retórica Político-filosófica; Praxis Jurídica. UNDERSTANDING HUMAN RIGHTS IN CAPE VERDE: Political-philosophical rhetoric to legal praxis ABSTRACT The article seeks to analyses the coherence between the political-philosophical rhetoric and legal praxis, with the locus of human rights analysis in Cape Verde. In a historical perspective, the affirmation of human rights happened so gradual a process of successive fights and claims that culminated in 1948 with the Universal Declaration of Human Rights. The statement is protected by the legislation of different States and is one of the most discussed themes worldwide. The case of Cape Verde is no exception to this phenomenon, despite being a model State in Africa in the field of human rights. However

  15. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  16. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  17. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  18. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  19. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  20. La dynamique des régimes de régulation de la sûreté nucléaire française à la lumière de ses instruments

    OpenAIRE

    Chanton , Olivier; Mangeon , Michael; Pallez , Frédérique; Rolina , Grégory

    2016-01-01

    International audience; L’accident de Fukushima a provoqué une prise de conscience sans précédent concernant l’importance des risques naturels à l’échelle internationale. En mettant en cause plusieurs aspects institutionnels, et notamment les liens de dépendance entre l’autorité de sûreté nucléaire et le ministère de l’industrie japonais, les analyses de l’accident posent également la question de la gouvernance et de la régulation des risques nucléaires avec une acuité nouvelle (Delamotte 201...

  1. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  2. Cidadania, educação e responsabilidade social: falácias gastas em um discurso retórico?

    Directory of Open Access Journals (Sweden)

    Mark Sandro Sorprezo de Almeida

    2002-12-01

    Full Text Available The pressing questioning in the present work is established in the proposal of use of the words as instruments of changes, as foundations of the yearnings of a society in transition. The proposal of an educational work that unites the social responsibility to the citizenship demands clarity regarding the social political objectives that guides it, of the vision of world and the concepts of education, citizenship, man, world, knowledge, culture, among others. As to form this professional it consists of one of the educational quandaries and more, it is questioned existence of professionals of the education enabled to exert this formation. The proposal here in conjugating, citizenship, education and social responsibility, of a first analysis consists of the questioning of the rhetorical speech through the presentation of the concepts for then considering the use of such justinian codes as transforming instruments and proportioners. To educate, to form the responsible citizen I obtain and with the society, critic and asset, whichever the society of the future.O questionamento premente no presente trabalho funda-se na proposta de utilização dos vocábulos como instrumentos de mudanças, como alicerces dos anseios de uma sociedade em transição. A proposta de um trabalho educacional que alie a responsabilidade social à cidadania exige clareza a respeito dos objetivos sócio-políticos que a norteiam, da visão de mundo e dos conceitos de educação, cidadania, homem, mundo, conhecimento, cultura, entre outros. Como formar este profissional consiste em um dos dilemas educacionais e mais, questiona-se a existência de profissionais da educação capacitados para exercer esta formação. A proposta aqui em conjugar, cidadania, educação e responsabilidade social, em uma primeira análise consiste no questionamento do discurso retórico através da apresentação dos conceitos para então propor a utilização de tais institutos como instrumentos

  3. Tensiones retóricas y semánticas en ética de la investigación Rhetorical and semantic tensions in research ethics

    Directory of Open Access Journals (Sweden)

    Miguel Kottow

    2007-10-01

    Full Text Available Comienza en recientes años un movimiento de revisión que utiliza la retórica y las desarticulaciones semánticas para legitimar prácticas que tradicionalmente se rechazarían como transgresiones éticas. En la ética de investigación se valida el reclutamiento de personas incapaces de ejercer su autonomía y se propone la incorporación de individuos vulnerados en la investigación para satisfacer el bien común. Esta propuesta atenta contra normativas establecidas que prohíben preferir intereses sociales o científicos por encima de los individuales, utilizando arbitrariamente la idea del bien público, puesto que la mayoría de las investigaciones sirven a intereses particulares de orden corporativo. Se debilita las definiciones de coerción y explotación, justificando la inclusión de probandos carentes de competencia mental y legitimando prácticas que en el entendido usual de estos conceptos son francas transgresiones a la ética de investigación con seres humanos. Cada vez más proyectos de investigación son trasladados a Latinoamérica, haciendo necesario que nuestra bioética se mantenga alerta frente a los intentos de debilitar la protección de individuos y comunidades que participan en estudios patrocinados desde instituciones comerciales del Primer Mundo.In recent years, rhetorical and semantic disjunctions have been used to validate practices traditionally rejected as ethical transgressions. According to such research ethics, subjects unable to exercise their autonomy are freely recruited, and vulnerable individuals are incorporated into research that purportedly serves the common good. The suggestions violate established rules that prohibit placing social or scientific interests above individual needs. The common good is invoked arbitrarily, since most such research serves private corporate interests. The definitions of coercion and exploitation are weakened, thus allowing the inclusion of mentally compromised research

  4. Tecnología y marketing: el papel de la retórica comercial en el desarrollo de dispositivos de navegación

    Directory of Open Access Journals (Sweden)

    Mendonça, Pedro

    2012-02-01

    Full Text Available The present article aims to link technology and marketing in the process of imagination and concretization of functions for mobile navigation devices. It focuses on the performance of marketing and sales, as rhetorical agents, in the technical path of building the product. Empirically, it is a case study of a Portuguese company, NDrive, whose main innovation is the introduction of photographic images in these devices replacing traditional maps. Since we identify in the field of innovation a platform of relation between the two spheres of inquiry (technology and marketing, it is in the theoretical studies of innovation that we produce much of the analysis of the different emerging questions, many connected to the central issues of contemporary technological transformation.

    Este artículo pretende relacionar tecnología y marketing en los procesos de imaginación y desarrollo de funcionalidades en dispositivos de navegación móvil. Se centra en la actuación de los departamentos empresariales de marketing, y de los trabajadores comerciales en general, como agentes retóricos que tienen un papel clave en los caminos técnicos de construcción del producto. En términos empíricos, se trata de un estudio de caso a una empresa portuguesa, Ndrive, que tiene como innovación principal la introducción de imagen fotográfica en los dispositivos de navegación, en vez de los tradicionales mapas. El campo de la innovación que se identifica es una plataforma donde se relacionan los dos ámbitos en cuestión (tecnología y marketing. Por ello, se utiliza la esfera teórica de los estudios de innovación para abordar el análisis de las diferentes problemáticas que van surgiendo en el desarrollo final del producto, muchas de ellas ligadas a las cuestiones centrales de la transformación tecnológica contemporánea.

  5. Key economic sectors and services

    NARCIS (Netherlands)

    Arent, Douglas J.; Tol, Richard S.J.; Faust, Eberhard; Hella, Joseph P.; Kumar, Surender; Strzepek, Kenneth M.; Tóth, Ferenc L.; Yan, Denghua; Abdulla, Amjad; Kheshgi, Haroon; Xu, He; Ngeh, Julius

    2015-01-01

    Introduction and Context This chapter discusses the implications of climate change on key economic sectors and services, for example, economic activity. Other chapters discuss impacts from a physical, chemical, biological, or social perspective. Economic impacts cannot be isolated; therefore, there

  6. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  7. Key Injury and Violence Data

    Science.gov (United States)

    ... Traumatic Brain Injury Violence Prevention Key Injury and Violence Data Recommend on Facebook Tweet Share Compartir Injuries ... of death among persons 1-44. Injury- and violence-related deaths are only part of the problem ...

  8. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  9. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  10. Os regimentos das corporações dos ofícios mecânicos: O caso do Retábulo-mor da Sé de Lamego (1506-1511 do pintor português Vasco Fernandes

    Directory of Open Access Journals (Sweden)

    Joana Salgueiro

    2010-08-01

    Full Text Available O núcleo em estudo: Retábulo-mor da Sé de Lamego (1506-1511, obra de incontestável importância histórico-artística do pintor quinhentista Vasco Fernandes, “Grão Vasco”, é um conjunto valiosamente documentado pelo seu contrato de obra, que subsistiu até à actualidade. No entanto, sabe-se que muitas vezes os dados empiricamente percepcionados ou mesmo presentes nos actos notariais relativos à feitura do retábulo, por inúmeras razões, nem sempre correspondem na íntegra à realidade. O trabalho que se segue, tem como objectivo, cruzar o conhecimento técnico e material dos suportes destas pinturas, com os dados analisados nos regimentos das corporações dos ofícios mecânicos do trabalho das madeiras: carpinteiros, carpinteiros de marcenaria, marceneiros, entalhadores (e por comparação pintores; de modo a determinar, através das metodologias de examinação dos aprendizes dos ofícios, e restantes normativas, as técnicas e materiais de execução exigidas, no contexto histórico do período Renascentista português.

  11. Recursos pragmático-retóricos de las narrativas de queja para la construcción social de la identidad de mujeres desplazadas por la violencia política en Colombia

    Directory of Open Access Journals (Sweden)

    Yudi Herrera Núñez

    2015-12-01

    Full Text Available Las mujeres desplazadas por la violencia política en Colombia, no solo se enfrentan a este flagelo sino que además son expuestas a condiciones de precariedad y al estigma por las comunidades de ‘acogida’. Esta investigación pretendeidentificar los correlatos retórico-pragmáticos de los procesos narrativos de construcciónidentitaria, y del enfoque de posicionamiento interaccional de Bamberg (1997 en el contexto de la entrevista de investigación. La muestra está conformada por 17 entrevistas semi-estructuradas conformadas como relatos de experiencias personales vividas a luego del proceso de desplazamiento forzado. Los principales resultados, extraídos de nuestro estudio, destacan el uso de ‘narrativas de queja’ (Günthner (2007 como uno de los recursos preferidos que las narradoras emplean para construir su identidad. En estos relatos, el amplio despliegue de recursos narrativos, pragmáticos, retóricos y evaluativos pareciesen estar en función del objetivo interaccional de producir el alineamiento del interlocutor. En las narrativas de queja los recursosmás frecuentes son el discurso directo, el uso de presente histórico y diversos recursos evaluativos. Las narrativas se constituyen en los principales territorios donde los co-conversadores buscan y encuentran formas para mitigar el ‘problema interactivo’ y conforman una imagen de sí mismos de formas que sean interactivamente útiles.

  12. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  13. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  14. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  15. Key Lake spill. Final report

    International Nuclear Information System (INIS)

    1984-03-01

    On January 5, 1984 contaminated water overflowed a storage reservoir at the Key Lake uranium mill onto the ice on a neighboring lake, into a muskeg area and onto a road. Outflow continued for two days, partially undercutting a retaining dyke. This report concludes the spill was the result of poor operation by the Key Lake Mining Corp.. The environmental impact will be minimal after cleanup. Improvements can be made in the regulatory process, and it is necessary to prepare for possible future mishaps

  16. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  17. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  18. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  19. Detección de una mutación no estándar en el Proto-oncogen RET por mutagénesis dirigida Detection of a non-standard mutation in the ret protoncogene by site directed mutagenesis

    Directory of Open Access Journals (Sweden)

    Sebastián Real

    2005-03-01

    Full Text Available El síndrome de MEN2A es una enfermedad autosómica dominante que se caracteriza por el desarrollo de cáncer medular de tiroides, feocromocitoma e hiperplasia de paratiroides. Mutaciones en el ret proto-oncogén se asocian con MEN2A, con una penetrancia cercana al 100%. El gen se encuentra en el cromosoma 10q11.2 y codifica para una proteína transmembrana con función de receptor del tipo tirosina quinasa. Mutaciones que afectan el dominio extracelular de la proteína estimulan la dimerización espontánea del receptor y un aumento de la actividad de tirosina quinasa basal. El codón 634 codifica para una cisteína, y es considerado un sitio hot-spot por encontrarse mutado en el 85% de las familias con MEN2A. Para este sitio, nuestro grupo desarrolló en 2002 una metodología de detección indirecta y económica. Ante una familia sospechada de MEN2A, se aplicó esta estrategia, que reveló un codón 634 sano. Por posterior secuenciación se confirmó que el paciente índice portaba una mutación en el codón 611. Se desarrolló una nueva estrategia familia-específica por PCR mutagénica, que permitió diagnosticar en nuestro país a todos los integrantes de la familia con costos accesibles. Un niño en el cual se halló la mutación, fue tiroidectomizado preventivamente, y a la fecha goza de buena salud. De esta manera, combinando la estrategia de detección de mutaciones en el sitio hot-spot y un posterior diseño de otra metodología familia-específica se pudo diagnosticar e intervenir preventivamente a la familia, sin enviar todas las muestras al extranjero.MEN2A is an autosomic dominant disease, characterized by medullary thyroid cancer, pheochromocytoma and parathyroid hyperplasia. Mutations in the ret proto-oncogene are associated with this disease, with almost 100% of pennetrance. The gene, situated on chromosome 10q11.2, codes for a transmembrane protein with a tirosinkinase-like receptor function. Mutations that affect its

  20. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so that dif...... that different structural problems can be reproduced successfully....

  1. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  2. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  3. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  4. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  5. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  6. La e-migración: un nuevo espacio para pensar la retórica de la integración en las políticas migratorias

    Directory of Open Access Journals (Sweden)

    Mauricio Nihil Olivera Cajiga

    2013-01-01

    Full Text Available Este artículo, basado en un estudio comparativo de migrantes franceses y ecuatorianos en Barcelona, discute la retórica de la integración en las políticas migratorias dentro del contexto de las tecnologías de la información y la comunica­ción (TIC. Los resultados que se presentan permiten problematizar las relaciones de los migrantes en Barcelona a partir de sus prácticas sociales en las TICs, así como también plantear la existencia de unas características tecnológicas, geográficas y sociales (TGS que crean un nuevo espacio que llamamos e-migración. Se argumenta en este artículo que el discurso de la integración y las TICs, que forma parte de la retórica de las administraciones de gobierno catalana, ocultan desigualdades estructurales entre los migrantes comunitarios y no comunitarios. El estudio de caso de franceses y ecuatorianos migrantes en Cataluña es una muestra de cómo se gestiona la diversidad en clave cultura para categorizar a determinadas poblaciones y no para integrarlas. Palabras clave: integración, política, e-migración, ecuatorianos, franceses, TIC, Barcelona, retórica.   E-migration: a new space to think the rhetoric of integration in migration policies  Abstract This article, based on a comparative study of French and Ecuadorian migrants in Barcelona, discusses the rhetoric of integration in migration policies within the context of information and communication technologies (ICT. The results presented allow to question the relationship of migrants in Barcelona taking into account their ICT social practices, as well as propose the existence of technological, geographical and social (TGS characteristics to create a new space we call e-migration. It is argued in this article that the discourse of integration and ICT, which is part of the rhetoric of the Catalan government administrations, hides structural inequalities between migrants from EU and outside of the EU. The case study of French and Ecuadorian

  7. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  8. Key papers in prostate cancer.

    Science.gov (United States)

    Rodney, Simon; Shah, Taimur Tariq; Patel, Hitendra R H; Arya, Manit

    2014-11-01

    Prostate cancer is the most common cancer and second leading cause of death in men. The evidence base for the diagnosis and treatment of prostate cancer is continually changing. We aim to review and discuss past and contemporary papers on these topics to provoke debate and highlight key dilemmas faced by the urological community. We review key papers on prostate-specific antigen screening, radical prostatectomy versus surveillance strategies, targeted therapies, timing of radiotherapy and alternative anti-androgen therapeutics. Previously, the majority of patients, irrespective of risk, underwent radical open surgical procedures associated with considerable morbidity and mortality. Evidence is emerging that not all prostate cancers are alike and that low-grade disease can be safely managed by surveillance strategies and localized treatment to the prostate. The question remains as to how to accurately stage the disease and ultimately choose which treatment pathway to follow.

  9. Key Topics in Sports Medicine

    OpenAIRE

    2006-01-01

    Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1) Sports injuries, rehabilitation and injury prevention, 2) Exercise physiology, fitness testing and training, 3) Drugs in sport, 4) Exercise and health promotion, 5) Sport and exercise for special and clinical populations, 6) The ps...

  10. Key issues for passive safety

    International Nuclear Information System (INIS)

    Hayns, M.R.

    1996-01-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ''review paper'' as such and only record the highlights. (author)

  11. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  12. Key issues for passive safety

    Energy Technology Data Exchange (ETDEWEB)

    Hayns, M R [AEA Technology, Harwell, Didcot (United Kingdom). European Institutions; Hicken, E F [Forschungszentrum Juelich GmbH (Germany)

    1996-12-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ``review paper`` as such and only record the highlights. (author).

  13. Low carbon development. Key issues

    Energy Technology Data Exchange (ETDEWEB)

    Urban, Frauke; Nordensvaard, Johan (eds.)

    2013-03-07

    This comprehensive textbook addresses the interface between international development and climate change in a carbon constrained world. It discusses the key conceptual, empirical and policy-related issues of low carbon development and takes an international and interdisciplinary approach to the subject by drawing on insights from across the natural sciences and social sciences whilst embedding the discussion in a global context. The first part explores the concept of low carbon development and explains the need for low carbon development in a carbon constrained world. The book then discusses the key issues of socio-economic, political and technological nature for low carbon development, exploring topics such as the political economy, social justice, financing and carbon markets, and technologies and innovation for low carbon development. This is followed by key issues for low carbon development in policy and practice, which is presented based on cross-cutting issues such as low carbon energy, forestry, agriculture and transportation. Afterwards, practical case studies are discussed from low carbon development in low income countries in Africa, middle income countries in Asia and Latin America and high income countries in Europe and North America.

  14. Detector decoy quantum key distribution

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2009-01-01

    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is especially suited to those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement-based quantum key distribution scheme with an untrusted source without the need for a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single-photon security proof to its physical, full optical implementation. We show that in this scenario, the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.

  15. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  16. Retórica e poder: o paratexto prefacial de autoria feminina no Brasil do século XIX = Rhetoric and power: the feminine prefacial paratext in Brazil in the nineteen century

    Directory of Open Access Journals (Sweden)

    Tabak, Fani Miranda

    2014-01-01

    Full Text Available Neste trabalho, voltamos nosso olhar para paratextos prefaciais produzidos por autoras oitocentistas, considerando a importância dos mesmos para o estudo e o resgate de obras praticamente esquecidas dentro da tradição historiográfica. Ao ampliarmos o conceito de transtextualidade, desenvolvido por Gérard Genette, tornamos evidente a paratextualidade como fenômeno de provocação frente a uma situação periférica no discurso produzido por escritoras. A quebra dos padrões retóricos da captatio benevolentiae, bem como a tentativa de readequação do prefácio a um possível público habituado às normas vigentes, torna o paratexto um elemento importante a ser considerado na própria compreensão do posicionamento autoral feminino

  17. Configuraciones retórico-lingüísticas del resumen en artículos científicos de economía: Contrastes en el interior de la disciplina

    OpenAIRE

    Stagnaro, Daniela

    2015-01-01

    En las últimas décadas, la lingüística especializada ha contribuido al conocimiento del discurso académico-científico, especialmente, de las características lingüístico- retóricas de géneros centrales de la comunicación científica. Entre ellos, el artículo científico y su resumen han recibido amplia atención por su centralidad en el proceso de investigación. Sin embargo, la bibliografía tiende a tratar el discurso de cada disciplina de manera homogénea sin considerar las ramas o los posiciona...

  18. La resurrección retórica de la República en 1890: Un análisis sobre las relaciones entre elocuencia, oratoria y política en la Argentina a fines del siglo XIX

    Directory of Open Access Journals (Sweden)

    Leonardo D. Hirsch

    Full Text Available El trabajo tiene como objetivo hacer un análisis de las relaciones entre retórica, oratoria y política en la Argentina, a lo largo del siglo XIX, en general, y durante la crisis de 1890, en particular. En este sentido creemos que en la particular coyuntura de 1890 se temió sobre todo por la desintegración del cuerpo político de la República como consecuencia de la creciente indiferencia de los ciudadanos por la cosa pública. Los Cívicos, en consecuencia, decidieron emprender una "campaña de regeneración", fundada sobre la creencia en el "poder soberano de la palabra", y en la legitimidad que otorgaba la elocuencia de sus oradores, para transformar los hábitos políticos.

  19. Nuevos mecanismos de regulación del balance energético. Papel de AMPK y del estrés del retículo endoplasmático hipotalámico

    OpenAIRE

    Seoane Collazo, Patricia

    2018-01-01

    AMPK es un sensor celular que se activa en estado de baja energía. Las evidencias actuales vinculan la AMPK hipotalámica con la regulación central del balance energético. Sin embargo, cual es la isoforma de AMPK y el tipo neuronal que está mediando estos efectos todavía no se ha dilucidado. En esta Tesis, demostramos que la inhibición de AMPKα1 en las neuronas SF1 del núcleo ventromedial del hipotálamo protege contra la obesidad inducida por dieta al disminuir el estrés del retículo endoplasm...

  20. Detection of Gene Rearrangements in Circulating Tumor Cells: Examples of ALK-, ROS1-, RET-Rearrangements in Non-Small-Cell Lung Cancer and ERG-Rearrangements in Prostate Cancer.

    Science.gov (United States)

    Catelain, Cyril; Pailler, Emma; Oulhen, Marianne; Faugeroux, Vincent; Pommier, Anne-Laure; Farace, Françoise

    2017-01-01

    Circulating tumor cells (CTCs) hold promise as biomarkers to aid in patient treatment stratification and disease monitoring. Because the number of cells is a critical parameter for exploiting CTCs for predictive biomarker's detection, we developed a FISH (fluorescent in situ hybridization) method for CTCs enriched on filters (filter-adapted FISH [FA-FISH]) that was optimized for high cell recovery. To increase the feasibility and reliability of the analyses, we combined fluorescent staining and FA-FISH and developed a semi-automated microscopy method for optimal FISH signal identification in filtration-enriched CTCs . Here we present these methods and their use for the detection and characterization of ALK-, ROS1-, RET-rearrangement in CTCs from non-small-cell lung cancer and ERG-rearrangements in CTCs from prostate cancer patients.

  1. Teoría retórica como teoría del texto y narración digital como narración hipertextual: perspectivas de estudio entre la tradición y la modernidad

    OpenAIRE

    Chico Rico, Francisco

    2007-01-01

    El principal objetivo de este estudio es el de cubrir un capítulo que cada vez se hace más necesario en cualquier foro de debate sobre las tecnologías de la creación en la era digital: el relativo a la consideración de la llamada "hiperficción" o, para hablar con propiedad, "narración hipertextual" —como narración literaria de linealidad no fijada y comunicada a través de la pantalla de un ordenador— desde la perspectiva teórico-metodológica del sistema retórico, entendido como teoría del tex...

  2. Dano moral: análise de argumentos decisórios em acórdão trabalhista sob a ótica da Nova Retórica

    Directory of Open Access Journals (Sweden)

    Barbara Bedin

    2013-05-01

    Full Text Available Neste trabalho objetivou-se analisar os argumentos valorados por desembargadores para formar o entendimento do significado de dano moral – que equivale a um fenômeno jurídico passível de ser indenizado. Para alcançar tal objetivo, examinou-se, em um estudo exploratório, o acórdão n. 0000192-11.2011.5.04.0001, proferido pela Quarta Turma do Tribunal Regional do Trabalho da Quarta Região (Rio Grande do Sul, Brasil, que trata de uma indenização por dano moral. Os argumentos foram levantados e analisados sob a ótica da Nova Retórica de Perelman e Olbrecht-Tyteca.

  3. A ironia na literatura canadense: uma estratégia retórica e estrutural exibindo dissonâncias e diferenças = The irony in Canadian literature: a rhetorical and structural strategy displaying differences and dissonance

    Directory of Open Access Journals (Sweden)

    Klondy Lúcia de Oliveira Agra

    2012-01-01

    Full Text Available Neste artigo, observo, com base na literatura canadense, os sentidos dados à ironia utilizada como estratégia retórica e estrutural. A partir da pesquisa bibliográfica, procuro por esclarecimentos sobre a característica da ironia canadense, sua forma e seu foco específico com apoio das teorias crítica, pós-moderna e pós-colonial.In this article, the result of study about Canadian literature, I observe the use of the irony as a rhetorical and structural strategic. From the bibliographical research, I look for clarification on the characteristic of Canadian irony, its form and its specific focus with support from critical theory, postmodern and post-colonial.

  4. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  5. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  6. Key energy technologies for Europe

    DEFF Research Database (Denmark)

    Jørgensen, B.H.

    2005-01-01

    This report on key energy technologies is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. Senior Scientist BirteHolst Jørgensen, Risø National Laboratory...... contributed by Scientific Officer Edgar Thielmann, DG TREN, Head of Department Hans Larsen, RisøNational Laboratory, Senior Asset Manager Aksel Hauge Pedersen, DONG VE, Consultant Timon Wehnert, IZT-Berlin, and Senior Scientist Martine Uyterlinde, ECN...

  7. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken......“Now I can actually play soccer with the young people without fearing that my colleagues think I am escaping the paper work.” These were the words from a participant in a social pedagogy training course in England a few years ago. This understanding emerged through in-depth discussions...

  8. Public/private key certification authority and key distribution. Draft

    Energy Technology Data Exchange (ETDEWEB)

    Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

    1995-09-25

    Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

  9. Three key affordances for serendipity

    DEFF Research Database (Denmark)

    Björneborn, Lennart

    2017-01-01

    Purpose Serendipity is an interesting phenomenon to study in information science as it plays a fundamental – but perhaps underestimated – role in how we discover, explore, and learn in all fields of life. The purpose of this paper is to operationalize the concept of serendipity by providing termi...... terminological “building blocks” for understanding connections between environmental and personal factors in serendipitous encounters. Understanding these connections is essential when designing affordances in physical and digital environments that can facilitate serendipity. Design....../methodology/approach In this paper, serendipity is defined as what happens when we, in unplanned ways, encounter resources (information, things, people, etc.) that we find interesting. In the outlined framework, serendipity is understood as an affordance, i.e., a usage potential when environmental and personal factors correspond...... the three key affordances and three key personal serendipity factors: curiosity, mobility, and sensitivity. Ten sub-affordances for serendipity and ten coupled personal sub-factors are also briefly outlined. Related research is compared with and mapped into the framework aiming at a theoretical validation...

  10. Key energy technologies for Europe

    International Nuclear Information System (INIS)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO 2 capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  11. Key to Language Learning Success

    Directory of Open Access Journals (Sweden)

    Oktavian Mantiri

    2015-01-01

    Full Text Available This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these roles and nurture the best possible ways where language teaching and learning will thrive. This paper also suggested that both stake-holders should be open to holistic approach of language learning and that other factors such as the environment could play an important part in language teaching and learning success.

  12. Cogeneration: Key feasibility analysis parameters

    International Nuclear Information System (INIS)

    Coslovi, S.; Zulian, A.

    1992-01-01

    This paper first reviews the essential requirements, in terms of scope, objectives and methods, of technical/economic feasibility analyses applied to cogeneration systems proposed for industrial plants in Italy. Attention is given to the influence on overall feasibility of the following factors: electric power and fuel costs, equipment coefficients of performance, operating schedules, maintenance costs, Italian Government taxes and financial and legal incentives. Through an examination of several feasibility studies that were done on cogeneration proposals relative to different industrial sectors, a sensitivity analysis is performed on the effects of varying the weights of different cost benefit analysis parameters. With the use of statistical analyses, standard deviations are then determined for key analysis parameters, and guidelines are suggested for analysis simplifications

  13. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  14. Key energy technologies for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO{sub 2} capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  15. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  16. VICKEY: Mining Conditional Keys on Knowledge Bases

    DEFF Research Database (Denmark)

    Symeonidou, Danai; Prado, Luis Antonio Galarraga Del; Pernelle, Nathalie

    2017-01-01

    A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs...

  17. Quantum key distribution and cryptography

    International Nuclear Information System (INIS)

    Alleaume, R.

    2005-01-01

    Full text: Originally proposed by classical cryptographers, the ideas behind Quantum Key Distribution (QKD) have attracted considerable interest among the quantum optics community, which has significantly helped bring these ideas to reality. Experimental realizations have quickly evolved from early lab demonstrations to QKD systems that are now deployed in real conditions and targeting commercial applications. Although QKD can be theoretically proven to rely on 'unconditional security proofs' and should thus be able to provide security levels unachievable through computationally-based cryptographic techniques, the debate on the cryptographic applications of QKD remains somehow controversial. It seems that a consensus on that matter cannot be reached without a careful analysis of assumptions and definitions related to security models used in classical or in quantum cryptography. In this talk, we will try to present a comprehensive synthesis on this topic. We have initiated this work as a contribution to the European IP SECOQC project, confronting views and knowledge among experimental and theoretical quantum physicists, as well as classical cryptographers. (author)

  18. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  19. KEY TOPICS IN SPORTS MEDICINE

    Directory of Open Access Journals (Sweden)

    Amir Ali Narvani

    2006-12-01

    Full Text Available Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1 Sports injuries, rehabilitation and injury prevention, 2 Exercise physiology, fitness testing and training, 3 Drugs in sport, 4 Exercise and health promotion, 5 Sport and exercise for special and clinical populations, 6 The psychology of performance and injury. PURPOSE The Key Topics format provides extensive, concise information in an accessible, easy-to-follow manner. AUDIENCE The book is targeted the students and specialists in sports medicine and rehabilitation, athletic training, physiotherapy and orthopaedic surgery. The editors are authorities in their respective fields and this handbook depends on their extensive experience and knowledge accumulated over the years. FEATURES The book contains the information for clinical guidance, rapid access to concise details and facts. It is composed of 99 topics which present the information in an order that is considered logical and progressive as in most texts. Chapter headings are: 1. Functional Anatomy, 2. Training Principles / Development of Strength and Power, 3. Biomechanical Principles, 4. Biomechanical Analysis, 5. Physiology of Training, 6. Monitoring of Training Progress, 7. Nutrition, 8. Hot and Cold Climates, 9. Altitude, 10. Sport and Travelling, 11. Principles of Sport Injury Diagnosis, 12. Principles of Sport and Soft Tissue Management, 13. Principles of Physical Therapy and Rehabilitation, 14. Principles of Sport Injury Prevention, 15. Sports Psychology, 16. Team Sports, 17. Psychological Aspects of Injury in Sport, 18. Injury Repair Process, 19. Basic Biomechanics of Tissue Injury, 20. Plain Film Radiography in Sport, 21. Nuclear Medicine, 22. Diagnostic Ultrasound, 23. MRI Scan, 24. Other Imaging, 5. Head Injury, 26. Eye

  20. Introduction strategies raise key questions.

    Science.gov (United States)

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  1. Key issues in transplant tourism.

    Science.gov (United States)

    Akoh, Jacob A

    2012-02-24

    Access to organ transplantation depends on national circumstances, and is partly determined by the cost of health care, availability of transplant services, the level of technical capacity and the availability of organs. Commercial transplantation is estimated to account for 5%-10% (3500-7000) of kidney transplants performed annually throughout the world. This review is to determine the state and outcome of renal transplantation associated with transplant tourism (TT) and the key challenges with such transplantation. The stakeholders of commercial transplantation include: patients on the waiting lists in developed countries or not on any list in developing countries; dialysis funding bodies; middlemen, hosting transplant centres; organ-exporting countries; and organ vendors. TT and commercial kidney transplants are associated with a high incidence of surgical complications, acute rejection and invasive infection which cause major morbidity and mortality. There are ethical and medical concerns regarding the management of recipients of organs from vendors. The growing demand for transplantation, the perceived failure of altruistic donation in providing enough organs has led to calls for a legalised market in organ procurement or regulated trial in incentives for donation. Developing transplant services worldwide has many benefits - improving results of transplantation as they would be performed legally, increasing the donor pool and making TT unnecessary. Meanwhile there is a need to re-examine intrinsic attitudes to TT bearing in mind the cultural and economic realities of globalisation. Perhaps the World Health Organization in conjunction with The Transplantation Society would set up a working party of stakeholders to study this matter in greater detail and make recommendations.

  2. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  3. De la palabra-acción a la palabra-imitación: itinerario retórico de Cicerón

    Directory of Open Access Journals (Sweden)

    Carlos Lévy

    2012-12-01

    Full Text Available This paper aims to show how Cicero's consideration of eloquence as imitation was a late decision in his life caused by the circumstances. The expression "Ciceronian challenge" refers here to the conversion from a rhetoric based on the concept of force to a rhetoric where the concept of imitation has gained greater importance. Although during the early years of his career as orator, Cicero favored the representation of the spoken word as illocutionary and perlocutionary force -as in Austin's terms -, towards the end of his life he took a more abstract position in which the concept of imitation finally prevailed as a key word in his rhetoric.

  4. Quantum key distribution network for multiple applications

    Science.gov (United States)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  5. Electronic Nicotine Delivery Systems Key Facts Infographic

    Data.gov (United States)

    U.S. Department of Health & Human Services — Explore the Electronic Nicotine Delivery Systems Key Facts Infographic which outlines key facts related to electronic nicotine delivery systems (ENDS), including...

  6. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  7. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  8. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  9. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  10. Técnica dramática y retórica de las pasiones en el Tratado completo del arte del canto de Manuel García

    Directory of Open Access Journals (Sweden)

    Díaz Marroquín, Lucía

    2007-12-01

    Full Text Available The history of European singing technique, from the Italian origins of the stile rappresentativo and the early Seicento musical drama to the heights of bel canto, seems inextricably related to the classical rhetorical and philosophical theories, later re-interpreted by the humanist and rationalist authors. Manuel García’s Tratado completo del arte del canto inherits this tradition and contributes to it with every single observation or musical example included in this eminently practical work.

    Desde los orígenes italianos del stile rappresentativo y del drama musical, en los últimos años del siglo XVI y primeros del XVII, hasta el esplendor del bel canto, la historia de los tratados de canto europeos se encuentra inseparablemente asociada a las teorías retóricas y filosóficas clásicas, más tarde reinterpretadas por los autores humanistas y preenciclopedistas. Al escribir su Tratado completo del arte del canto, una obra eminentemente práctica, Manuel García hereda esta tradición y contribuye a ella con cada una de las observaciones y ejemplos musicales que propone.

  11. Tradição e retórica imagética: a construção da propaganda visual oposicionista no levante de 1932 em São Paulo

    Directory of Open Access Journals (Sweden)

    João Paulo Rodrigues

    2011-06-01

    Full Text Available Esgotando-se o tempo de vida das testemunhas do levante de 1932 o dever de memória respeitante a ele segue candente. Com efeito, a intensidade deste movimento perpassa, também, a historiografia, que aparece cindida em posições mais críticas ou aclamativas, reproduzindo, de certo modo, as polêmicas nascidas no próprio confronto. Em boa medida, por conseguinte, conhecer melhor a "Revolução Constitucionalista" implica exumar as leituras que os insurrectos faziam da realidade vivida e as representações de que lançavam mão, com vistas a vencer as correlações de forças que os acometiam. Essas preocupações são abordadas neste artigo, que o faz, no entanto, sob o prisma alvissareiro das imagens e da produção cultural vinculada à propaganda proselitista. São elas que trazem à tona a retórica constitucionalista, eivada por teores regionalistas, sustentada por redes de relações sociais e, dadas às sutilezas, imiscuídas profundamente na memória histórica.

  12. ¿Obedecer las leyes?: utilitarismo, retórica forense y autoridad en el Critón de Platón (50a6-50b5

    Directory of Open Access Journals (Sweden)

    Eduardo Esteban Magoja

    2017-07-01

    Full Text Available En el Critón de Platón se instala un interesante argumento utilitarista para justificar la obligación política de los ciudadanos. El argumento sostiene que la violación de las leyes lleva a la destrucción de cualquier sistema jurídico y acarrea resultados perjudiciales para los miembros de la comunidad (50a6-50c. En este trabajo realizaremos un análisis crítico del argumento bajo los postulados de tres corrientes utilitaristas: el utilitarismo de acto, la generalización utilitarista y el utilitarismo de regla. Veremos cómo esta clase de argumentación presenta algunos inconvenientes a la hora de justificar la obediencia al derecho. Una vez realizado este estudio se propondrá otra interpretación complementaria sobre el significado del pasaje, en la que se destacará su costado retórico forense y la idea de la autoridad del derecho.

  13. Sobre a retórica da exclusão: a incidência do discurso ideológico em serviços substitutivos de cuidado a psicóticos

    Directory of Open Access Journals (Sweden)

    Christian Ingo Lenz Dunker

    Full Text Available O Brasil atravessa um vigoroso processo de reforma psiquiátrica. Pressionado pelo Movimento dos Trabalhadores de Saúde Mental, o Ministério da Saúde adotou como uma de suas diretrizes de ação favorecer a inclusão social dos portadores de transtornos mentais no Brasil. Nos moldes propostos pelos partidários da reforma psiquiátrica, o tratamento da psicose deve enfatizar a negação da lógica manicomial através de uma política compensatória de benefícios e da participação em movimentos sociais. Neste artigo, examinamos alguns aspectos ideológicos dessa proposta e algumas de suas inflexões clínicas. Procuramos mostrar como o efeito de circulação de discursos pode abrir campos de significação onde certos modos de compreensão e socialização são estimulados em detrimento de outros. Argumentamos que a retórica baseada na oposição entre inclusão e exclusão pode ser pensada em sua dupla incidência, clínica e ideológica.

  14. Identification of sumoylation sites in CCDC6, the first identified RET partner gene in papillary thyroid carcinoma, uncovers a mode of regulating CCDC6 function on CREB1 transcriptional activity.

    Directory of Open Access Journals (Sweden)

    Chiara Luise

    Full Text Available CCDC6 was originally identified in chimeric genes as caused by chromosomal translocation involving the RET protooncogene in some thyroid tumors. Recognised as a 65 kDa pro-apoptotic phosphoprotein, CCDC6 has been enrolled as an ATM substrate that contribute to protect genome integrity by modulating PP4c activity in response to genotoxic stress. Recently, CCDC6 has been identified as a repressor of CREB1-dependent transcription. Sumoylation has emerged as an important mechanism in transcriptional control. Here, we report the identification and characterization of three sites of sumoylation in CCDC6 (K74, K266 and K424 which are highly conserved in vertebrates. We demonstrate that the post-translational modifications by SUMO2 constrain most of the CCDC6 protein in the cytosol and affect its functional interaction with CREB1 with a decrease of CCDC6 repressive function on CREB1 transcriptional activity. Indeed, the impairment of functional outcome of sumoylated CCDC6 is obtained knocking down all three the sumoylation sites. Interestingly, in thyroid cells the SUMO2-mediated CCDC6 post-translational modifications are induced by Forskolin, a cAMP analog. Signal transduction via the cAMP pathway is known to be ubiquitous and represents a major line of communication between many organisms and their environment. We believe that CCDC6 could be an important player in the dynamics of cAMP signaling by fine regulating CREB1 transcriptional activity in normal and transformed thyroid cells.

  15. As estratégias de retórica na disputa pela Prefeitura de São Paulo em 2004: PT, mandatário, versus PSDB, desafiante

    Directory of Open Access Journals (Sweden)

    Luciana Fernandes Veiga

    2007-06-01

    Full Text Available A experiência do PT no governo (nos âmbitos nacional e local suscitou a curiosidade sobre possíveis alterações no seu discurso eleitoral na disputa pela Prefeitura de São Paulo. O foco desta análise está nas continuidades e rupturas das estratégias retóricas elaboradas a partir dos eixos ideológico (esquerda e direita e pragmático (mandatário e desafiante. A preocupação central é o discurso do PT, e a análise da comunicação apresentada pelo PSDB tem um caráter complementar. Todos os programas e spots veiculados pelas campanhas do PT e do PSDB em São Paulo foram analisados a partir de métodos qualitativos e quantitativos.The experience of the Worker's Party at the Brazilian national and local governments has estimuladted the curiosity about changings in its electoral discourse at the elections for the São Paulo Mayor. This article focuses on the changes and continuities of rethorical strategieand the analysis is based on campaign 'spots' veiculated by the Worker's Party and the Brazilian Social Democratic Party.

  16. VICKEY: Mining Conditional Keys on Knowledge Bases

    OpenAIRE

    Symeonidou , Danai; Galárraga , Luis; Pernelle , Nathalie; Saïs , Fatiha; Suchanek , Fabian

    2017-01-01

    International audience; A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs of millions of facts. We also show that the conditional keys we mine can improve the quality of entity linking by up to 47 percentage points.

  17. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  18. Establishing Key Performance Indicators : Case company X

    OpenAIRE

    Singh, Jatinder

    2015-01-01

    The key performance indicators serve as the navigational tools for a business organization to monitor its performance. They enable the management team to take real time decisions to keep organization’s resources aligned to its business strategy to accomplish its strategic objec-tives. This research was conducted to analyse the process of establishing successful key per-formance indicators for a business organization. The research was conducted to recommend key performance indicators developme...

  19. Competency Assessment Using Key Performance Indicators

    OpenAIRE

    Elena Alexandra Toader; Laura Brad

    2015-01-01

    The paper proposes a method for computing the scores of the key performance indicators resulted in the competency assessment process. The key performance indicators are estimated considering four performance levels that an IT professional can obtain at the end of the assessment process. We suggest as the best approach for estimating the performance key indicators an online questionnaire filled by 60 employees that work in IT Romanian companies. The results provide evidence that the difference...

  20. Enciphered Data Steganography Using Secret Key

    Directory of Open Access Journals (Sweden)

    BANGALORE G.Tilak

    2010-10-01

    Full Text Available A new method is proposed to maintain thesecrecy of data by enciphering and embedding using asecret key. There is no restriction on the length of thekey used to encipher and embed the data. Since the keyis not stored for validation, it prevents unauthorizedaccess to the key, even if decoding procedure is known.The correct message can be recovered only with thespecific key used in encipherment and embedding. Thismethod can also be used for multiple levelsteganography.

  1. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  2. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  3. EPA Monthly Key Performance Indicator Dashboards 2017

    Science.gov (United States)

    Each month, the Web Analytics Program posts updated Key Performance Indicator (KPI) dashboards that correspond to three Web performance goals: content consumption, content discovery, and audience engagement.

  4. Nickel exposure from keys: a Brazilian issue.

    Science.gov (United States)

    Suzuki, Nathalie Mie; Duarte, Ida Alzira Gomes; Hafner, Mariana de Figueiredo Silva; Lazzarini, Rosana

    2017-01-01

    Keys are a significant source of exposure to metal allergens and can be a relevant problem for nickel-allergic individuals. This study aimed to perform nickel and cobalt spot testing among the 5 most common Brazilian brands of keys. Among the tested keys, 100% showed positive result to nickel spot test, 83,3% presented strong positive reaction. 50% exhibited cobalt release as well. Nickel release from keys is very common in our country and may cause a negative impact on sensitized individual's quality of life. Study's results highlight the importance of establishing directives to regulate nickel release in Brazil.

  5. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  6. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  7. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  8. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  9. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  10. Eight Key Facets of Small Business Management.

    Science.gov (United States)

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  11. Quantum key distribution using three basis states

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics; Volume 54; Issue 5. Quantum key distribution using three ... This note presents a method of public key distribution using quantum communication of photons that simultaneously provides a high probability that the bits have not been tampered. It is a variant of the quantum ...

  12. Optimizing Key Updates in Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Sensor networks offer the advantages of simple and low–resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the key points in security, which...

  13. Locks & keys service moves to building 55

    CERN Multimedia

    2012-01-01

    Please note that as of July 12 Locks & keys service will be at building 55 second floor. The opening hours are as follows: 08:30 am to 12:30 pm - 1:30 pm to 5:30 pm. The procedures and rules relating to applications for key and cylinder have not changed. GI-IS Group

  14. Strategy Keys as Tools for Problem Solving

    Science.gov (United States)

    Herold-Blasius, Raja

    2017-01-01

    Problem solving is one of the main competences we seek to teach students at school for use in their future lives. However, when dealing with mathematical problems, teachers encounter a wide variety of difficulties. To foster students' problem-solving skills, the authors developed "strategy keys." Strategy keys can serve as material to…

  15. Secure key distribution by swapping quantum entanglement

    International Nuclear Information System (INIS)

    Song, Daegene

    2004-01-01

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes

  16. A survey on exploring key performance indicators

    Directory of Open Access Journals (Sweden)

    Mohammed Badawy

    2016-12-01

    Full Text Available Key Performance Indicators (KPIs allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI's either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for exploring and predicting key performance indicators (KPIs.

  17. The LOFAR Transients Key Science Project

    NARCIS (Netherlands)

    Stappers, B.; Fender, R.; Wijers, R.

    2009-01-01

    The Transients Key Science Project (TKP) is one of six Key Science Projects of the next generation radio telescope LOFAR. Its aim is the study of transient and variable low-frequency radio sources with an extremely broad science case ranging from relativistic jet sources to pulsars, exoplanets,

  18. Optimal grazing management strategies: evaluating key concepts ...

    African Journals Online (AJOL)

    Finally, overstocking will override key management initiatives, such as effective recovery periods, leading to rangeland degradation. Thus, in variable climates, stocking rate should be set conservatively to allow easier adaptation of animal numbers to rainfall variability from year to year. We suggest several key concepts that ...

  19. Argumentos retóricos sobre Interrupción Voluntaria del Embarazo en Colombia. Análisis jurisprudencial desde la teoría de la argumentación jurídica de Perelman

    Directory of Open Access Journals (Sweden)

    Karolina Naranjo Velasco

    2011-06-01

    Full Text Available RESUMEN El presente trabajo aborda los conceptos planteados por Chaïm Perelman en su teoría de la argumentación, con el fin de lograr una comprensión del razonamiento en las decisiones judiciales tomadas por la Corte Constitucional de Colombia, en relación a tres casos sobre interrupción voluntaria del embarazo (IVE. En primer lugar, se aborda la teoría de la  “Nueva Retórica” de Chaïm Perelman, y en especial su aplicación en el campo del Derecho. A continuación se hace un breve repaso de las premisas de la argumentación y las técnicas argumentativas manteniendo un enfoque de carácter jurídico. Para finalizar, se analiza la motivación de las sentencias de la Corte Constitucional colombiana en materia de IVE, aplicando la descripción e interpretación propuestas por Perelman.   ABSTRACT This paper uses the concepts developed by Chaïm Perelman in his theory of argumentation, in order to understand the argument of the Constitutional Court of Colombia on three cases of voluntary interruption of pregnancy (VIP. First, it addresses the theory of “New Rhetoric” of Chaïm Perelman, and especially its application in law. Secondly, there is a brief approach to the premises and techniques of argument within a legal approach. Finally, we analyze the argumentation of the sentences of the Colombian Constitutional Court on VIP, using the description and interpretation proposed by Perelman

  20. Multiparty quantum key agreement with single particles

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  1. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  2. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  3. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  4. Subcarrier multiplexing optical quantum key distribution

    International Nuclear Information System (INIS)

    Ortigosa-Blanch, A.; Capmany, J.

    2006-01-01

    We present the physical principles of a quantum key distribution system that opens the possibility of parallel quantum key distribution and, therefore, of a substantial improvement in the bit rate of such systems. Quantum mechanics allows for multiple measurements at different frequencies and thus we exploit this concept by extending the concept of frequency coding to the case where more than one radio-frequency subcarrier is used for independently encoding the bits onto an optical carrier. Taking advantage of subcarrier multiplexing techniques we demonstrate that the bit rate can be greatly improved as parallel key distribution is enabled

  5. Key Facts about Seasonal Flu Vaccine

    Science.gov (United States)

    ... Swine Variant Pandemic Other Key Facts About Seasonal Flu Vaccine Language: English (US) Español Recommend on Facebook ... the flu is to get vaccinated each year. Flu Vaccination Why should people get vaccinated against the ...

  6. China demonstrates intercontinental quantum key distribution

    Science.gov (United States)

    Johnston, Hamish

    2017-11-01

    A quantum cryptography key has been shared between Beijing and Vienna using a satellite - allowing the presidents of the Chinese Academy of Sciences and Austrian Academy of Sciences to communicate via a secure video link.

  7. Key Principles of Superfund Remedy Selection

    Science.gov (United States)

    Guidance on the primary considerations of remedy selection which are universally applicable at Superfund sites. Key guidance here include: Rules of Thumb for Superfund Remedy Selection and Role of the Baseline Risk Assessment.

  8. Key Royale bridge five year evaluation.

    Science.gov (United States)

    2013-06-01

    This report describes the design, construction, instrumentation, and five-year evaluation of the Key Royale Bridge substructure. The primary focus was the evaluation of the implementation of highly reactive supplementary cementitious materials (SCM) ...

  9. Keys to Successful EPIQ Business Demonstrator Implementation

    NARCIS (Netherlands)

    Shoikova, Elena; Denishev, Vladislav

    2009-01-01

    Shoikova, E., & Denishev, V. (2009). Keys to Successful EPIQ Business Demonstrator Implementation. Paper presented at the 'Open workshop of TENCompetence - Rethinking Learning and Employment at a Time of Economic Uncertainty-event'. November, 19, 2009, Manchester, United Kingdom: TENCompetence.

  10. Secure image retrieval with multiple keys

    Science.gov (United States)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  11. Coherent one-way quantum key distribution

    Science.gov (United States)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  12. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  13. Renyi information gain on quantum key

    International Nuclear Information System (INIS)

    Brandt, Howard E

    2007-01-01

    The concept of maximum Renyi information gain from quantum key is important in eavesdropping and security analyses of quantum key distribution. It is particularly useful in the design optimization of eavesdropping probes. The present work reviews the quantitative measure of Renyi information gain, its optimization, and application to the design of eavesdropping probes in which single-photon probe states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver

  14. Multipartite secret key distillation and bound entanglement

    International Nuclear Information System (INIS)

    Augusiak, Remigiusz; Horodecki, Pawel

    2009-01-01

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  15. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  16. Soil fauna: key to new carbon models

    OpenAIRE

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; Jiménez, Juan José

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined ...

  17. A Key to the Art of Letters

    DEFF Research Database (Denmark)

    Jensen-Rix, Robert William

    2008-01-01

    The article examines A. Lane's grammar A Key to the Art of Letters and its contexts. Symbolically published at the threshold to the eighteenth century, Lane presents an unusually bold plan to make English a world language. Although Lane's book holds a key position in the development of English...... that Lane is the first to use English as the basis for writing universal grammar, as part of his strategy to promote English as a universal code for learning and science...

  18. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if

  19. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  20. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  1. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  2. Key-Phenomenon and Religious Meaning

    Directory of Open Access Journals (Sweden)

    Lomuscio Vincenzo

    2017-09-01

    Full Text Available In this paper I develop a phenomenology of religious experience through the notion of keyphenomenon. My analysis moves from a general phenomenology of situation, in which we have to relate different phenomena according to a sense. What does “according to a sense” mean? My suggestion is that we should look for a relationship among these data when we find a key-phenomenon (among a series of phenomena that would enlighten all the others. This key-phenomenon would show a non-phenomenal meaning which would make all the others understandable. Each other datum, therefore, becomes the witness of invisible meaning through a key-witness. The key-phenomenon we choose determines the role (i.e., the truth of each datum within its situation. This phenomenological relationship belongs to both the sense of day-life situations, and that one of possible religious situations. If the religious interpretation of a situation depends on our choice of key-phenomenon, or key-witness, we have to define what kind of keyphenomenon constitutes a religious intuition.

  3. Key Frame Extraction in the Summary Space.

    Science.gov (United States)

    Li, Xuelong; Zhao, Bin; Lu, Xiaoqiang; Xuelong Li; Bin Zhao; Xiaoqiang Lu; Lu, Xiaoqiang; Li, Xuelong; Zhao, Bin

    2018-06-01

    Key frame extraction is an efficient way to create the video summary which helps users obtain a quick comprehension of the video content. Generally, the key frames should be representative of the video content, meanwhile, diverse to reduce the redundancy. Based on the assumption that the video data are near a subspace of a high-dimensional space, a new approach, named as key frame extraction in the summary space, is proposed for key frame extraction in this paper. The proposed approach aims to find the representative frames of the video and filter out similar frames from the representative frame set. First of all, the video data are mapped to a high-dimensional space, named as summary space. Then, a new representation is learned for each frame by analyzing the intrinsic structure of the summary space. Specifically, the learned representation can reflect the representativeness of the frame, and is utilized to select representative frames. Next, the perceptual hash algorithm is employed to measure the similarity of representative frames. As a result, the key frame set is obtained after filtering out similar frames from the representative frame set. Finally, the video summary is constructed by assigning the key frames in temporal order. Additionally, the ground truth, created by filtering out similar frames from human-created summaries, is utilized to evaluate the quality of the video summary. Compared with several traditional approaches, the experimental results on 80 videos from two datasets indicate the superior performance of our approach.

  4. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  5. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  6. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  7. Fully device-independent conference key agreement

    Science.gov (United States)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  8. Synchronization in Quantum Key Distribution Systems

    Directory of Open Access Journals (Sweden)

    Anton Pljonkin

    2017-10-01

    Full Text Available In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This paper contains a general description of quantum cryptography principles. A two-line fiber-optic quantum key distribution system with phase coding of photon states in transceiver and coding station synchronization mode was examined. A quantum key distribution system was built on the basis of the scheme with automatic compensation of polarization mode distortions. Single-photon avalanche diodes were used as optical radiation detecting devices. It was estimated how the parameters used in quantum key distribution systems of optical detectors affect the detection of the time frame with attenuated optical pulse in synchronization mode with respect to its probabilistic and time-domain characteristics. A design method was given for the process that detects the time frame that includes an optical pulse during synchronization. This paper describes the main quantum communication channel attack methods by removing a portion of optical emission. This paper describes the developed synchronization algorithm that takes into account the time required to restore the photodetector’s operation state after the photon has been registered during synchronization. The computer simulation results of the developed synchronization algorithm were analyzed. The efficiency of the developed algorithm with respect to synchronization process protection from unauthorized gathering of optical emission is demonstrated herein.

  9. Retóricas de la droga

    OpenAIRE

    Derrida, Jacques

    2010-01-01

    Entrevista a Jacques Derrida.Autrement. No es Ud. un especialista en toxicomanía, sin embargo pensamos -y es un poco lo que presupone esta entrega- que, como filósofo, tenga algo que decir de interés para el campo propio, específico, de la toxicomanía. Así fuese a través de conceptos comunes, tales como dependencia", "libertad", "placer", "goce".

  10. Metropolitan Quantum Key Distribution with Silicon Photonics

    Directory of Open Access Journals (Sweden)

    Darius Bunandar

    2018-04-01

    Full Text Available Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss. Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  11. A Novel Method for Generating Encryption Keys

    Directory of Open Access Journals (Sweden)

    Dascalescu Ana Cristina

    2009-12-01

    Full Text Available The development of the informational society, which has led to an impressive growth of the information volume circulating in the computer networks, has accelerated the evolution and especially the use of modern cryptography instruments. Today, the commercial products use standard cryptographic libraries that implement certified and tested cryptographic algorithms. Instead, the fragility ofencryption algorithms is given by compositional operations like key handling or key generation. In this sense, the article proposes an innovative method to generate pseudorandom numbers which can be used for the construction of secure stream encryption keys. The proposed method is based on the mathematical complements based on the algebra of the finite fields and uses a particularized structure of the linear feedback shift registers.

  12. Metropolitan Quantum Key Distribution with Silicon Photonics

    Science.gov (United States)

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine; Cai, Hong; Long, Christopher M.; Boynton, Nicholas; Martinez, Nicholas; DeRose, Christopher; Chen, Changchen; Grein, Matthew; Trotter, Douglas; Starbuck, Andrew; Pomerene, Andrew; Hamilton, Scott; Wong, Franco N. C.; Camacho, Ryan; Davids, Paul; Urayama, Junji; Englund, Dirk

    2018-04-01

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  13. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  14. KeyPathwayMiner 4.0

    DEFF Research Database (Denmark)

    Alcaraz, Nicolas; Pauling, Josch; Batra, Richa

    2014-01-01

    release of KeyPathwayMiner (version 4.0) that is not limited to analyses of single omics data sets, e.g. gene expression, but is able to directly combine several different omics data types. Version 4.0 can further integrate existing knowledge by adding a search bias towards sub-networks that contain...... (avoid) genes provided in a positive (negative) list. Finally the new release now also provides a set of novel visualization features and has been implemented as an app for the standard bioinformatics network analysis tool: Cytoscape. CONCLUSION: With KeyPathwayMiner 4.0, we publish a Cytoscape app...

  15. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  16. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    Science.gov (United States)

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  17. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  18. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  19. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  20. Key characteristics of different management styles

    OpenAIRE

    AGADZHANYAN A.S.

    2015-01-01

    The article reveals main management styles practiсed by managers all over the world. The author considers key characteristics of management styles, conditions of their using. The paper analyzes cultural differences in management styles in the West and in the East.

  1. Election 2000: The Keys Point to Gore.

    Science.gov (United States)

    Lichtman, Allan J.

    2000-01-01

    Asserts that Vice President Al Gore will be elected in 2000 based on the performance of the Clinton administration. Utilizes the key to the White House, 13 true-or-false diagnostic questions stated as propositions. If five or less are false then the party in power wins. (CMK)

  2. Radiology Aide. Instructor Key [and] Student Manual.

    Science.gov (United States)

    Hartwein, Jon; Dunham, John

    This manual can be used independently by students in secondary health occupations programs or by persons receiving on-the-job training in a radiology department. The manual includes an instructor's key that provides answers to the activity sheets and unit evaluations. The manual consists of the following five units: (1) orientation to radiology;…

  3. Key Competences in vocational education and training

    DEFF Research Database (Denmark)

    Andersen, Ole Dibbern; Kruse, Katrine

    This article presents and discusses how key competences in the school based learning are embedded in the VET curricula during the last five years. It gives an overview of how their role has developed in light of the comprehensive Danish VET reform agreed in 2014 and implemented since August 2015....

  4. Memory for melody and key in childhood.

    Directory of Open Access Journals (Sweden)

    E Glenn Schellenberg

    Full Text Available After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  5. Secure Hybrid Encryption from Weakened Key Encapsulation

    NARCIS (Netherlands)

    D. Hofheinz (Dennis); E. Kiltz (Eike); A. Menezes

    2007-01-01

    textabstractWe put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmetric encryption. Constrained chosen-ciphertext security is a new security notion for KEMs that we propose. It

  6. Public-key encryption with chaos

    Science.gov (United States)

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  7. Quantum key distribution on Hannover Campus

    Energy Technology Data Exchange (ETDEWEB)

    Duhme, Joerg; Franz, Torsten; Werner, Reinhard F. [Leibniz Universitaet Hannover, Institut fuer Theoretische Physik, AG Quanteninformation (Germany); Haendchen, Vitus; Eberle, Tobias; Schnabel, Roman [Albert Einstein Institut, Quantum Interferometry (Germany)

    2012-07-01

    We report on the progress of the implementation of an entanglement-based quantum key distribution on Hannover campus using squeezed gaussian states (continuous variables). This poster focuses on the theoretical aspects of the project. Experimental data has been compared with the theoretical simulation of the experimental setup. We especially discuss effects of the homodyne detection and postprocessing in use on the measurement outcome.

  8. Memory for melody and key in childhood.

    Science.gov (United States)

    Schellenberg, E Glenn; Poon, Jaimie; Weiss, Michael W

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  9. Quantum cryptography beyond quantum key distribution

    NARCIS (Netherlands)

    Broadbent, A.; Schaffner, C.

    2016-01-01

    Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation,

  10. Five Keys for Teaching Mental Math

    Science.gov (United States)

    Olsen, James R.

    2015-01-01

    After studying the Common Core State Standards for Mathematics (CCSSM) and brain-based learning research, James Olsen believes mental math instruction in secondary school mathematics (grades 7-12) and in teacher education programs needs increased attention. The purpose of this article is to share some keys for teaching mental math. Olsen also…

  11. Number Theory and Public-Key Cryptography.

    Science.gov (United States)

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  12. Student Engagement: Key to Personalized Learning

    Science.gov (United States)

    Ferlazzo, Larry

    2017-01-01

    Personalized learning has the potential to greatly improve student achievement--but realistic teachers know that any instructional strategy will only be effective if students are willing to do the work. That is why Larry Ferlazzo emphasizes the importance of weaving intrinsic motivation into every personalized learning classroom. Four key elements…

  13. Time to refine key climate policy models

    Science.gov (United States)

    Barron, Alexander R.

    2018-05-01

    Ambition regarding climate change at the national level is critical but is often calibrated with the projected costs — as estimated by a small suite of energy-economic models. Weaknesses in several key areas in these models will continue to distort policy design unless collectively addressed by a diversity of researchers.

  14. The LOFAR Magnetism Key Science Project

    NARCIS (Netherlands)

    Anderson, James; Beck, Rainer; Bell, Michael; de Bruyn, Ger; Chyzy, Krzysztof; Eislöffel, Jochen; Enßlin, Torsten; Fletcher, Andrew; Haverkorn, Marijke; Heald, George; Horneffer, Andreas; Noutsos, Aris; Reich, Wolfgang; Scaife, Anna; the LOFAR collaboration, [No Value

    2012-01-01

    Measuring radio waves at low frequencies offers a new window to study cosmic magnetism, and LOFAR is the ideal radio telescope to open this window widely. The LOFAR Magnetism Key Science Project (MKSP) draws together expertise from multiple fields of magnetism science and intends to use LOFAR to

  15. Memory for melody and key in childhood

    Science.gov (United States)

    Poon, Jaimie; Weiss, Michael W.

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age. PMID:29077726

  16. Soil fauna: key to new carbon models

    NARCIS (Netherlands)

    Filser, Juliane; Faber, J.H.; Tiunov, Alexei V.; Brussaard, L.; Frouz, J.; Deyn, de G.B.; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, M.; Wall, D.H.; Querner, Pascal; Eijsackers, Herman; Jimenez, Juan Jose

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential

  17. Using USB Keys to Promote Mobile Learning

    Directory of Open Access Journals (Sweden)

    Marilyne Rosselle

    2009-07-01

    Full Text Available M-learning (i.e. mobile learning is a field of e-learning that provides learners learning environments using mobile technology. In this context, learning can take place anywhere and anytime, in open and distance learning. Depending on the type of technology it may be done through software called nomadic (i.e. prepared to mobility. Among these technologies, there are those composed of digital interfaces and with autonomy of treatment: Smartphone, PDA, calculator and even mp3 key. In this article we propose to take into account storage devices as mobile technologies. Our focus was on the USB key. We present a procedure to test whether a learning environment embarked on a USB key can be described as nomadic or not. This procedure has been tested on a sample of three ILE (Interactive Learning Environment. This approach has allowed us to define criteria of nomadism, criteria which were then included in the design of a synchronous Weblog on USB key.

  18. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  19. Expectations as a key element in trusting

    DEFF Research Database (Denmark)

    Rasmussen, Mette Apollo; Hansen, Uffe Kjærgaard; Conradsen, Maria Bosse

    Considering the need for a tangible focus for qualitative research on trusting, we propose that expectations to the behavior of others can provide that. By focusing on expectations, researchers can produce narrative descriptions that explains how trusting develops and changes. Then the key theore...

  20. Key Performance Indicators for Primary Schools.

    Science.gov (United States)

    Strand, Steve

    Focusing mostly on their application for primary schools, this document describes the educational key performance indicators (KPI) employed by the Wendsworth, England, Local Educational Authority (LEA). Indicators are divided into 3 areas, educational context, resource development, and outcomes. Contextual indicators include pupil mobility, home…

  1. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  2. Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform

    Science.gov (United States)

    2011-01-01

    has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can

  3. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  4. Nonmarket economic user values of the Florida Keys/Key West

    Science.gov (United States)

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  5. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  6. GLOBAL TRADE. THE KEY TO TRANSATLANTIC COMPETITIVENESS

    Directory of Open Access Journals (Sweden)

    Mădălina Laura CUCIURIANU

    2015-04-01

    Full Text Available Global trade has an important characteristic in terms of open global markets by means of eliminating barriers to trade and investment. The United States and the European Union, two major international actors and competitors in the economic field, have both the opportunity to change the global trade by concluding the negotiations of the Transatlantic Trade and Investment Partnership. For this reason, this paper tries to find the connections between global trade and transatlantic competitiveness in the way that the global trade can be considered a key to transatlantic competitiveness. The United States and the European Union are global actors and competitors in the global economy and the play field is the global trade. In order to be aware of the importance ofglobal trade in the transatlantic competitiveness, this paper includes also an analysis of the concrete actions that both economic powers are taking in key-sectors of the transatlantic economy.

  7. Quantum key distribution without alternative measurements

    CERN Document Server

    Cabello, A

    2000-01-01

    Entanglement swapping between Einstein-Podolsky-Rosen (EPR) pairs can be used to generate the same sequence of random bits in two remote places. A quantum key distribution protocol based on this idea is described. The scheme exhibits the following features. (a) It does not require that Alice and Bob choose between alternative measurements, therefore improving the rate of generated bits by transmitted qubit. (b) It allows Alice and Bob to generate a key of arbitrary length using a single quantum system (three EPR pairs), instead of a long sequence of them. (c) Detecting Eve requires the comparison of fewer bits. (d) Entanglement is an essential ingredient. The scheme assumes reliable measurements of the Bell operator. (20 refs).

  8. Secure quantum key distribution using squeezed states

    International Nuclear Information System (INIS)

    Gottesman, Daniel; Preskill, John

    2001-01-01

    We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q. If the noise in the quantum channel is weak, squeezing signal states by 2.51 dB (a squeeze factor e r =1.34) is sufficient in principle to ensure the security of a protocol that is suitably enhanced by classical error correction and privacy amplification. Secure key distribution can be achieved over distances comparable to the attenuation length of the quantum channel

  9. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  10. Key parameters analysis of hybrid HEMP simulator

    International Nuclear Information System (INIS)

    Mao Congguang; Zhou Hui

    2009-01-01

    According to the new standards on the high-altitude electromagnetic pulse (HEMP) developed by International Electrotechnical Commission (IEC), the target parameter requirements of the key structure of the hybrid HEMP simulator are decomposed. Firstly, the influences of the different excitation sources and biconical structures to the key parameters of the radiated electric field wave shape are investigated and analyzed. Then based on the influence curves the target parameter requirements of the pulse generator are proposed. Finally the appropriate parameters of the biconical structure and the excitation sources are chosen, and the computational result of the electric field in free space is presented. The results are of great value for the design of the hybrid HEMP simulator. (authors)

  11. A ''master key'' to chemical separation processes

    International Nuclear Information System (INIS)

    Madic, Ch.; Hill, C.

    2002-01-01

    One of the keys to sorting nuclear waste is extracting minor actinides - the most troublesome long-lived elements - from the flow of waste by separating them from lanthanides, which have very similar chemical properties to actinides, for possible transmutation into shorter-lived elements. Thanks to a European initiative coordinated by CEA, this key is now available: its name is Sanex. There now remains to develop tough, straightforward industrial processes to integrate it into a new nuclear waste management approach by 2005. Sanex joins the Diamex process, used for the combined separation of lanthanides and minor actinides from fission products. A third process, Sesame, designed to separate americium, completes the list of available separation processes. (authors)

  12. Privacy amplification for quantum key distribution

    International Nuclear Information System (INIS)

    Watanabe, Yodai

    2007-01-01

    This paper examines classical privacy amplification using a universal family of hash functions. In quantum key distribution, the adversary's measurement can wait until the choice of hash functions is announced, and so the adversary's information may depend on the choice. Therefore the existing result on classical privacy amplification, which assumes the independence of the choice from the other random variables, is not applicable to this case. This paper provides a security proof of privacy amplification which is valid even when the adversary's information may depend on the choice of hash functions. The compression rate of the proposed privacy amplification can be taken to be the same as that of the existing one with an exponentially small loss in secrecy of a final key. (fast track communication)

  13. Molecular beam epitaxy applications to key materials

    CERN Document Server

    Farrow, Robin F C

    1995-01-01

    In this volume, the editor and contributors describe the use of molecular beam epitaxy (MBE) for a range of key materials systems that are of interest for both technological and fundamental reasons. Prior books on MBE have provided an introduction to the basic concepts and techniques of MBE and emphasize growth and characterization of GaAs-based structures. The aim in this book is somewhat different; it is to demonstrate the versatility of the technique by showing how it can be utilized to prepare and explore a range of distinct and diverse materials. For each of these materials systems MBE has played a key role both in their development and application to devices.

  14. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  15. Key Success Factors in Medical Tourism Marketing

    OpenAIRE

    Yung-Sheng Yang

    2013-01-01

    The planners in tourism businesses and medical institutes, the evaluation criteria and dimensions for Medical Tourism Marketing are determined by experts through expert interviews. The weights and correlations among the dimensions and criteria are determined by Analytic Hierarchy Process (AHP) to construct an evaluating indicator model suitable for Medical Tourism Marketing. By organizing the overall weight of the key success factors in Medical Tourism Marketing, the top five indicators conta...

  16. PROVIDING QUALITY – A KEY TO SUCCESS

    OpenAIRE

    Oana Staiculescu; Angel-Cristian Staiculescu

    2012-01-01

    Providing a high quality products and services is a key to business success. That is because high quality promotes customer satisfaction and customer satisfaction has a direct link to business revenue. Clients want quality products and services in order to feel they are getting value for money, especially in these hard economic times. Although it is well known that advertising may win new customers, quality can be the reason to keep them. A good manager is aware that the costs of winning mark...

  17. Cryptographic key generation using handwritten signature

    OpenAIRE

    Freire, Manuel R.; Fiérrez, Julián; Ortega-García, Javier

    2006-01-01

    M. Freire-Santos ; J. Fierrez-Aguilar ; J. Ortega-Garcia; "Cryptographic key generation using handwritten signature", Biometric Technology for Human Identification III, Proc. SPIE 6202 (April 17, 2006); doi:10.1117/12.665875. Copyright 2006 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of...

  18. Key factors of teenagers' mobile advertising acceptance

    OpenAIRE

    Martí Parreño, José; Sanz Blas, Silvia; Ruiz Mafé, Carla; Aldás Manzano, Joaquín

    2013-01-01

    Purpose – The purpose of this paper is to analyse key drivers of teenagers’ attitude toward mobile advertising and its effects on teenagers’ mobile advertising acceptance. Design/methodology/approach – A proposed model of affective (irritation and entertainment) and cognitive (perceived usefulness) antecedents of attitude toward mobile advertising and its effects on mobile advertising acceptance is analysed. The sample consisted of 355 Spanish teenagers. The model was tested us...

  19. Key performance indicators for successful simulation projects

    OpenAIRE

    Jahangirian, M; Taylor, SJE; Young, T; Robinson, S

    2016-01-01

    There are many factors that may contribute to the successful delivery of a simulation project. To provide a structured approach to assessing the impact various factors have on project success, we propose a top-down framework whereby 15 Key Performance Indicators (KPI) are developed that represent the level of successfulness of simulation projects from various perspectives. They are linked to a set of Critical Success Factors (CSF) as reported in the simulation literature. A single measure cal...

  20. Some Key Principles for Developing Grammar Skills

    Institute of Scientific and Technical Information of China (English)

    张威

    2008-01-01

    Grammar is sometimes defined aft"the way words are put together to make correct sentences"(Ur,2004,P.75).The aim of teaching grammar is to raise the rates of the correctness of language use and help the students transfer the isolated language points to apply language.In this essay,the author introduces two kinds of Conlnlon methods in English grammar class. And there are some key principles in grammar teaching.

  1. George's secret key to the universe

    CERN Document Server

    Hawking, Lucy; Galfard, Christophe; Parsons, Gary

    2007-01-01

    In their bestselling book for young readers, noted physicist Stephen Hawking and his daughter, Lucy, provide a grand and funny adventure that explains fascinating information about our universe, including Dr. Hawking's latest ideas about black holes. It's the story of George, who's taken through the vastness of space by a scientist, his daughter, and their super-computer named Cosmos. George's Secret Key to the Universe was a New York Times bestseller and a selection of Al's Book Club on the Today show.

  2. Parallel Device-Independent Quantum Key Distribution

    OpenAIRE

    Jain, Rahul; Miller, Carl A.; Shi, Yaoyun

    2017-01-01

    A prominent application of quantum cryptography is the distribution of cryptographic keys with unconditional security. Recently, such security was extended by Vazirani and Vidick (Physical Review Letters, 113, 140501, 2014) to the device-independent (DI) scenario, where the users do not need to trust the integrity of the underlying quantum devices. The protocols analyzed by them and by subsequent authors all require a sequential execution of N multiplayer games, where N is the security parame...

  3. Feasibility of satellite quantum key distribution

    OpenAIRE

    Bonato, Cristian; Tomaello, Andrea; Da Deppo, Vania; Naletto, Giampiero; Villoresi, Paolo

    2009-01-01

    In this paper we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected e...

  4. Interactive simulations for quantum key distribution

    International Nuclear Information System (INIS)

    Kohnle, Antje; Rizzoli, Aluna

    2017-01-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels. (paper)

  5. Interactive simulations for quantum key distribution

    Science.gov (United States)

    Kohnle, Antje; Rizzoli, Aluna

    2017-05-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.

  6. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  7. Triple symmetric key cryptosystem for data security

    Science.gov (United States)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  8. Key Research Issues in Clostridium difficile

    Directory of Open Access Journals (Sweden)

    George Zhanel

    2005-01-01

    Full Text Available Clostridium difficile is an emerging pathogen that causes C difficile-associated diarrhea, an important nosocomial infection. Control of this infection remains a challenge, and much needs to be determined about the antimicrobial resistance of the organism, antibiotic stewardship, contamination of the patient environment, and various host factors that determine susceptibility or resistance to infection. A national symposium focusing on C difficile infections, the Clostridium difficile Symposium on Emerging Issues and Research, was hosted on November 23, 2004, by the Department of Medical Microbiology and Infectious Diseases at the University of Manitoba, Winnipeg, Manitoba, in partnership with the Canadian Institutes of Health Research. This symposium, which aimed to summarize key research issues regarding C difficile infections in Canada, had the following objectives: to provide a forum for learning and discussion about C difficile and its impact on the health of Canadians; to identify the key research issues that should be addressed; and to explore potential research funding opportunities and collaboration. The present report summarizes key research issues identified for C difficile infections in Canada by addressing four major themes: diagnosis and surveillance, infection prevention and control, antibiotic stewardship, and clinical management.

  9. Commitment is the key to these accounts

    International Nuclear Information System (INIS)

    Yborra, S.

    1996-01-01

    Key accounts--A.G.A.'s name for regional and national multi-unit accounts--affect gas load and market share in several ways. Many make their equipment and energy policies and decisions at the corporate or regional level, making gas company sales and marketing efforts to them critical, since multiple installations will likely emanate from a single decision. To survive, chains often mimic each other; a money-saving idea implemented by one chain can lead to others in that market sector copying it. A successful equipment field trial with one of these accounts can lead to others following suit. Chains also can play a critical role in launching a new or emerging technology. It a gas equipment test demonstrate meets the chain's energy goals, it can lead to a significant number of orders, accelerating a product's market penetration, improving manufacturing economies of scale, lowering prices and speeding up delivery times. A.G.A.'s key-accounts program's marketing activities fall into three basic categories: assisting chain clients, either directly or through members; enhancing members' key-account program development through training and networking; and increasing chains' awareness of the benefits of gas energy, equipment and services through national forums such as trade expos, seminars, conferences and press exposure

  10. Benchmarking Organisational Capability using The 20 Keys

    Directory of Open Access Journals (Sweden)

    Dino Petrarolo

    2012-01-01

    Full Text Available Organisations have over the years implemented many improvement initiatives, many of which were applied individually with no real, lasting improvement. Approaches such as quality control, team activities, setup reduction and many more seldom changed the fundamental constitution or capability of an organisation. Leading companies in the world have come to realise that an integrated approach is required which focuses on improving more than one factor at the same time - by recognising the importance of synergy between different improvement efforts and the need for commitment at all levels of the company to achieve total system-wide improvement.

    The 20 Keys approach offers a way to look at the strenqth of organisations and to systemically improve it, one step at a time by focusing on 20 different but interrelated aspects. One feature of the approach is the benchmarking system which forms the main focus of this paper. The benchmarking system is introduced as an important part of the 20 Keys philosophy in measuring organisational strength. Benchmarking results from selected South African companies are provided, as well as one company's results achieved through the adoption of the 20 Keys philosophy.

  11. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    International Nuclear Information System (INIS)

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  12. Identifying depression among adolescents using three key questions

    DEFF Research Database (Denmark)

    Haugen, Wenche; Haavet, Ole Rikard; Sirpal, Manjit Kaur

    2016-01-01

    Depression rammer mange voksne mennesker. Dette studie, som er omtalt i BMJ, viser, at et spørgeskema med blot tre spørgsmål ret præcist kan identificere voksne med depression. Undersøgelsen viser også, at de samme spørgsmål med fordel kan stilles verbalt ved diagnosticering af depression hos unge...... mennesker. Studiet ledsages af en redaktionel kommentar, der understreger betydningen af diagnosticering af depression hos mennesker. Mange unge har kun sjældent kontakt med deres praktiserende læge. Derfor kan mange gå i lang tid med depression, uden at det bliver opdaget og behandlet. De tre enkle...... spørgsmål, der kredser om interesse (eller mangel på interesse) for daglige aktiviteter og følelser som nedtrykthed eller håbløshed, kan være et godt pejlemærke for evt. depression hos unge, som ellers let kan blive overset....

  13. Soil fauna: key to new carbon models

    Science.gov (United States)

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; De Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; José Jiménez, Juan

    2016-11-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined mostly in terms of plant residue quality and input and microbial decomposition, overlooking the significant regulation provided by soil fauna. The fauna controls almost any aspect of organic matter turnover, foremost by regulating the activity and functional composition of soil microorganisms and their physical-chemical connectivity with soil organic matter. We demonstrate a very strong impact of soil animals on carbon turnover, increasing or decreasing it by several dozen percent, sometimes even turning C sinks into C sources or vice versa. This is demonstrated not only for earthworms and other larger invertebrates but also for smaller fauna such as Collembola. We suggest that inclusion of soil animal activities (plant residue consumption and bioturbation altering the formation, depth, hydraulic properties and physical heterogeneity of soils) can fundamentally affect the predictive outcome of SOM models. Understanding direct and indirect impacts of soil fauna on nutrient availability, carbon sequestration, greenhouse gas emissions and plant growth is key to the understanding of SOM dynamics in the context of global carbon cycling models. We argue that explicit consideration of soil fauna is essential to make realistic modelling predictions on SOM dynamics and to detect expected non-linear responses of SOM dynamics to global change. We present a decision framework, to be further developed through the activities of KEYSOM, a European COST Action, for when mechanistic SOM models

  14. Quantum key distribution with entangled photon sources

    International Nuclear Information System (INIS)

    Ma Xiongfeng; Fung, Chi-Hang Fred; Lo, H.-K.

    2007-01-01

    A parametric down-conversion (PDC) source can be used as either a triggered single-photon source or an entangled-photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. We fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis-independent source, we apply Koashi and Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and the Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144-km open-air PDC experiment, we compare three implementations: entanglement PDC QKD, triggering PDC QKD, and coherent-state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent-state QKD. The coherent-state QKD with decoy states is able to achieve highest key rate in the low- and medium-loss regions. By applying the Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70 dB combined channel losses (35 dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53 dB channel losses

  15. Key-data of energy (June 2001)

    International Nuclear Information System (INIS)

    2001-06-01

    The energy actors and the economical context of energy are changing: the world exchanges and the deregulation of markets impose to dispose of reliable and relevant indicators to understand the French energy choices and stakes and to compare them with the European and worldwide data. This 2001 edition of the key energy data of France aims at shading light on the French energy policy which is based on: an imperative of supply security, an abatement of CO 2 emissions and a respect of environment, a growth of the economic competitiveness, a maintenance of the public utility missions, and on employment. Graphs, curves, charts and appendixes illustrate and complete this document. (J.S.)

  16. Data key to quest for quality.

    Science.gov (United States)

    Chang, Florence S; Nielsen, Jon; Macias, Charles

    2013-11-01

    Late-binding data warehousing reduces the time it takes to obtain data needed to make crucial decisions. Late binding refers to when and how tightly data from the source applications are bound to the rules and vocabularies that make it useful. In some cases, data can be seen in real time. In historically paper-driven environments where data-driven decisions may be a new concept, buy-in from clinicians, physicians, and hospital leaders is key to success in using data to improve outcomes.

  17. Stahlschüssel key to steel

    CERN Document Server

    Wegst, W S

    2016-01-01

    The Key to Steel (Stahlschlüssel/Stahlschluessel) cross reference book will help you to decode / decipher steel designations and find equivalent materials worldwide. The 2016 edition includes more than 70,000 standard designations and trade names from approximately 300 steelmakers and suppliers. Presentation is trilingual: English, French, and German. Materials covered include structural steels, tool steels, valve steels, high temperature steels and alloys, stainless and heat-resisting steels, and more. Standards and designations from 25 countries are cross-referenced.

  18. Noiseless Steganography The Key to Covert Communications

    CERN Document Server

    Desoky, Abdelrahman

    2012-01-01

    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise b

  19. Key Developments in Ionic Liquid Crystals

    OpenAIRE

    Fernandez, A.A.; Kouwer, P.H.J.

    2016-01-01

    Ionic liquid crystals are materials that combine the classes of liquid crystals and ionic liquids. The first one is based on the multi-billion-dollar flat panel display industry, whilst the latter quickly developed in the past decades into a family of highly-tunable non-volatile solvents. The combination yields materials with a unique set of properties, but also with many challenges ahead. In this review, we provide an overview of the key concepts in ionic liquid crystals, particularly from a...

  20. NCAP projection displays: key issues for commercialization

    Science.gov (United States)

    Tomita, Akira; Jones, Philip J.

    1992-06-01

    Recently there has been much interest in a new polymer nematic dispersion technology, often called as NCAP, PDLC, PNLC, LCPC, etc., since projection displays using this technology have been shown to produce much brighter display images than projectors using conventional twisted nematic (TN) lightvalves. For commercializing projection displays based on this polymer nematic dispersion technology, the new materials must not only meet various electro- optic requirements, e.g., operational voltage, `off-state'' scattering angle, voltage holding ratio and hysteresis, but must also be stable over the lifetime of the product. This paper reports recent progress in the development of NCAP based projection displays and discusses some of the key commercialization issues.

  1. Public key cryptography from weaker assumptions

    DEFF Research Database (Denmark)

    Zottarel, Angela

    This dissertation is focused on the construction of public key cryptographic primitives and on the relative security analysis in a meaningful theoretic model. This work takes two orthogonal directions. In the first part, we study cryptographic constructions preserving their security properties also...... in the case the adversary is granted access to partial information about the secret state of the primitive. To do so, we work in an extension of the standard black-box model, a new framework where possible leakage from the secret state is taken into account. In particular, we give the first construction...

  2. Ocean energy: key legal issues and challenges

    International Nuclear Information System (INIS)

    Wright, Glen; Rochette, Julien; O'Hagan, Anne Marie; De Groot, Jiska; Leroy, Yannick; Soininen, Niko; Salcido, Rachael; Castelos, Montserrat Abad; Jude, Simon; Kerr, Sandy

    2015-01-01

    Ocean energy is a novel renewable energy resource being developed as part of the push towards a 'Blue Economy'. The literature on ocean energy has focused on technical, environmental, and, increasingly, social and political aspects. Legal and regulatory factors have received less attention, despite their importance in supporting this new technology and ensuring its sustainable development. In this Issue Brief, we set out some key legal challenges for the development of ocean energy technologies, structured around the following core themes of marine governance: (i) international law; (ii) environmental impacts; (iii) rights and ownership; (iv) consenting processes; and (v) management of marine space and resources. (authors)

  3. 5 keys to business analytics program success

    CERN Document Server

    Boyer, John; Green, Brian; Harris, Tracy; Van De Vanter, Kay

    2012-01-01

    With business analytics is becoming increasingly strategic to all types of organizations and with many companies struggling to create a meaningful impact with this emerging technology, this work-based on the combined experience of 10 organizations that display excellence and expertise on the subject-shares the best practices, discusses the management aspects and sociology that drives success, and uncovers the five key aspects behind the success of some of the top business analytics programs in the industry. Readers will learn about numerous topics, including how to create and manage a changing

  4. Local innovation: The key to globalisation

    Directory of Open Access Journals (Sweden)

    Srivardhini K. Jha

    2013-12-01

    Full Text Available The round table discussion draws the panellists to weigh in on how multinational enterprises from developed countries are innovating in and for emerging markets, the challenges faced, and lessons learnt. The key takeaways are that MNEs are increasingly innovating for the Indian market, alongside their contribution to global products. They are doing so by developing close relationships with field facing organisations, co-creating with customers, empowering engineers, and taking a clean slate approach to product development. This approach has given them dividends not only in the local market but also in the global market.

  5. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  6. Geotechnics - the key to ground water protection

    DEFF Research Database (Denmark)

    Baumann, Jens; Foged, Niels; Jørgensen, Peter

    2000-01-01

    During the past 5 to 10 years research into ground water protection has proved that fractures in clay till may increase the hydraulic conductivity and herby the vulnerability of the ground water considerably. However, research has not identified a non-expensive and efficient method to map...... the fracture conditions of the various clay tills. Tests performed at the Danish Geotechnical Institute with large undisturbed columns of clay till show that there is a relation between the strength of the clay till and the hydraulic conductivity. Geotechnical methods may therefore be the key to determine...

  7. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  8. Key rate of quantum key distribution with hashed two-way classical communication

    International Nuclear Information System (INIS)

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  9. Il governo della performance dei processi di business : dai Key Performance Indicators ai Key Risk Indicators

    OpenAIRE

    Sergio Beretta; Saverio Bozzolan

    2013-01-01

    The recent paper issued by COSO ["Developing Key Risk Indicators to Strengthen Enterprise Risk Management" (Coso, 2010)] is the starting point of this article whose aim is to discuss the relevance of the business process dimension in the design and implementation of Key Risk Indicators. The Authors analyze the reasons of the systematic underestimation of the business process dimension in the COSO papers and debate the implications that the explicit consideration of the business process dimens...

  10. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  11. Careful assessment key in managing prostatitis.

    Science.gov (United States)

    Gujadhur, Rahul; Aning, Jonathan

    2015-04-01

    Prostatitis is a common condition estimated to affect up to 30% of men in their lifetime, it is most prevalent in men aged between 35 and 50. Prostatitis is subclassified into: acute bacterial prostatitis, chronic bacterial prostatitis, chronic pelvic pain and asymptomatic inflammatory prostatitis. Acute bacterial prostatitis presents with acute onset pelvic pain which may or may not be related to voiding, lower urinary tract symptoms, sometimes haematuria or haematospermia and systemic symptoms such as fever and rigors. A documented history of recurrent urinary tract infections is the key feature of chronic bacterial prostatitis. Duration of symptoms > 3 months defines chronicity. The key symptom of chronic pelvic pain syndrome is pain. Patients may describe pain during or after ejaculation as their predominant symptom. Clinical assessment includes a thorough history and examination. A digital rectal examination should be performed after a midstream urine (MSU) sample has been collected for urine dipstick, microscopy and culture. The prostate should be checked for nodules. In acute bacterial prostatitis the MSU is the only laboratory investigation required. Chronic pelvic pain syndrome may be multifactorial and part of a more generalised pain disorder. Pelvic floor muscle abnormalities, altered neuroendocrine pathways, chemically induced inflammation, bacterial infection, autoimmune processes, dysfunctional voiding as well intraprostatic ductal reflux mechanisms have all been identified in men with chronic pelvic pain syndrome.

  12. Fully Device-Independent Quantum Key Distribution

    Science.gov (United States)

    Vazirani, Umesh; Vidick, Thomas

    2014-10-01

    Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

  13. SARS: Key factors in crisis management.

    Science.gov (United States)

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  14. KEY FACTORS IN MARKETING FOCUSED SERVICES BUSINESSES

    Directory of Open Access Journals (Sweden)

    Doris Yohanna Martínez Castrillón

    2016-07-01

    Full Text Available This article aims to identify the key success factors in the marketing area and describe them as managerial allies for companies that wish to position themselves in the market under a good sustainable performance , for it has been consulted theoretical references of Marketing as a management partner with collection and integration of data. Methodologically, it is located within the type of descriptive research field, with a design of transactional non-experimental, with an intentional non-probabilistic stratified sample of four reporting units. The findings established fifteen (15 points of influence called "key success factors (FCE in the area of marketing, and managerial allies of service companies in the security, surveillance and protection sector in industrial, commercial and residential sectors. Finally, it is intended that the actions of marketing service companies should focus to the welfare of both the organization, such as users, both in the environment, and economic, social and technological, characterized by ethics, sustainable development and transparency to respond appropriately.

  15. A Recommended Set of Key Arctic Indicators

    Science.gov (United States)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  16. Keys of educational change in Ecuador

    Directory of Open Access Journals (Sweden)

    Agustín De la Herrán Gascón

    2018-01-01

    Full Text Available The article analyzes the educational system in Ecuador. The Ecuadorian education system arouses international interest, especially in Latin America. In this essay we will try to answer these questions: What might be the relevant keys from the public education in Ecuador? Why has it reached its present level of development, particularly in inclusive education? What fundaments and policies are behind the results of the goals from Education for All (EFA 2000-2015 From the Dakar framework for Action? (World Education Forum, 2000. In light of these issues, the goal is to understand key factors and reasons that have contributed to the development of the Ecuadorian public education. In terms of methodology, the approach is qualitative, dialectical, documentary and descriptive (Mc Millan and Schumacher, 2005. The research is proposed as a case study, where the choice of the case is justified by its novelty, its degree of development and its emphasis on inclusion and equity in all educational levels. With this aim, it is made a descriptive analysis of the rules underlying the changes in the educational system in Ecuador in the last three decades and it is carried out, particularly since 2008, following the last Constitution (Constituent Assembly, 2008. Tables as an analytical contribution of the authors are offered. Also data endorsed by authors and agencies of maximum national and international prestige are detailed and they realize the effectiveness of policies and such changes.

  17. Key attributes of expert NRL referees.

    Science.gov (United States)

    Morris, Gavin; O'Connor, Donna

    2017-05-01

    Experiential knowledge of elite National Rugby League (NRL) referees was investigated to determine the key attributes contributing to expert officiating performance. Fourteen current first-grade NRL referees were asked to identify the key attributes they believed contributed to their expert refereeing performance. The modified Delphi method involved a 3-round process of an initial semi-structured interview followed by 2 questionnaires to reach consensus of opinion. The data revealed 25 attributes that were rated as most important that underpin expert NRL refereeing performance. Results illustrate the significance of the cognitive category, with the top 6 ranked attributes all cognitive skills. Of these, the referees ranked decision-making accuracy as the most important attribute, followed by reading the game, communication, game understanding, game management and knowledge of the rules. Player rapport, positioning and teamwork were the top ranked game skill attributes underpinning performance excellence. Expert referees also highlighted a number of psychological attributes (e.g., concentration, composure and mental toughness) that were significant to performance. There were only 2 physiological attributes (fitness, aerobic endurance) that were identified as significant to elite officiating performance. In summary, expert consensus was attained which successfully provided a hierarchy of the most significant attributes of expert NRL refereeing performance.

  18. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.; Ferreira, Luciana C.; Sequeira, Ana M.M.; Meekan, Mark G.; Duarte, Carlos M.; Bailey, Helen; Bailleul, Fred; Bowen, W. Don; Caley, M. Julian; Costa, Daniel P.; Eguí luz, Victor M.; Fossette, Sabrina; Friedlaender, Ari S.; Gales, Nick; Gleiss, Adrian C.; Gunn, John; Harcourt, Rob; Hazen, Elliott L.; Heithaus, Michael R.; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L.; Lowe, Christopher G.; Madsen, Peter T.; Marsh, Helene; Phillips, Richard A.; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A.; Simpfendorfer, Colin A.; Sims, David W.; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N.; Wikelski, Martin; Womble, Jamie N.; Thums, Michele

    2016-01-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  19. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.

    2016-03-12

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  20. Key Nuclear Verification Priorities: Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  1. Key Nuclear Verification Priorities - Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  2. Talent Management: Working lines and key processes

    Directory of Open Access Journals (Sweden)

    Alvaro Alonso

    2014-12-01

    Full Text Available Purpose: Talent management represents today a challenge for companies, since the contribution of value comes increasingly from the area of intangible capital. The current paradigm of expanding technology and competitive dynamics, makes talent management that companies realize a critical success factor in today's markets. However, there is no generally accepted theoretical framework and empirical studies sufficient to demonstrate the role of talent management in creating competitive advantage. Therefore, the first objective of this paper is to analyze the evolution of talent management, to understand more deeply their fundamental dimensions: people and key positions in the organization. From these dimensions, as a second objective of the research is proposed to classify and characterize the literature about four alternative ways of study, according to the treatment they receive such dimensions and thus improve understanding of the role of talent management in business strategyDesign/methodology: To develop this paper we have selected the major contributions to the field of talent management, with particular emphasis on certain meta-analysis very quoted by the scientific community (Lewis and Heckman, 2006; Mellahi and Collings, 2009; Tarique and Schuler, 2010. In addition we have select additional papers published in high impact journals seen in ABI/Inform, Science Direct, SCOPUS, and EBSCO (Business Source Complete, through the keywords "Gestion del talento", "Plan de Gestion del Talento" and "Modelo de Gestion de Talento" and its English equivalent "Talent Management ", "Talent Management Plans/Systems" and "Talent Management Framework/Model ".Findings: From this review, we extracted the existence of different ways of understanding and talent management apply in organizations and even different understandings of what is talent itself. For this, we describe the basic dimensions of talent management (people and key positions and four alternative

  3. Key Lake Mining Corporation metallurgical complex

    International Nuclear Information System (INIS)

    Lendrum, F.C.

    1984-02-01

    The Key Lake uranium mine is located in Saskatchewan, 550 km northeast of Saskatoon. It began operations in 1983, and is licensed and regulated by both Saskatchewan government agencies and the Canadian Atomic Energy Control Board. This report examines the metallurgical processes used at the mill and discusses the spills that occurred in the first four months the mine was in operation. It finds that all spills of an acidic nature in the mill were small amounts in the CCD or solution pretreatment sections. Contingency procedures are in place and sumps are capable of handling spills. The only major change in design contemplated will be converting the secondary crushing from the use of an impact crusher to the use of a semi-autogeneous grinding mill. The monitoring program set out by the AECB and Saskatchewan Environment is thorough. It monitors effluents and water pathways, and includes aquatic biota and sediments. Air monitoring is also required by Saskatchewan Environment

  4. Key policy choices in groundwater quality management

    International Nuclear Information System (INIS)

    Batie, S.S.; Diebel, P.L.

    1990-01-01

    The fundamental policy choice of who has the right to do what to whom is a pivotal issue of governance. Over the last few decades, the answer to that question has become more restrictive to those who own and use natural resources as inputs into production processes. Increasingly, the beneficiaries of new policy initiatives are those who desire higher protection of groundwater quality. With respect to groundwater management, policy design increasingly reflects such diverse interests as agriculturists, industrialists, homeowners, local government officials and state officials. Policy design is becoming complex, in part because of this diversity and in part because scientific uncertainty hampers informed policy design. No umbrella federal legislation exists for managing groundwater resources. EPA's role has been mainly an advisory one on groundwater issues. The difficulties and responsibilities of protecting groundwater thus remain with the states. For the near future, it is the states that will address key policy choices with respect to groundwater quality management issues

  5. Key Developments in Ionic Liquid Crystals.

    Science.gov (United States)

    Alvarez Fernandez, Alexandra; Kouwer, Paul H J

    2016-05-16

    Ionic liquid crystals are materials that combine the classes of liquid crystals and ionic liquids. The first one is based on the multi-billion-dollar flat panel display industry, whilst the latter quickly developed in the past decades into a family of highly-tunable non-volatile solvents. The combination yields materials with a unique set of properties, but also with many challenges ahead. In this review, we provide an overview of the key concepts in ionic liquid crystals, particularly from a molecular perspective. What are the important molecular parameters that determine the phase behavior? How should they be introduced into the molecules? Finally, which other tools does one have to realize specific properties in the material?

  6. Key Developments in Ionic Liquid Crystals

    Directory of Open Access Journals (Sweden)

    Alexandra Alvarez Fernandez

    2016-05-01

    Full Text Available Ionic liquid crystals are materials that combine the classes of liquid crystals and ionic liquids. The first one is based on the multi-billion-dollar flat panel display industry, whilst the latter quickly developed in the past decades into a family of highly-tunable non-volatile solvents. The combination yields materials with a unique set of properties, but also with many challenges ahead. In this review, we provide an overview of the key concepts in ionic liquid crystals, particularly from a molecular perspective. What are the important molecular parameters that determine the phase behavior? How should they be introduced into the molecules? Finally, which other tools does one have to realize specific properties in the material?

  7. Secure Key Management in the Cloud

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus

    2013-01-01

    information such as cryptographic keys. Applications like this include many cases where secure multiparty computation is outsourced to the cloud, and in particular a number of online auctions and benchmark computations with confidential inputs. We consider fully autonomous servers that switch between online......We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive...... and offline periods without communicating with anyone from outside the cloud, and semi-autonomous servers that need a limited kind of assistance from outside the cloud when doing the transition. We study the levels of security one can – and cannot – obtain in this model, propose light-weight protocols...

  8. Climate Watchlist: Key issues for Cancun negotiations

    Energy Technology Data Exchange (ETDEWEB)

    Chandani, Achala; Siegele, Linda

    2010-11-15

    We must mitigate and adapt to climate change. On this, the international community is agreed. But exactly how to do that is still up for debate. There were high hopes that last year's UN climate talks in Copenhagen would deliver a legally binding agreement for action on climate change. But the outcome — the Copenhagen Accord — was instead a political 'statement of intent' that fell significantly short of expectations. Now, after a year of interim meetings and several negotiating texts, parties to the UN Framework Convention on Climate Change (UNFCCC) are gathering in Cancun, Mexico, to try again. Their success will largely depend on settling disputes — particularly between the developed and developing world — about six key issues: shared vision; adaptation; climate finance; technology transfer; reducing emissions from deforestation and degradation; and post-2012 emissions reduction targets.

  9. Accountability in district nursing practice: key concepts.

    Science.gov (United States)

    Griffith, Richard

    2015-03-01

    Public trust and confidence in district nurses is essential to the nurse-patient relationship that underpins effective care and treatment. That trust and confidence has even greater focus for district nurses who care for patients in their own homes. Those patients need to be able to count on the professionalism and probity of their district nurses. The professionalism and probity of district nurses is based on their accountability, which protects the public by imposing standards on district nurses and holds them answerable for their acts and omissions. This is the first of a series of articles on accountability in district nursing practice to mark the introduction of the revised Nursing and Midwifery Code on the 31 March 2015. This month's article considers the key concepts of accountability.

  10. Phosphoinositides: Key modulators of energy metabolism☆

    Science.gov (United States)

    Bridges, Dave; Saltiel, Alan R.

    2014-01-01

    Phosphoinositides are key players in many trafficking and signaling pathways. Recent advances regarding the synthesis, location and functions of these lipids have dramatically improved our understanding of how and when these lipids are generated and what their roles are in animal physiology. In particular, phosphoinositides play a central role in insulin signaling, and manipulation of PtdIns(3,4,5)P3 levels in particular, may be an important potential therapeutic target for the alleviation of insulin resistance associated with obesity and the metabolic syndrome. In this article we review the metabolism, regulation and functional roles of phosphoinositides in insulin signaling and the regulation of energy metabolism. This article is part of a Special Issue entitled Phosphoinositides. PMID:25463477

  11. Key Questions in Marine Megafauna Movement Ecology.

    Science.gov (United States)

    Hays, Graeme C; Ferreira, Luciana C; Sequeira, Ana M M; Meekan, Mark G; Duarte, Carlos M; Bailey, Helen; Bailleul, Fred; Bowen, W Don; Caley, M Julian; Costa, Daniel P; Eguíluz, Victor M; Fossette, Sabrina; Friedlaender, Ari S; Gales, Nick; Gleiss, Adrian C; Gunn, John; Harcourt, Rob; Hazen, Elliott L; Heithaus, Michael R; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L; Lowe, Christopher G; Madsen, Peter T; Marsh, Helene; Phillips, Richard A; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A; Simpfendorfer, Colin A; Sims, David W; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N; Wikelski, Martin; Womble, Jamie N; Thums, Michele

    2016-06-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Teamwork the key to good patient care.

    Science.gov (United States)

    Baillie, Jonathan

    2013-05-01

    In a year when, with the inception of the new Clinical Commissioning Groups, the way that healthcare is procured and delivered will see radical changes, this month's HefmA 2013 National Conference & Exhibition will have as its theme, 'Many Players, One Goal: The Patient'. As HEJ editor, Jonathan Baillie reports, among the wide-ranging estates and facilities topics set for discussion will be 'Getting the patient environment right'; 'Dementia Building for the Future'; 'Waterborne Infections; Lessons Learned'; 'Incorporating lean thinking into design', and the key challenges faced by the estates and facilities sector. The keynote address, touching on a wide range of issues common to all large organisations, will be given by one of the best known 'women in football', and will also reflect particularly on the importance of teamwork.

  13. Security of practical quantum key distribution systems

    Energy Technology Data Exchange (ETDEWEB)

    Jain, Nitin

    2015-02-24

    This thesis deals with practical security aspects of quantum key distribution (QKD) systems. At the heart of the theoretical model of any QKD system lies a quantum-mechanical security proof that guarantees perfect secrecy of messages - based on certain assumptions. However, in practice, deviations between the theoretical model and the physical implementation could be exploited by an attacker to break the security of the system. These deviations may arise from technical limitations and operational imperfections in the physical implementation and/or unrealistic assumptions and insufficient constraints in the theoretical model. In this thesis, we experimentally investigate in depth several such deviations. We demonstrate the resultant vulnerabilities via proof-of-principle attacks on a commercial QKD system from ID Quantique. We also propose countermeasures against the investigated loopholes to secure both existing and future QKD implementations.

  14. BENCHMARKING - PRACTICAL TOOLS IDENTIFY KEY SUCCESS FACTORS

    Directory of Open Access Journals (Sweden)

    Olga Ju. Malinina

    2016-01-01

    Full Text Available The article gives a practical example of the application of benchmarking techniques. The object of study selected fashion store Company «HLB & M Hennes & Mauritz», located in the shopping center «Gallery», Krasnodar. Hennes & Mauritz. The purpose of this article is to identify the best ways to develop a fashionable brand clothing store Hennes & Mauritz on the basis of benchmarking techniques. On the basis of conducted market research is a comparative analysis of the data from different perspectives. The result of the author’s study is a generalization of the ndings, the development of the key success factors that will allow to plan a successful trading activities in the future, based on the best experience of competitors.

  15. Bench press exercise: the key points.

    Science.gov (United States)

    Padulo, J; Laffaye, G; Chaouachi, A; Chamari, K

    2015-06-01

    The bench press exercise (BPE) is receiving increasing interest as a field testing, training/therapeutic modality to improve neuromuscular performance or to increase bone mass density. Several studies have been performed using BPE as a standard for increasing upper-limb strength. For this purpose, the position of the bar, the loads, the sets, the number of repetitions, the recovery time in-between sets, the movement speed, the muscular work and the use of the determination of the one repetition maximum (1-RM) are the classical tools investigated in the literature that have been shown to affect the BPE effect on neuromuscular. The goal of the present short review is to make a picture of the current knowledge on the bench press exercise, which could be very helpful for a better understanding of this standard movement and its effects. Based on the related literature, several recommendations on these key points are presented here.

  16. Low-Power Public Key Cryptography

    Energy Technology Data Exchange (ETDEWEB)

    BEAVER,CHERYL L.; DRAELOS,TIMOTHY J.; HAMILTON,VICTORIA A.; SCHROEPPEL,RICHARD C.; GONZALES,RITA A.; MILLER,RUSSELL D.; THOMAS,EDWARD V.

    2000-11-01

    This report presents research on public key, digital signature algorithms for cryptographic authentication in low-powered, low-computation environments. We assessed algorithms for suitability based on their signature size, and computation and storage requirements. We evaluated a variety of general purpose and special purpose computing platforms to address issues such as memory, voltage requirements, and special functionality for low-powered applications. In addition, we examined custom design platforms. We found that a custom design offers the most flexibility and can be optimized for specific algorithms. Furthermore, the entire platform can exist on a single Application Specific Integrated Circuit (ASIC) or can be integrated with commercially available components to produce the desired computing platform.

  17. Key indicators for organizational performance measurement

    Directory of Open Access Journals (Sweden)

    Firoozeh Haddadi

    2014-09-01

    Full Text Available Each organization for assessing the amount of utility and desirability of their activities, especially in complex and dynamic environments, requires determining and ranking the vital performance indicators. Indicators provide essential links among strategy, execution and ultimate value creation. The aim of this paper is to develop a framework, which identifies and prioritizes Key Performance Indicators (KPIs that a company should focus on them to define and measure progress towards organizational objectives. For this purpose, an applied research was conducted in 2013 in an Iranian telecommunication company. We first determined the objectives of the company with respect to four perspectives of BSC (Balanced Scorecard framework. Next, performance indicators were listed and paired wise comparisons were accomplished by company's high-ranked employees through standard Analytic Hierarchy Process (AHP questionnaires. This helped us establish the weight of each indicator and to rank them, accordingly.

  18. Adaptation to climate change. Key terms

    International Nuclear Information System (INIS)

    Levina, E.; Tirpak, D.

    2006-05-01

    Adaptation has become an important issue in international and domestic discussions on climate change. Numerous terms and concepts have come into common usage as a result of IPCC reports, discussions in the context of the UNFCCC and dialogs by the climate community at large. This paper examines the key adaptation terms and concepts used by the climate change community and other institutions. Conflicts and contradictions are noted with the aim of sensitizing different bodies to the differences, but particularly the Parties to the Convention and experts participating in the IPCC. Given the need to promote a common understanding among various stakeholders and the potential financial implications of various definitions, it appears important for the IPCC and the UNFCCC to work toward common definitions, at least for a core set of terms and concepts

  19. Key Value Considerations for Consultant Pharmacists.

    Science.gov (United States)

    Meyer, Lee; Perry, Ronald G; Rhodus, Susan M; Stearns, Wendy

    2016-07-01

    Managing the efficiency and costs of residents' drug regimens outside the acute-care hospital and through transitions of care requires a toolbox filled with cost-control tools and careful collaboration among the pharmacy provider(s), facility staff, and the consultant/senior care pharmacist. This article will provide the reader with key long-term care business strategies that affect the profitability of the pharmacy provider in various care settings while, at the same time, ensuring optimal therapy for residents as they transition across levels of care. Readers can take away ideas on how to access critical information, what they can do with this information, and how they can improve the overall care process. Four experts in various aspects of pharmacy management share their insights on pharmacy practice issues including formulary management, performance metrics, short-cycle dispensing challenges/solutions, cost-control measures, facility surveys, billing practices, medication reconciliation, prospective medication reviews, and transitions of care.

  20. Key world energy statistics. 2004 edition

    International Nuclear Information System (INIS)

    2004-01-01

    Key World Energy Statistics from the IEA contains timely, clearly-presented data on the supply, transformation and consumption of all major energy sources. The IEA energy balances and statistics databases on CD-Rom provide annual historical energy data extracted from four IEA/OECD data bases: energy statistics and energy balances, which contain data for most of the OECD countries for the years 1960 to 2002 and energy statistics and balances for more than 100 non-OECD countries for the years 1971 to 2002. The CDs and/or hard-copies and PDFs can be purchased individually: Energy Balances of OECD Countries 2004; Energy Statistics of OECD Countries 2004; Energy Balances of Non OECD Countries 2004; Energy Statistics of Non-OECD Countries 2004