WorldWideScience

Sample records for molecular keys unlock

  1. The Molecular Apgar Score: A Key to Unlocking Evolutionary Principles.

    Science.gov (United States)

    Torday, John S; Nielsen, Heber C

    2017-01-01

    such, these molecular elements can be examined using a Molecular Apgar evaluation of keystone evolutionary events that predict successful evolutionary adaptation of physiologic functions necessary for neonatal transition and survival.

  2. Molecular keys unlock the mysteries of variable survival responses of blue crabs to hypoxia.

    Science.gov (United States)

    Bell, Geoffrey W; Eggleston, David B; Noga, Edward J

    2010-05-01

    Hypoxia is a major stressor in coastal ecosystems, yet generalizing its impacts on fish and shellfish populations across hypoxic events is difficult due to variability among individuals in their history of exposure to hypoxia and related abiotic variables, and subsequent behavioral and survival responses. Although aquatic animals have diverse physiological responses to cope with hypoxia, we know little about how inter-individual variation in physiological state affects survival and behavioral decisions under hypoxic conditions. Laboratory experiments coupled with molecular techniques determined how extrinsic factors (e.g., water body and temperature) and respiratory physiology (hemocyanin concentration and structure) affected survival and behavior of adult blue crabs (Callinectes sapidus) exposed to different levels of hypoxia over a 30-h time period. Nearly 100% of crabs survived the 1.3 mg dissolved oxygen (DO) l(-1) treatment (18.4% air saturation), suggesting that adult blue crabs are tolerant of severe hypoxia. Probability of survival decreased with increasing hypoxic exposure time, lower DO, and increasing temperature. Individual-level differences in survival correlated with water body and crab size. Crabs collected from the oligo/mesohaline and hypoxic Neuse River Estuary (NRE), North Carolina, USA survived hypoxic exposures longer than crabs from the euhaline and normoxic Bogue and Back Sounds, North Carolina. Furthermore, small NRE crabs survived longer than large NRE crabs. Hemocyanin (Hcy) concentration did not explain these individual-level differences, however, hypoxia-tolerant crabs had Hcy structures indicative of a high-O(2)-affinity form of Hcy, suggesting Hcy "quality" (i.e., structure) may be more important for hypoxia survival than Hcy "quantity" (i.e., concentration). The geographic differences in survival we observed also highlight the importance of carefully selecting experimental animals when planning to extrapolate results to the population

  3. Genomics as the key to unlocking the polyploid potential of wheat.

    Science.gov (United States)

    Borrill, Philippa; Adamski, Nikolai; Uauy, Cristobal

    2015-12-01

    Polyploidy has played a central role in plant genome evolution and in the formation of new species such as tetraploid pasta wheat and hexaploid bread wheat. Until recently, the high sequence conservation between homoeologous genes, together with the large genome size of polyploid wheat, had hindered genomic analyses in this important crop species. In the past 5 yr, however, the advent of next-generation sequencing has radically changed the wheat genomics landscape. Here, we review a series of advances in genomic resources and tools for functional genomics that are shifting the paradigm of what is possible in wheat molecular genetics and breeding. We discuss how understanding the relationship between homoeologues can inform approaches to modulate the response of quantitative traits in polyploid wheat; we also argue that functional redundancy has 'locked up' a wide range of phenotypic variation in wheat. We explore how genomics provides key tools to inform targeted manipulation of multiple homoeologues, thereby allowing researchers and plant breeders to unlock the full polyploid potential of wheat.

  4. Forging New Cocoa Keys: The Impact of Unlocking the Cocoa Bean’s Genome on Pre-harvest Food Safety

    Science.gov (United States)

    Forging New Cocoa Keys: The Impact of Unlocking the Cocoa Bean’s Genome on Pre-harvest Food Safety David N. Kuhn, USDA ARS SHRS, Miami FL Sometimes it's hard to see the value and application of genomics to real world problems. How will sequencing the cacao genome affect West African farmers? Thi...

  5. Materials analysis: A key to unlocking the mystery of the Columbia tragedy

    Science.gov (United States)

    Mayeaux, Brian M.; Collins, Thomas E.; Jerman, Gregory A.; McDanels, Steven J.; Piascik, Robert S.; Russell, Richard W.; Shah, Sandeep R.

    2004-02-01

    Materials analyses of key forensic evidence helped unlock the mystery of the loss of space shuttle Columbia that disintegrated February 1, 2003 while returning from a 16-day research mission. Following an intensive four-month recovery effort by federal, state, and local emergency management and law officials, Columbia debris was collected, catalogued, and reassembled at the Kennedy Space Center. Engineers and scientists from the Materials and Processes (M&P) team formed by NASA supported Columbia reconstruction efforts, provided factual data through analysis, and conducted experiments to validate the root cause of the accident. Fracture surfaces and thermal effects of selected airframe debris were assessed, and process flows for both nondestructive and destructive sampling and evaluation of debris were developed. The team also assessed left hand (LH) airframe components that were believed to be associated with a structural breach of Columbia. Analytical data collected by the M&P team showed that a significant thermal event occurred at the left wing leading edge in the proximity of LH reinforced carbon carbon (RCC) panels 8 and 9. The analysis also showed exposure to temperatures in excess of 1,649°C, which would severely degrade the support structure, tiles, and RCC panel materials. The integrated failure analysis of wing leading edge debris and deposits strongly supported the hypothesis that a breach occurred at LH RCC panel 8.

  6. Unlocking Doors without Keys: Activation of Src by Truncated C-terminal Intracellular Receptor Tyrosine Kinases Lacking Tyrosine Kinase Activity

    Directory of Open Access Journals (Sweden)

    Belén Mezquita

    2014-02-01

    Full Text Available One of the best examples of the renaissance of Src as an open door to cancer has been the demonstration that just five min of Src activation is sufficient for transformation and also for induction and maintenance of cancer stem cells [1]. Many tyrosine kinase receptors, through the binding of their ligands, become the keys that unlock the structure of Src and activate its oncogenic transduction pathways. Furthermore, intracellular isoforms of these receptors, devoid of any tyrosine kinase activity, still retain the ability to unlock Src. This has been shown with a truncated isoform of KIT (tr-KIT and a truncated isoform of VEGFR-1 (i21-VEGFR-1, which are intracellular and require no ligand binding, but are nonetheless able to activate Src and induce cell migration and invasion of cancer cells. Expression of the i21-VEGFR-1 is upregulated by the Notch signaling pathway and repressed by miR-200c and retinoic acid in breast cancer cells. Both Notch inhibitors and retinoic acid have been proposed as potential therapies for invasive breast cancer.

  7. Unlocking Doors without Keys: Activation of Src by Truncated C-terminal Intracellular Receptor Tyrosine Kinases Lacking Tyrosine Kinase Activity.

    Science.gov (United States)

    Mezquita, Belén; Mezquita, Pau; Pau, Montserrat; Mezquita, Jovita; Mezquita, Cristóbal

    2014-02-14

    One of the best examples of the renaissance of Src as an open door to cancer has been the demonstration that just five min of Src activation is sufficient for transformation and also for induction and maintenance of cancer stem cells [1]. Many tyrosine kinase receptors, through the binding of their ligands, become the keys that unlock the structure of Src and activate its oncogenic transduction pathways. Furthermore, intracellular isoforms of these receptors, devoid of any tyrosine kinase activity, still retain the ability to unlock Src. This has been shown with a truncated isoform of KIT (tr-KIT) and a truncated isoform of VEGFR-1 (i21-VEGFR-1), which are intracellular and require no ligand binding, but are nonetheless able to activate Src and induce cell migration and invasion of cancer cells. Expression of the i21-VEGFR-1 is upregulated by the Notch signaling pathway and repressed by miR-200c and retinoic acid in breast cancer cells. Both Notch inhibitors and retinoic acid have been proposed as potential therapies for invasive breast cancer.

  8. Fostering team creativity: perspective taking as key to unlocking diversity's potential.

    Science.gov (United States)

    Hoever, Inga J; van Knippenberg, Daan; van Ginkel, Wendy P; Barkema, Harry G

    2012-09-01

    Despite the clear importance of team creativity for organizations, the conditions that foster it are not very well understood. Even though diversity, especially diversity of perspectives and knowledge, is frequently argued to stimulate higher creativity in teams, empirical findings on this relationship remain inconsistent. We have developed a theoretical model in which the effect of a team's diversity on its creativity is moderated by the degree to which team members engage in perspective taking. We propose that perspective taking helps realize the creative benefits of diversity of perspectives by fostering information elaboration. Results of a laboratory experiment support the hypothesized interaction between diversity and perspective taking on team creativity. Diverse teams performed more creatively than homogeneous teams when they engaged in perspective taking, but not when they were not instructed to take their team members' perspectives. Team information elaboration was found to mediate this moderated effect and was associated with a stronger indirect effect than mere information sharing or task conflict. Our results point to perspective taking as an important mechanism to unlock diversity's potential for team creativity.

  9. Unlocking the Mystery of Social Deficits in Autism: Theory of Mind as Key

    Science.gov (United States)

    Blacher, Jan

    2007-01-01

    Theory of mind (ToM) is key to the development of one's social skills. Without ToM, children (or adults) cannot understand or infer the thoughts, feelings, or intentions of others. A lack of ToM skills is considered by some to be a core deficit in autism. ToM affects all interpersonal interactions as well as academics, daily living, following…

  10. Unlock Their Lonely Hearts.

    Science.gov (United States)

    Fu, Danling

    1998-01-01

    Argues that, for new immigrant children, literacy education that challenges students to speak and engage in meaningful work (not worksheets and handwriting practice) is the key to initiating them into American culture, to helping them feel this country is their home, and to unlocking their lonely hearts. Focuses on the special problems of Chinese…

  11. Keys to the House: Unlocking Residential Savings With Program Models for Home Energy Upgrades

    Energy Technology Data Exchange (ETDEWEB)

    Grevatt, Jim [Energy Futures Group (United States); Hoffman, Ian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Hoffmeyer, Dale [US Department of Energy, Washington, DC (United States)

    2017-07-05

    After more than 40 years of effort, energy efficiency program administrators and associated contractors still find it challenging to penetrate the home retrofit market, especially at levels commensurate with state and federal goals for energy savings and emissions reductions. Residential retrofit programs further have not coalesced around a reliably successful model. They still vary in design, implementation and performance, and they remain among the more difficult and costly options for acquiring savings in the residential sector. If programs are to contribute fully to meeting resource and policy objectives, administrators need to understand what program elements are key to acquiring residential savings as cost effectively as possible. To that end, the U.S. Department of Energy (DOE) sponsored a comprehensive review and analysis of home energy upgrade programs with proven track records, focusing on those with robustly verified savings and constituting good examples for replication. The study team reviewed evaluations for the period 2010 to 2014 for 134 programs that are funded by customers of investor-owned utilities. All are programs that promote multi-measure retrofits or major system upgrades. We paid particular attention to useful design and implementation features, costs, and savings for nearly 30 programs with rigorous evaluations of performance. This meta-analysis describes program models and implementation strategies for (1) direct install retrofits; (2) heating, ventilating and air-conditioning (HVAC) replacement and early retirement; and (3) comprehensive, whole-home retrofits. We analyze costs and impacts of these program models, in terms of both energy savings and emissions avoided. These program models can be useful guides as states consider expanding their strategies for acquiring energy savings as a resource and for emissions reductions. We also discuss the challenges of using evaluations to create program models that can be confidently applied in

  12. Are atmospheric updrafts a key to unlocking climate forcing and sensitivity?

    Science.gov (United States)

    Donner, Leo J.; O'Brien, Travis A.; Rieger, Daniel; Vogel, Bernhard; Cooke, William F.

    2016-10-01

    Both climate forcing and climate sensitivity persist as stubborn uncertainties limiting the extent to which climate models can provide actionable scientific scenarios for climate change. A key, explicit control on cloud-aerosol interactions, the largest uncertainty in climate forcing, is the vertical velocity of cloud-scale updrafts. Model-based studies of climate sensitivity indicate that convective entrainment, which is closely related to updraft speeds, is an important control on climate sensitivity. Updraft vertical velocities also drive many physical processes essential to numerical weather prediction.Vertical velocities and their role in atmospheric physical processes have been given very limited attention in models for climate and numerical weather prediction. The relevant physical scales range down to tens of meters and are thus frequently sub-grid and require parameterization. Many state-of-science convection parameterizations provide mass fluxes without specifying vertical velocities, and parameterizations that do provide vertical velocities have been subject to limited evaluation against what have until recently been scant observations. Atmospheric observations imply that the distribution of vertical velocities depends on the areas over which the vertical velocities are averaged. Distributions of vertical velocities in climate models may capture this behavior, but it has not been accounted for when parameterizing cloud and precipitation processes in current models.New observations of convective vertical velocities offer a potentially promising path toward developing process-level cloud models and parameterizations for climate and numerical weather prediction. Taking account of the scale dependence of resolved vertical velocities offers a path to matching cloud-scale physical processes and their driving dynamics more realistically, with a prospect of reduced uncertainty in both climate forcing and sensitivity.

  13. Unlock Your Personalization

    DEFF Research Database (Denmark)

    Prasad, Ramjee

    Unlock Your Personalization is based on a unique and novel technique, C5, which can improve your quality of life. C5 offers five basic key parameters for strengthening your body and mind: “Concentration”, “Calmness”, “Confidence”, “Contentment” and “Creativity”, to which the book gives a detailed...... of life through unlocking your personalization. The C5 concept looks on creativity as the foundation on which to build a successful life with no stress or tension, allowing you to enjoy nights of deep, peaceful sleep. This is what a good quality of life is really all about. Practicing C5 is the simplest...... have practiced the C5 concept in their daily lives and they have found that life can indeed be free of stress and tension and that they can enjoy nights of good sleep. The book gives an insight into how Leo and Inga feel about C5 and their views on its value for human life. The book also describes...

  14. Unlocking the allergenic structure of the major house dust mite allergen der f 2 by elimination of key intramolecular interactions.

    Science.gov (United States)

    Takai, T; Ichikawa, S; Yokota, T; Hatanaka, H; Inagaki, F; Okumura, Y

    2000-11-03

    We report on the structural background of the remarkable reduction of allergenicity in engineering of the major house dust mite allergen Der f 2. Disruption of intramolecular disulfide bonds in Der f 2 caused extensive conformational change that was monitored by circular dichroism and gel-filtration analysis. The degree of conformational change correlated well with the degree of reductions in the capacity to bind IgE and to induce histamine release from basophils in mite-allergic patients. Loosening the rigid tertiary structure by elimination of key intramolecular interactions is an effective strategy to reduce the number of high affinity IgE epitopes of allergen vaccine.

  15. Unlocking Africa's Potential

    Institute of Scientific and Technical Information of China (English)

    Simon Freemantle

    2011-01-01

    WHILE there are meaningful objections to the nature and structure of much of the new investment in African agriculture,it is dear that the introduction of new capital,skills and technology is an essential component in unlocking the continent's ultimate allure.Investments of $83 billion annually are said to be needed to elevate the developing world's agricultural sector.At least half of this amount is required in Sub-Saharan Africa (SSA) alone.

  16. A quencher-free molecular beacon design based on pyrene excimer fluorescence using pyrene-labeled UNA (unlocked nucleic acid)

    DEFF Research Database (Denmark)

    Karlsen, Kasper Kannegård; Okholm, Anders Hauge; Kjems, Jørgen

    2013-01-01

    A quencher-free molecular beacon capable of generating pyrene excimer fluorescence has been constructed using strategically positioned pyrene-UNA monomers. Hybridization of a fully complementary RNA target was accompanied by a pyrene excimer emission increase of more than 900%, and detection of RNA...

  17. A quencher-free molecular beacon design based on pyrene excimer fluorescence using pyrene-labeled UNA (unlocked nucleic acid)

    DEFF Research Database (Denmark)

    Karlsen, Kasper Kannegård; Okholm, Anders Hauge; Kjems, Jørgen

    2013-01-01

    A quencher-free molecular beacon capable of generating pyrene excimer fluorescence has been constructed using strategically positioned pyrene-UNA monomers. Hybridization of a fully complementary RNA target was accompanied by a pyrene excimer emission increase of more than 900%, and detection of RNA...

  18. Unlocking the molecular structure of fungal melanin using 13C biosynthetic labeling and solid-state NMR.

    Science.gov (United States)

    Tian, Shiying; Garcia-Rivera, Javier; Yan, Bin; Casadevall, Arturo; Stark, Ruth E

    2003-07-15

    Melanins are enigmatic pigments found in all biological kingdoms that are associated with a variety of functions, including microbial virulence. Despite being ubiquitous in nature, melanin pigments have long resisted atomic-level structural examination because of their insolubility and amorphous organization. Cryptococcus neoformans is a human pathogenic fungus that melanizes only when provided with exogenous substrate, thus offering a unique system for exploring questions related to melanin structure at the molecular level. We have exploited the requirement for exogenous substrate in melanin synthesis as well as the capabilities of high-resolution solid-state nuclear magnetic resonance (NMR) to establish the predominantly aliphatic composition of l-dopa melanin and to introduce (13)C labels that permit the identification of proximal carbons in the developing biopolymer. By swelling solid melanin samples in organic solvents and using two-dimensional heteronuclear NMR in conjunction with magic-angle spinning, we have identified chemical bonding patterns typical of alkane, alkene, alcohol, ketone, ester, and indole functional groups. These findings demonstrate the feasibility of a novel approach to determining the structure of melanin using metabolic labeling and NMR spectroscopy.

  19. Time to be BRAVE: is educating surgeons the key to unlocking the potential of randomised clinical trials in surgery? A qualitative study.

    Science.gov (United States)

    Potter, Shelley; Mills, Nicola; Cawthorn, Simon J; Donovan, Jenny; Blazeby, Jane M

    2014-03-14

    Well-designed randomised clinical trials (RCTs) provide the best evidence to inform decision-making and should be the default option for evaluating surgical procedures. Such trials can be challenging, and surgeons' preferences may influence whether trials are initiated and successfully conducted and their results accepted. Preferences are particularly problematic when surgeons' views play a key role in procedure selection and patient eligibility. The bases of such preferences have rarely been explored. Our aim in this qualitative study was to investigate surgeons' preferences regarding the feasibility of surgical RCTs and their understanding of study design issues using breast reconstruction surgery as a case study. Semistructured qualitative interviews were undertaken with a purposive sample of 35 professionals practicing at 15 centres across the United Kingdom. Interviews were transcribed verbatim and analysed thematically using constant comparative techniques. Sampling, data collection and analysis were conducted concurrently and iteratively until data saturation was achieved. Surgeons often struggle with the concept of equipoise. We found that if surgeons did not feel 'in equipoise', they did not accept randomisation as a method of treatment allocation. The underlying reasons for limited equipoise were limited appreciation of the methodological weaknesses of data derived from nonrandomised studies and little understanding of pragmatic trial design. Their belief in the value of RCTs for generating high-quality data to change or inform practice was not widely held. There is a need to help surgeons understand evidence, equipoise and bias. Current National Institute of Health Research/Medical Research Council investment into education and infrastructure for RCTs, combined with strong leadership, may begin to address these issues or more specific interventions may be required.

  20. Time to be BRAVE: is educating surgeons the key to unlocking the potential of randomised clinical trials in surgery? A qualitative study

    Science.gov (United States)

    2014-01-01

    Background Well-designed randomised clinical trials (RCTs) provide the best evidence to inform decision-making and should be the default option for evaluating surgical procedures. Such trials can be challenging, and surgeons’ preferences may influence whether trials are initiated and successfully conducted and their results accepted. Preferences are particularly problematic when surgeons’ views play a key role in procedure selection and patient eligibility. The bases of such preferences have rarely been explored. Our aim in this qualitative study was to investigate surgeons’ preferences regarding the feasibility of surgical RCTs and their understanding of study design issues using breast reconstruction surgery as a case study. Methods Semistructured qualitative interviews were undertaken with a purposive sample of 35 professionals practicing at 15 centres across the United Kingdom. Interviews were transcribed verbatim and analysed thematically using constant comparative techniques. Sampling, data collection and analysis were conducted concurrently and iteratively until data saturation was achieved. Results Surgeons often struggle with the concept of equipoise. We found that if surgeons did not feel ‘in equipoise’, they did not accept randomisation as a method of treatment allocation. The underlying reasons for limited equipoise were limited appreciation of the methodological weaknesses of data derived from nonrandomised studies and little understanding of pragmatic trial design. Their belief in the value of RCTs for generating high-quality data to change or inform practice was not widely held. Conclusion There is a need to help surgeons understand evidence, equipoise and bias. Current National Institute of Health Research/Medical Research Council investment into education and infrastructure for RCTs, combined with strong leadership, may begin to address these issues or more specific interventions may be required. PMID:24628821

  1. A New Key Unlocks Dormitory Financing.

    Science.gov (United States)

    Ransdell, Gary A.

    2000-01-01

    Describes how one university creatively financed its dormitory renovation without imposing undue hardships on students (and with approval from of the university's governing board and elected state leaders). Planners developed a nonprofit foundation to fund the recapitalization and renovation of the dormitories. The foundation owned the…

  2. ZooKeys, unlocking Earth’s incredible biodiversity and building a sustainable bridge into the public domain: From “print-based” to “web-based” taxonomy, systematics, and natural history. ZooKeys Editorial Opening Paper

    Directory of Open Access Journals (Sweden)

    Lyubomir Penev

    2008-07-01

    Full Text Available Publishing taxonomic and systematics studies in the digital era faces major challenges and requires new approaches, many of which are currently stimulating spirited discussions amongst taxonomists and systematists. New amendments to the International Code of Zoological Nomenclature are expected to regulate electronic publishing of new taxa and create a standard form for their registration (ZooBank. Responding to a perceived need, this editorial announces establishment of ZooKeys – a new online and print journal in zoological taxonomy and systematics, which aims to quickly respond and adapt to the newest developments in taxonomic publishing. Open Access is accepted as mandatory for ZooKeys. Th e rationale for and concept of ZooKeys is discussed in detail.

  3. Key Techniques and Application Progress of Molecular Pharmacognosy

    Institute of Scientific and Technical Information of China (English)

    XIAO Xue-feng; HU Jing; XU Hai-yu; GAO Wen-yuan; ZHANG Tie-jun; LIU Chang-xiao

    2011-01-01

    At the boundary between pharmacognosy and molecular biology, molecular pharmacognosy has developed as a new borderline discipline. This paper reviews the methods, application, and prospect of molecular pharmacognosy. DNA marker is one of genetic markers and some molecular marker methods which have been successfully used for genetic diversity identification and new medicinal resources development. Recombinant DNA technology provides a powerful tool that enables scientists to engineer DNA sequences. Gene chip technique could be used in determination of gene expression profiles, analyses of polymorphisms, construction of genomic library, analysis of mapping, and sequencing by hybridization. Using the methods and theory of molecular biology and pharmacognosy, molecular pharmacognosy represents an extremely prospective branch of pharmacognosy and focuses on the study of systemic growth of medicinal plants, identification and evaluation of germplasm resources, plant metabolomics and production of active compounds. Furthermore, the great breakthrough of molecular pharmacognosy could be anticipated on DNA fingerprint analysis, cultivar improvement, DNA identification, and a global DNA barcoding system in the future.

  4. Combined Pharmacological and Genetic Manipulations Unlock Unprecedented Temporal Elasticity and Reveal Phase-Specific Modulation of the Molecular Circadian Clock of the Mouse Suprachiasmatic Nucleus

    Science.gov (United States)

    Patton, Andrew P.; Chesham, Johanna E.

    2016-01-01

    activity of the CK1ε isoform. In conclusion, extreme period manipulation reveals unprecedented elasticity and temporal structure of the SCN circadian oscillation. SIGNIFICANCE STATEMENT The master circadian clock of the suprachiasmatic nucleus (SCN) encodes time-of-day information that allows mammals to predict and thereby adapt to daily environmental cycles. Using combined genetic and pharmacological interventions, we assessed the temporal elasticity of the SCN network. Despite having evolved to generate a 24 h circadian period, we show that the molecular clock is surprisingly elastic, able to reversibly sustain coherent periods between ≤17 and >42 h at the levels of individual cells and the overall circuit. Using quantitative techniques to analyze these extreme periodicities, we reveal that the oscillator progresses as a sequence of distinct stages. These findings reveal new properties of how the SCN functions as a network and should inform biological and mathematical analyses of circadian timekeeping. PMID:27605609

  5. Linoleic acid: Is this the key that unlocks the quantum brain? Insights linking broken symmetries in molecular biology, mood disorders and personalistic emergentism.

    Science.gov (United States)

    Cocchi, Massimo; Minuto, Chiara; Tonello, Lucio; Gabrielli, Fabio; Bernroider, Gustav; Tuszynski, Jack A; Cappello, Francesco; Rasenick, Mark

    2017-04-19

    In this paper we present a mechanistic model that integrates subneuronal structures, namely ion channels, membrane fatty acids, lipid rafts, G proteins and the cytoskeleton in a dynamic system that is finely tuned in a healthy brain. We also argue that subtle changes in the composition of the membrane's fatty acids may lead to down-stream effects causing dysregulation of the membrane, cytoskeleton and their interface. Such exquisite sensitivity to minor changes is known to occur in physical systems undergoing phase transitions, the simplest and most studied of them is the so-called Ising model, which exhibits a phase transition at a finite temperature between an ordered and disordered state in 2- or 3-dimensional space. We propose this model in the context of neuronal dynamics and further hypothesize that it may involve quantum degrees of freedom dependent upon variation in membrane domains associated with ion channels or microtubules. Finally, we provide a link between these physical characteristics of the dynamical mechanism to psychiatric disorders such as major depression and antidepressant action.

  6. IU physicists help unlock universe's secrets

    CERN Multimedia

    2003-01-01

    "A team of Indiana University physicists is helping unlock the mysteries of the universe as part of a multination, 20-year experiment based in Switzerland. Their quarry: the elusive tiny particles that make up everything from stars to humans" (1/2 page).

  7. Smartphones Could Make Keys Obsolete

    Institute of Scientific and Technical Information of China (English)

    Matt Richtel

    2011-01-01

    @@ Front pockets and purses are slowly being emptied of one of civilization's most basic and enduring tools: the key.It's being swallowed by the cellphone.New technology lets smartphones unlock hotel, office and house doors and open garages and even car doors. It's a not-too-distant cousin of the technology that allows key fobs to remotely unlock automobiles or key cards to be waved beside electronic pads at office entrances.What's new is that it is on the device more people are using as the Swiss Army knife of electronics, in equal parts phone, memo pad, stereo, map, GPS unit, and camera and game machine.

  8. Unlocking the secrets of the universe, Rosetta lander named Philae

    Science.gov (United States)

    2004-02-01

    Philae is the island in the river Nile on which an obelisk was found that had a bilingual inscription including the names of Cleopatra and Ptolemy in Egyptian hieroglyphs. This provided the French historian Jean-François Champollion with the final clues that enabled him to decipher the hieroglyphs of the Rosetta Stone and unlock the secrets of the civilisation of ancient Egypt. Just as the Philae Obelisk and the Rosetta Stone provided the keys to an ancient civilisation, the Philae lander and the Rosetta orbiter aim to unlock the mysteries of the oldest building blocks of our Solar System - comets. Germany, France, Italy and Hungary are the main contributors to the lander, working together with Austria, Finland, Ireland and the UK. The main contributors held national competitions to select the most appropriate name. Philae was proposed by 15-year-old Serena Olga Vismara from Arluno near Milan, Italy. Her hobbies are reading and surfing the internet, where she got the idea of naming the lander Philae. Her prize will be a visit to Kourou to attend the Rosetta launch. Study of Comet Churyumov-Gerasimenko will allow scientists to look back 4600 million years to an epoch when no planets existed and only a vast swarm of asteroids and comets surrounded the Sun. On arrival at the comet in 2014, Philae will be commanded to self-eject from the orbiter and unfold its three legs, ready for a gentle touchdown. Immediately after touchdown, a harpoon will be fired to anchor Philae to the ground and prevent it escaping from the comet's extremely weak gravity. The legs can rotate, lift or tilt to return Philae to an upright position. Philae will determine the physical properties of the comet's surface and subsurface and their chemical, mineralogical and isotopic composition. This will complement the orbiter's studies of the overall characterisation of the comet's dynamic properties and surface morphology. Philae may provide the final clues enabling the Rosetta mission to unlock

  9. NTIS: A Key Partner in Unlocking the World's Technology.

    Science.gov (United States)

    Clark, Joseph E.

    1990-01-01

    Description of international acquisition and dissemination efforts of the National Technical Information Service (NTIS) focuses on agreements and special programs designed to promote international cooperation. Difficulties that NTIS has experienced relating to copyright differences, variable organizations, and less developed countries are…

  10. Stem Cell Research: Unlocking the Mystery of Disease

    Science.gov (United States)

    ... Home Current Issue Past Issues From the Director: Stem Cell Research: Unlocking the Mystery of Disease Past Issues / ... Zerhouni, NIH Director, described the need for expanding stem cell research. Recently, he spoke about stem cell research ...

  11. Output spectrum of an unlocked optically driven semiconductor laser

    Energy Technology Data Exchange (ETDEWEB)

    Gallion, P.; Debarge, G.; Chabran, C.

    1986-05-01

    The output of an unlocked optically injected semiconductor laser exhibits a two-sided spectral distribution about its lasing frequency. The experimental results are explained by coupled phase and amplitude modulation and described by a rate-equation analysis.

  12. Key Lessons Learned from Moffitt's Molecular Tumor Board: The Clinical Genomics Action Committee Experience.

    Science.gov (United States)

    Knepper, Todd C; Bell, Gillian C; Hicks, J Kevin; Padron, Eric; Teer, Jamie K; Vo, Teresa T; Gillis, Nancy K; Mason, Neil T; McLeod, Howard L; Walko, Christine M

    2017-02-01

    , many cancer centers are seeking to develop a personalized medicine services and/or molecular tumor board to shepherd precision medicine into clinical practice. This article discusses the key lessons learned through the establishment and development of a molecular tumor board and personalized medicine clinical service. This article highlights practical issues and can serve as an important guide to other centers as they conceive and develop their own personalized medicine services and molecular tumor boards. © AlphaMed Press 2017.

  13. Unlocking Flexibility: Energy Systems Integration [Guest Editorial

    Energy Technology Data Exchange (ETDEWEB)

    O' Malley, Mark; Kroposki, Benjamin

    2017-01-01

    The articles in this special section focus on energy systems integration (ESI). Electric power systems around the world are experiencing great changes, including the retirement of coal and nuclear plants along with a rapid increase in the use of natural gas turbines and variable renewable technologies such as wind and solar. There is also much more use of information and communications technologies to enhance the visibility and controllability of the grid. Flexibility of operation, the ability of a power system to respond to change in demand and supply, is critical to enable higher levels of variable generation. One way to unlock this potential flexibility is to tap into other energy domains. This concept of interconnecting energy domains is called ESI. ESI is the process of coordinating the operation and planning of energy systems across multiple pathways and/or geographical scales to deliver reliable, cost-effective energy services with minimal impact on the environment. Integrating energy domains adds flexibility to the electrical power system. ESI includes interactions among energy vectors and with other large-scale infrastructures including water, transport, and data and communications networks, which are an enabling technology for ESI.

  14. BioNumbers--the database of key numbers in molecular and cell biology.

    Science.gov (United States)

    Milo, Ron; Jorgensen, Paul; Moran, Uri; Weber, Griffin; Springer, Michael

    2010-01-01

    BioNumbers (http://www.bionumbers.hms.harvard.edu) is a database of key numbers in molecular and cell biology--the quantitative properties of biological systems of interest to computational, systems and molecular cell biologists. Contents of the database range from cell sizes to metabolite concentrations, from reaction rates to generation times, from genome sizes to the number of mitochondria in a cell. While always of importance to biologists, having numbers in hand is becoming increasingly critical for experimenting, modeling, and analyzing biological systems. BioNumbers was motivated by an appreciation of how long it can take to find even the simplest number in the vast biological literature. All numbers are taken directly from a literature source and that reference is provided with the number. BioNumbers is designed to be highly searchable and queries can be performed by keywords or browsed by menus. BioNumbers is a collaborative community platform where registered users can add content and make comments on existing data. All new entries and commentary are curated to maintain high quality. Here we describe the database characteristics and implementation, demonstrate its use, and discuss future directions for its development.

  15. Unlocking the potential of translation for FLT

    Directory of Open Access Journals (Sweden)

    Alenka Kocbek

    2014-12-01

    Full Text Available The paper proposes unlocking the potential of translation for foreign language teaching (FLT by seeking to create synergies with the related discipline of translation science (TS. This aim is in keeping with the guidelines for language teaching provided in the Common European Framework of Languages, which introduced a model of communicative competences including communicative language competences as those which enable a person to act by drawing on specific linguistic means. First, an overview of the changing status of translation in FLT is presented – from its being considered a fundamental teaching method and basic skill in the Grammar-Translation Method, to its being all but outlawed in more recent communicative and task-based approaches, to its final rehabilitation in recent decades. It is then shown that, in the development of FLT, the parallel evolution of TS somehow failed to be acknowledged and, consequently, the opportunity to create valuable synergies between the two disciplines was missed. Following the stance of authors who have advocated the use of translation in FLT, it is argued that translation can effectively supplement the development of the four traditional language skills and, moreover, that some of the insights developed by TS can effectively be integrated into FLT as strategies aimed at enhancing leaners’ cross-cultural communicative competences. To this purpose, selected insights from TS (e.g. the functional approach and the skopos theory, the cultureme model, the theory of memes are discussed and their potential for creating synergies with FLT are explored. Finally, the paper discusses the omnipresence of different forms of translation and interpreting in contemporary societies and shows that this naturally and logically calls for a systematic inclusion of translation in FLT.

  16. Method for seamless unlock function for mobile applications.

    Science.gov (United States)

    Vasyltsov, Ihor; Bak, Changgyu; Vasyltsov, Ihor; Changgyu Bak; Bak, Changgyu; Vasyltsov, Ihor

    2016-08-01

    In this paper there is proposed an approach for seamless unlock security function for mobile application. The method combines the biomedical signals measured from human body and motion signals acquired from the devices. For this purpose a wearable device and a mobile device can be securely synchronized. It is shown that entropy extracted from biomedical ECG signal is comparable to the strength of the PIN-code security, the same time giving the easiness, flexibility, and seamlessness of the usage to the user. Also, it is shown that motion sensors can provide enough precision for the correct detection of the appropriate timing to unlock device.

  17. Ancient gene duplication provided a key molecular step for anaerobic growth of Baker's yeast.

    Science.gov (United States)

    Hayashi, Masaya; Schilke, Brenda; Marszalek, Jaroslaw; Williams, Barry; Craig, Elizabeth A

    2011-07-01

    Mitochondria are essential organelles required for a number of key cellular processes. As most mitochondrial proteins are nuclear encoded, their efficient translocation into the organelle is critical. Transport of proteins across the inner membrane is driven by a multicomponent, matrix-localized "import motor," which is based on the activity of the molecular chaperone Hsp70 and a J-protein cochaperone. In Saccharomyces cerevisiae, two paralogous J-proteins, Pam18 and Mdj2, can form the import motor. Both contain transmembrane and matrix domains, with Pam18 having an additional intermembrane space (IMS) domain. Evolutionary analyses revealed that the origin of the IMS domain of S. cerevisiae Pam18 coincides with a gene duplication event that generated the PAM18/MDJ2 gene pair. The duplication event and origin of the Pam18 IMS domain occurred at the relatively ancient divergence of the fungal subphylum Saccharomycotina. The timing of the duplication event also corresponds with a number of additional functional changes related to mitochondrial function and respiration. Physiological and genetic studies revealed that the IMS domain of Pam18 is required for efficient growth under anaerobic conditions, even though it is dispensable when oxygen is present. Thus, the gene duplication was beneficial for growth capacity under particular environmental conditions as well as diversification of the import motor components.

  18. Watson-Crick hydrogen bonding of unlocked nucleic acids

    DEFF Research Database (Denmark)

    Langkjær, Niels; Wengel, Jesper; Pasternak, Anna

    2015-01-01

    We herein describe the synthesis of two new unlocked nucleic acid building blocks containing hypoxanthine and 2,6-diaminopurine as nucleobase moieties and their incorporation into oligonucleotides. The modified oligonucleotides were used to examine the thermodynamic properties of UNA against unmo...... unmodified oligonucleotides and the resulting thermodynamic data support that the hydrogen bonding face of UNA is Watson-Crick like....

  19. Unlocking the condoms: The effect on sales and theft

    Directory of Open Access Journals (Sweden)

    Ashwood D

    2011-03-01

    Full Text Available Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use.Objective: Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmaciesMethods: Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined.Results: Theft varied by pharmacy and ranged from an average of 1.33 boxes (units per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason.Conclusion: After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  20. Probing molecular mechanisms of the Hsp90 chaperone: biophysical modeling identifies key regulators of functional dynamics.

    Directory of Open Access Journals (Sweden)

    Anshuman Dixit

    Full Text Available Deciphering functional mechanisms of the Hsp90 chaperone machinery is an important objective in cancer biology aiming to facilitate discovery of targeted anti-cancer therapies. Despite significant advances in understanding structure and function of molecular chaperones, organizing molecular principles that control the relationship between conformational diversity and functional mechanisms of the Hsp90 activity lack a sufficient quantitative characterization. We combined molecular dynamics simulations, principal component analysis, the energy landscape model and structure-functional analysis of Hsp90 regulatory interactions to systematically investigate functional dynamics of the molecular chaperone. This approach has identified a network of conserved regions common to the Hsp90 chaperones that could play a universal role in coordinating functional dynamics, principal collective motions and allosteric signaling of Hsp90. We have found that these functional motifs may be utilized by the molecular chaperone machinery to act collectively as central regulators of Hsp90 dynamics and activity, including the inter-domain communications, control of ATP hydrolysis, and protein client binding. These findings have provided support to a long-standing assertion that allosteric regulation and catalysis may have emerged via common evolutionary routes. The interaction networks regulating functional motions of Hsp90 may be determined by the inherent structural architecture of the molecular chaperone. At the same time, the thermodynamics-based "conformational selection" of functional states is likely to be activated based on the nature of the binding partner. This mechanistic model of Hsp90 dynamics and function is consistent with the notion that allosteric networks orchestrating cooperative protein motions can be formed by evolutionary conserved and sparsely connected residue clusters. Hence, allosteric signaling through a small network of distantly connected

  1. Key Structures and Interactions for Binding of Mycobacterium tuberculosis Protein Kinase B Inhibitors from Molecular Dynamics Simulation.

    Science.gov (United States)

    Punkvang, Auradee; Kamsri, Pharit; Saparpakorn, Patchreenart; Hannongbua, Supa; Wolschann, Peter; Irle, Stephan; Pungpo, Pornpan

    2015-07-01

    Substituted aminopyrimidine inhibitors have recently been introduced as antituberculosis agents. These inhibitors show impressive activity against protein kinase B, a Ser/Thr protein kinase that is essential for cell growth of M. tuberculosis. However, up to now, X-ray structures of the protein kinase B enzyme complexes with the substituted aminopyrimidine inhibitors are currently unavailable. Consequently, structural details of their binding modes are questionable, prohibiting the structural-based design of more potent protein kinase B inhibitors in the future. Here, molecular dynamics simulations, in conjunction with molecular mechanics/Poisson-Boltzmann surface area binding free-energy analysis, were employed to gain insight into the complex structures of the protein kinase B inhibitors and their binding energetics. The complex structures obtained by the molecular dynamics simulations show binding free energies in good agreement with experiment. The detailed analysis of molecular dynamics results shows that Glu93, Val95, and Leu17 are key residues responsible to the binding of the protein kinase B inhibitors. The aminopyrazole group and the pyrimidine core are the crucial moieties of substituted aminopyrimidine inhibitors for interaction with the key residues. Our results provide a structural concept that can be used as a guide for the future design of protein kinase B inhibitors with highly increased antagonistic activity.

  2. How molecular motors extract order from chaos (a key issues review)

    Science.gov (United States)

    Hoffmann, Peter M.

    2016-03-01

    Molecular motors are the workhorses of living cells. Seemingly by ‘magic’, these molecules are able to complete purposeful tasks while being immersed in a sea of thermal chaos. Here, we review the current understanding of how these machines work, present simple models based on thermal ratchets, discuss implications for statistical physics, and provide an overview of ongoing research in this important and fascinating field of study.

  3. A chemical perspective on transcriptional fidelity dominant contributions of sugar integrity revealed by unlocked nucleic acids

    DEFF Research Database (Denmark)

    Xu, Liang; Plouffe, Steven W; Chong, Jenny;

    2013-01-01

    Transcription unlocked: A synthetic chemical biology approach involving unlocked nucleic acids was used to dissect the contribution of sugar backbone integrity to the RNA Polymerase II (Pol II) transcription process. An unexpected dominant role for sugar-ring integrity in Pol II transcriptional...

  4. The earliest phases of star formation - A Herschel key project. The thermal structure of low-mass molecular cloud cores

    CERN Document Server

    Launhardt, R; Schmiedeke, A; Henning, Th; Krause, O; Balog, Z; Beuther, H; Birkmann, S; Hennemann, M; Kainulainen, J; Khanzadyan, T; Linz, H; Lippok, N; Nielbock, M; Pitann, J; Ragan, S; Risacher, C; Schmalzl, M; Shirley, Y L; Stecklum, B; Steinacker, J; Tackenberg, J

    2013-01-01

    The temperature and density structure of molecular cloud cores are the most important physical quantities that determine the course of the protostellar collapse and the properties of the stars they form. Nevertheless, density profiles often rely either on the simplifying assumption of isothermality or on observationally poorly constrained model temperature profiles. With the aim of better constraining the initial physical conditions in molecular cloud cores at the onset of protostellar collapse, we initiated the Guaranteed Time Key Project (GTKP) "The Earliest Phases of Star Formation" (EPoS) with the Herschel satellite. This paper gives an overview of the low-mass sources in the EPoS project, including all observations, the analysis method, and the initial results of the survey. We study the thermal dust emission of 12 previously well-characterized, isolated, nearby globules using FIR and submm continuum maps at up to eight wavelengths between 100 micron and 1.2 mm. Our sample contains both globules with sta...

  5. 18F-FDG PET Imaging of Murine Atherosclerosis: Association with Gene Expression of Key Molecular Markers

    OpenAIRE

    2012-01-01

    AIM: To study whether (18)F-FDG can be used for in vivo imaging of atherogenesis by examining the correlation between (18)F-FDG uptake and gene expression of key molecular markers of atherosclerosis in apoE(-/-) mice. METHODS: Nine groups of apoE(-/-) mice were given normal chow or high-fat diet. At different time-points, (18)F-FDG PET/contrast-enhanced CT scans were performed on dedicated animal scanners. After scans, animals were euthanized, aortas removed, gamma counted, RNA extracted from...

  6. Molecular dynamics simulation of the key characteristics of the supercritical CO2-pentaerythritol tetraacetate system

    Science.gov (United States)

    Lei, Peiyu; Jin, Zunlong; Liu, Hong; Wang, Dingbiao; Liu, Donglai

    2016-12-01

    Supercritical CO2 is widely used in many fields of industry. Investigation of statistical mechanics of CO2 fluid under quasi critical and supercritical state has great significance. Equilibrium molecular dynamics (EMD) simulations are carried out to investigate the statistical mechanics and macroscopic performance of CO2 fluid under the quasi critical and supercritical state. The results show that the bond length and bond angle distributions for supercritical CO2 are Gaussian distribution basically. The dimers' proportion of supercritical CO2 system changes with pressure increasing. T-type dimer has high share within the system when pressure is higher than 9MPa. It can be inferred that T-type dimer leads to CO2 physical properties changing tempestuously under supercritical state. The effect that lubricating oil has on microstructure and heat transfer of supercritical CO2 is also investigated in the present work. The results show the lubricating oil produces significant effect on the dimers' structure under low pressure.

  7. Key molecular requirements for raft formation in lipid/cholesterol membranes.

    Directory of Open Access Journals (Sweden)

    Davit Hakobyan

    Full Text Available The lipid mixture of DPPC (saturated lipid/DUPC (unsaturated lipid/CHOL (cholesterol is studied with respect to its ability to form liquid-ordered and liquid-disordered phases. We employ coarse-grained simulations with MARTINI force field. All three components are systematically modified in order to explore the relevant molecular properties, leading to phase separation. Specifically, we show that the DPPC/DUPC/CHOL system unmixes due to enthalpic DPPC-DPPC and DPPC-CHOL interactions. The phase separation remains unchanged, except for the formation of a gel phase at long times after decreasing the conformational degrees of freedom of the unsaturated DUPC. In contrast, the phase separation can be suppressed by softening the DPPC chains. In an attempt to mimic the ordering and unmixing effect of CHOL the latter is replaced by a stiff and shortened DPPC-like lipid. One still observes phase separation, suggesting that it is mainly the rigid and planar structure of CHOL which is important for raft formation. Addition of an extra bead to the head of CHOL has no notable impact on the phase separation of the system, supporting the irrelevance of the Umbrella model for the phase separation. Reduction of the conformational entropy of CHOL by stiffening its last bead results in a significant increase of the order of the DPPC/CHOL domain. This suggests that the conformational entropy of CHOL is important to prohibit the gelation process. The interleaflet interactions as mediated by the terminal molecular groups seem to have a strong impact on the possibility of a subsequent gelation process after phase separation.

  8. IDENTIFICATION OF KEY MOLECULAR COMPONENTS OF THE RESISTANCE OF CHERRY TOMATO AGAINST Phytophthora infestans

    Directory of Open Access Journals (Sweden)

    LILIANA LÓPEZ KLEINE

    2012-01-01

    Full Text Available El tomate cherry Solanum lycopersicum var cerasiforme cv Matt’s es bastante resistente a la gran parte de aislamientos de Phytophthora infestans. Se han identificado dos aislamientos, US940480 y US970001 que causan interacción incompatible y compatible respectivamente. US970001 es uno de los pocos aislamientos causantes de interacción compatible con este cultivo. Con el fin de identificar genes con expresión diferencial en interacciones compatible e incompatible, analizamos DNA copia de 12899 clones independientes en tres tiempos posteriores a la inoculación del patógeno. Se aplicaron diversas herramientas estadísticas para identificar componentes moleculares claves de la respuesta de la planta al patógeno. Cuarenta y tres genes fueron detectados como activados durante la interacción incompatible a las 36 horas posinoculación, 15 genes se detectaron como activados globalmente tomando en conjunto los 3 tiempos analizados y 12 genes tanto globalmente como a las 36 horas. Análisis de Northern blot permitieron confirmar la expresión diferencial detectada con los análisis de microarreglos y estudiar la expresión diferencial de otros genes de resistencia en plantas (PR en interacciones compatible e incompatible en esta interacción.

  9. Molecular Keys to the Janthinobacterium and Duganella spp. Interaction with the Plant Pathogen Fusarium graminearum

    Directory of Open Access Journals (Sweden)

    Frederike S. Haack

    2016-10-01

    Full Text Available Janthinobacterium and Duganella are well-known for their antifungal effects. Surprisingly, almost nothing is known on molecular aspects involved in the close bacterium-fungus interaction. To better understand this interaction, we established the genomes of eleven Janthinobacterium and Duganella isolates in combination with phylogenetic and functional analyses of all publicly available genomes. Thereby, we identified a core and pan genome of 1,058 and 23,628 genes. All strains encoded secondary metabolite gene clusters and chitinases, both possibly involved in fungal growth suppression. All but one strain carried a single gene cluster involved in the biosynthesis of alpha-hydroxyketone-like autoinducer molecules, designated JAI-1. Genome wide RNA-seq studies employing the background of two isolates and the corresponding JAI-1 deficient strains identified a set of 45 QS-regulated genes in both isolates. Most regulated genes are characterized by a conserved sequence motif within the promoter region. Among the most strongly regulated genes were secondary metabolite and type VI secretion system gene clusters. Most intriguing, co-incubation studies of J. sp. HH102 or its corresponding JAI-1 synthase deletion mutant with the plant pathogen Fusarium graminearum provided first evidence of a QS-dependent interaction with this pathogen.

  10. Decoding the key aroma compounds of a Hungarian-type salami by molecular sensory science approaches.

    Science.gov (United States)

    Söllner, Kerstin; Schieberle, Peter

    2009-05-27

    Application of aroma extract dilution analysis on an extract/distillate prepared from a Hungarian-type salami and subsequent identification experiments led to the identification of 51 of 55 odor-active compounds detected in the flavor dilution (FD) factor range of 16-4096. Nineteen of these compounds are reported for the first time as aroma components of dry-fermented sausages, among them 3-hydroxy-4,5-dimethyl-2(5H)-furanone (sotolon), trans-4,5-epoxy-(E)-2-decenal, and bis(2-methyl-3-furyl) disulfide. The highest FD factors were found for 2-methoxyphenol (smoky, sweet), 2-methoxy-4-(2-propenyl)phenol (clove-like), 2-methoxy-4-(E)-(1-propenyl)phenol (clove-like), and acetic acid (pungent, sour). Forty-five aroma compounds were subsequently quantified using stable isotope dilution assays, and their odor activity values (OAVs; ratio of concentration to odor threshold) were calculated on the basis of odor thresholds in oil. The highest OAVs were calculated for acetic acid, acetaldehyde, 3-(methylthio)propanal, phenylacetaldehyde, 2-methoxyphenol, and 2-acetyl-1-pyrroline. A model mixture containing 33 odorants in the same concentrations as they occurred in the sausage was prepared in a matrix consisting of 44% sunflower oil and 56% aqueous phosphate buffer. A comparison of the overall aroma of this model mixture with the original showed a very high similarity, suggesting that the key aroma compounds were successfully identified.

  11. Locked mode unlocking by rotating resonant magnetic perturbations in J-TEXT tokamak

    Science.gov (United States)

    Jin, Hai; Hu, Qiming; Wang, Nengchao; Rao, Bo; Ding, Yonghua; Li, Da; Li, Mao; Xie, Shujia

    2015-10-01

    This study aimed to unlock the m/n = 2/1 locked mode (LM) performed in J-TEXT tokamak by using rotating resonant magnetic perturbations (RMPs), where m and n are the poloidal and toroidal mode numbers, respectively. In the experiments, to maintain the LM, mode locking occurs by using static RMPs generated by a set of saddle coils. After mode locking, another rotating RMP with frequency of several kilo-Hz is applied to drive the static LM to rotate. The unlocking of LM is realized by using rotating RMP with different frequency and amplitude. It is found that the unlocking process contains two stages, i.e. the oscillating stage and the unlocking stage. In the oscillating stage, the rotating RMP with amplitude that is not strong enough causes the LM to oscillate around its locked phase and produces magnetic fluctuation to behave as a standing wave-like structure in poloidal direction. When the amplitude of the rotating RMP is strong enough, it first causes the LM to oscillate and then transforms to mode unlocking quickly in less than 1 ms, namely the unlocking stage. Further analysis shows that the unlocking of LM is determined by the torque balance between the viscous torque and the electromagnetic torques exerted by both the static and the rotating RMP. In addition, the unlocking process is sensitive to both the amplitude and the frequency of the rotating RMP as well as the amplitude of static RMP. Nonlinear numerical modeling based on reduced MHD equations is also performed to understand the unlocking process, and numerical results qualitatively agree with the experimental ones.

  12. Visible Red Light Emitting Diode Photobiomodulation for Skin Fibrosis: Key Molecular Pathways.

    Science.gov (United States)

    Mamalis, Andrew; Siegel, Daniel; Jagdeo, Jared

    Skin fibrosis, also known as skin scarring, is an important global health problem that affects an estimated 100 million persons per year worldwide. Current therapies are associated with significant side effects and even with combination therapy, progression, and recurrence is common. Our goal is to review the available published data available on light-emitting diode-generated (LED) red light phototherapy for treatment of skin fibrosis. A search of the published literature from 1 January 2000 to present on the effects of visible red light on skin fibrosis, and related pathways was performed in January 2016. A search of PubMed and EMBASE was completed using specific keywords and MeSH terms. "Fibrosis" OR "skin fibrosis" OR "collagen" was combined with ("light emitting diode," "LED," "laser," or "red light"). The articles that were original research studies investigating the use of visible red light to treat skin fibrosis or related pathways were selected for inclusion. Our systematic search returned a total of 1376 articles. Duplicate articles were removed resulting in 1189 unique articles, and 133 non-English articles were excluded. From these articles, we identified six articles related to LED effects on skin fibrosis and dermal fibroblasts. We augmented our discussion with additional in vitro data on related pathways. LED phototherapy is an emerging therapeutic modality for treatment of skin fibrosis. There is a growing body of evidence demonstrating that visible LED light, especially in the red spectrum, is capable of modulating key cellular characteristic associated with skin fibrosis. We anticipate that as the understanding of LED-RL's biochemical mechanisms and clinical effects continue to advance, additional therapeutic targets in related pathways may emerge. We believe that the use of LED-RL, in combination with existing and new therapies, has the potential to alter the current treatment paradigm of skin fibrosis. There is a current lack of clinical trials

  13. Antibiotic adjuvants - A strategy to unlock bacterial resistance to antibiotics.

    Science.gov (United States)

    González-Bello, Concepción

    2017-09-15

    Resistance to available antibiotics in pathogenic bacteria is currently a global challenge since the number of strains that are resistant to multiple types of antibiotics has increased dramatically each year and has spread worldwide. To unlock this problem, the use of an 'antibiotic adjuvant' in combination with an antibiotic is now being exploited. This approach enables us to prolong the lifespan of these life-saving drugs. This digests review provides an overview of the main types of antibiotic adjuvants, the basis of their operation and the remaining issues to be tackled in this field. Particular emphasis is placed on those compounds that are already in clinical development, namely β-lactamase inhibitors. Copyright © 2017 The Author(s). Published by Elsevier Ltd.. All rights reserved.

  14. Key role of local regulation in chemosensing revealed by a new molecular interaction-based modeling method.

    Directory of Open Access Journals (Sweden)

    Martin Meier-Schellersheim

    2006-07-01

    Full Text Available The signaling network underlying eukaryotic chemosensing is a complex combination of receptor-mediated transmembrane signals, lipid modifications, protein translocations, and differential activation/deactivation of membrane-bound and cytosolic components. As such, it provides particularly interesting challenges for a combined computational and experimental analysis. We developed a novel detailed molecular signaling model that, when used to simulate the response to the attractant cyclic adenosine monophosphate (cAMP, made nontrivial predictions about Dictyostelium chemosensing. These predictions, including the unexpected existence of spatially asymmetrical, multiphasic, cyclic adenosine monophosphate-induced PTEN translocation and phosphatidylinositol-(3,4,5P3 generation, were experimentally verified by quantitative single-cell microscopy leading us to propose significant modifications to the current standard model for chemoattractant-induced biochemical polarization in this organism. Key to this successful modeling effort was the use of "Simmune," a new software package that supports the facile development and testing of detailed computational representations of cellular behavior. An intuitive interface allows user definition of complex signaling networks based on the definition of specific molecular binding site interactions and the subcellular localization of molecules. It automatically translates such inputs into spatially resolved simulations and dynamic graphical representations of the resulting signaling network that can be explored in a manner that closely parallels wet lab experimental procedures. These features of Simmune were critical to the model development and analysis presented here and are likely to be useful in the computational investigation of many aspects of cell biology.

  15. Characterization of the Key Aroma Compounds in Raw Licorice (Glycyrrhiza glabra L.) by Means of Molecular Sensory Science.

    Science.gov (United States)

    Wagner, Juliane; Granvogl, Michael; Schieberle, Peter

    2016-11-09

    Application of the molecular sensory science concept including aroma extract dilution analysis (AEDA) on the basis of gas chromatography-olfactometry combined with gas chromatography-mass spectrometry elucidated the key odorants of raw licorice (Glycyrrhiza glabra L.). Fifty aroma-active compounds were located via AEDA; 16 thereof were identified in raw licorice for the first time. γ-Nonalactone, 4-hydroxy-2,5-dimethylfuran-3(2H)-one, and 4-hydroxy-3-methoxybenzaldehyde showed the highest flavor dilution (FD) factor of 1024. Forty-three compounds were quantitated by means of stable isotope dilution analysis (SIDA; 6 more compounds were quantitated using labeled standards with structures similar to the respective analytes) and odor activity values (OAVs; ratio of concentration to the respective odor threshold) were calculated revealing OAVs ≥1 for 39 compounds. Thereby, (E,Z)-2,6-nonadienal, 5-isopropyl-2-methylphenol, hexanal, and linalool showed the highest OAVs. On the basis of the obtained results, an aqueous reconstitution model was prepared by mixing these 39 odorants in their naturally occurring concentrations. The recombinate elicited an aroma profile very similar to the profile of raw licorice, proving that all key aroma compounds were correctly identified and quantitated.

  16. Tablet computers and eBooks. Unlocking the potential for personal learning environments?

    NARCIS (Netherlands)

    Kalz, Marco

    2012-01-01

    Kalz, M. (2012, 9 May). Tablet computers and eBooks. Unlocking the potential for personal learning environments? Invited presentation during the annual conference of the European Association for Distance Learning (EADL), Noordwijkerhout, The Netherlands.

  17. Tablet computers and eBooks. Unlocking the potential for personal learning environments?

    NARCIS (Netherlands)

    Kalz, Marco

    2012-01-01

    Kalz, M. (2012, 9 May). Tablet computers and eBooks. Unlocking the potential for personal learning environments? Invited presentation during the annual conference of the European Association for Distance Learning (EADL), Noordwijkerhout, The Netherlands.

  18. IFN regulatory factor 8 is a key constitutive determinant of the morphological and molecular properties of microglia in the CNS.

    Directory of Open Access Journals (Sweden)

    Carsten Minten

    Full Text Available IFN regulatory factor (IRF 8 is a transcription factor that has a key role in the cellular response to IFN-γ and is pivotal in myeloid cell differentiation. Whether IRF8 plays a role in the development and function of microglia, the tissue-resident myeloid cells of the brain, is unknown. Here, we show IRF8 is a constitutively produced nuclear factor in microglia, which suggested that IRF8 might also be a key homeostatic transcriptional determinant of the microglial cell phenotype. In support of this, in mice with a targeted disruption of the IRF8 gene, microglia were increased in number and showed gross alterations in morphology and surface area. In situ analysis of some key myeloid markers revealed that IRF8-deficient microglia had significantly reduced levels of Iba1, but increased levels of CD206 (mannose receptor and F4/80 as well as increased tomato lectin binding. Analysis of microglia ex vivo revealed IRF8-deficient microglia had significantly increased levels of CD45, CD11b and F4/80, but significantly decreased levels of the chemokine receptors CCR2, CCR5 and CX3CR1. The known involvement of some of these molecular markers in membrane dynamics and phagocytosis led us to examine the phagocytic capacity of cultured IRF8-deficient microglia, however, this was found to be similar to wild type microglia. We conclude IRF8 is a constitutively produced nuclear factor in resident microglia of the CNS being a crucial transcriptional determinant of the phenotype of these cells in the healthy brain.

  19. Striking Plasticity of CRISPR-Cas9 and Key Role of Non-target DNA, as Revealed by Molecular Simulations

    Science.gov (United States)

    2016-01-01

    The CRISPR (clustered regularly interspaced short palindromic repeats)-Cas9 system recently emerged as a transformative genome-editing technology that is innovating basic bioscience and applied medicine and biotechnology. The endonuclease Cas9 associates with a guide RNA to match and cleave complementary sequences in double stranded DNA, forming an RNA:DNA hybrid and a displaced non-target DNA strand. Although extensive structural studies are ongoing, the conformational dynamics of Cas9 and its interplay with the nucleic acids during association and DNA cleavage are largely unclear. Here, by employing multi-microsecond time scale molecular dynamics, we reveal the conformational plasticity of Cas9 and identify key determinants that allow its large-scale conformational changes during nucleic acid binding and processing. We show how the “closure” of the protein, which accompanies nucleic acid binding, fundamentally relies on highly coupled and specific motions of the protein domains, collectively initiating the prominent conformational changes needed for nucleic acid association. We further reveal a key role of the non-target DNA during the process of activation of the nuclease HNH domain, showing how the nontarget DNA positioning triggers local conformational changes that favor the formation of a catalytically competent Cas9. Finally, a remarkable conformational plasticity is identified as an intrinsic property of the HNH domain, constituting a necessary element that allows for the HNH repositioning. These novel findings constitute a reference for future experimental studies aimed at a full characterization of the dynamic features of the CRISPR-Cas9 system, and—more importantly—call for novel structure engineering efforts that are of fundamental importance for the rational design of new genome-engineering applications. PMID:27800559

  20. Molecular Clone, Expression, and Prediction of Construction and Function to Key Genes of Interleukin Family of Porcine

    Institute of Scientific and Technical Information of China (English)

    JING Zhi-zhong; DOU Yong-xi; LUO Qi-hui; CHEN Guo-hua; MENG Xue-lian; ZHENG Ya-dong; LUO Xue-nong; CAI Xue-peng

    2007-01-01

    This research was to clone, express, and analyze the structure and function of major molecules of porcine interleukin family. Genes of porcine interleukin family were cloned by RT-PCR from stimulated porcine PBMC by LPS and PHA, and then expressed in E. coli, and the structure and function of these molecules were predicted by ExPASY. The results showed that genes of IL-4, IL-6, and IL-18 were successfully cloned and expressed. Furthermore, the expression products of recombinant IL-4 and IL-6 both have multiple biological activities. By analyzing these genes with the NCBI/GenBank data, the homologies of the nucleotide acid sequence are 99.25, 99.21, and 100%, respectively, and have great species differences when compared with other animal species. The results of the prediction showed that all these molecules contain several phosphorylation, glycosylation, protein kinase, and signal transduction bonding sites in secondary structure, and all are compact globularity protein in space configuration. These characteristics of structure are the basis for their multiple biological functions. The genes, structure and function of key molecular of porcine interleukin family were successfully cloned, expressed, and analyzed in this paper.

  1. Revealing time-unlocked brain activity from MEG measurements by common waveform estimation.

    Directory of Open Access Journals (Sweden)

    Yusuke Takeda

    Full Text Available Brain activities related to cognitive functions, such as attention, occur with unknown and variable delays after stimulus onsets. Recently, we proposed a method (Common Waveform Estimation, CWE that could extract such brain activities from magnetoencephalography (MEG or electroencephalography (EEG measurements. CWE estimates spatiotemporal MEG/EEG patterns occurring with unknown and variable delays, referred to here as unlocked waveforms, without hypotheses about their shapes. The purpose of this study is to demonstrate the usefulness of CWE for cognitive neuroscience. For this purpose, we show procedures to estimate unlocked waveforms using CWE and to examine their role. We applied CWE to the MEG epochs during Go trials of a visual Go/NoGo task. This revealed unlocked waveforms with interesting properties, specifically large alpha oscillations around the temporal areas. To examine the role of the unlocked waveform, we attempted to estimate the strength of the brain activity of the unlocked waveform in various conditions. We made a spatial filter to extract the component reflecting the brain activity of the unlocked waveform, applied this spatial filter to MEG data under different conditions (a passive viewing, a simple reaction time, and Go/NoGo tasks, and calculated the powers of the extracted components. Comparing the powers across these conditions suggests that the unlocked waveforms may reflect the inhibition of the task-irrelevant activities in the temporal regions while the subject attends to the visual stimulus. Our results demonstrate that CWE is a potential tool for revealing new findings of cognitive brain functions without any hypothesis in advance.

  2. Unlocking Australia's Language Potential. Profiles of 9 Key Languages in Australia. Volume 7: Japanese.

    Science.gov (United States)

    Marriott, Helen; And Others

    The report on the status of Japanese language teaching in Australia gives a broad view of Japanese study and discusses current educational issues in some detail. An introductory chapter offers a brief overview of the history, objectives, and issues of Japanese language instruction in Australia. The second chapter details features of instructional…

  3. The obesity epidemic: is glycemic index the key to unlocking a hidden addiction?

    Science.gov (United States)

    Thornley, Simon; McRobbie, Hayden; Eyles, Helen; Walker, Natalie; Simmons, Greg

    2008-11-01

    High body mass index (BMI) is an important cause of a range of diseases and is estimated to be the seventh leading cause of death globally. In this paper we discuss evidence that food consumption shows similarities to features of other addictive behaviours, such as automaticity and loss of control. Glycemic index is hypothesised to be the element of food that predicts its addictive potential. Although we do not have substantive evidence of a withdrawal syndrome from high glycemic food abstinence, anecdotal reports exist. Empirical scientific and clinical studies support an addictive component of eating behaviour, with similar neurotransmitters and neural pathways triggered by food consumption, as with other drugs of addiction. The public health implications of such a theory are discussed, with reference to tobacco control. Subtle changes in the preparation and manufacturing of commonly consumed food items, reducing glycemic index through regulatory channels, may break such a cycle of addiction and draw large public health benefits.

  4. Capturing Trojans and Irregular Satellites - the key required to unlock planetary migration

    CERN Document Server

    Horner, Jonathan; Lykawka, Patryk Sofia

    2013-01-01

    It is now accepted that the Solar system's youth was a dynamic and chaotic time. The giant planets migrated significant distances to reach their current locations, and evidence of that migration's influence on the Solar system abounds. That migration's pace, and the distance over which it occurred, is still heavily debated. Some models feature systems in which the giant planets were initially in an extremely compact configuration, in which Uranus and Neptune are chaotically scattered into the outer Solar system. Others feature architectures that were initially more relaxed, and smoother, more sedate migration. To determine which of these scenarios best represents the formation of our Solar system, we must turn to the structure of the system's small body populations, in which the scars of that migration are still clearly visible. We present the first results of a program investigating the effect of giant planet migration on the reservoirs of small bodies that existed at that time. As the planets migrate, they ...

  5. Unlocking Australia's Language Potential. Profiles of 9 Key Languages in Australia. Volume 6: Italian.

    Science.gov (United States)

    Di Biase, Bruno; And Others

    The status of the Italian language in Australia, particularly in the educational system at all levels, in Australian society in general, and in trade, technology, and tourism is discussed in this report. It begins with a description of the teaching of Italian in elementary, secondary, higher, adult/continuing, and teacher education. Trends are…

  6. ALH84001: The Key to Unlocking Secrets About Mars-15 Years and Counting

    Science.gov (United States)

    Gibson, Everett K.

    2011-01-01

    From the December 27, 1984 discovery of ALH84001, and its subsequent identification as a sample of Mars in 1993, mystery and debate has surrounded the meteorite. With the realization that the ALH84001 sample was a orthopyroxenite and one of the oldest SNC meteorites (4.09 Ga) available to study, important and critical information about the Martian hydrosphere and atmosphere along with the early history and evolution of the planet could be obtained by studying the unique carbonate globules (3.9 Ga) in the sample. The initial work showed the carbonate globules were deposited within fractures and cracks in the host-orthopyroxene by low-temperature aqueous fluids. Ideas that the carbonates were formed at temperatures approaching 800oC were ruled out by later experiments. The 1996 announcement by McKay et al. that ALH84001 contained features which could be interpreted as having a biogenic origin generated considerable excitement and criticism. The NASA Administrator Dan Golden said the 1996 ALH84001 announcement saved NASA s Mars planetary exploration program and injected $6 billion dollars over five years into the scientific research and analysis efforts. All of the original four lines of evidence for possible biogenic features within ALH84001 offered by McKay et al. have withstood the test of time. Criticism has been directed at the interpretation of the 1996 analytical data. Research has expanded to other SNC meteorites. Despite the numerous attacks on the ideas, the debate continues after 15 years. The 2009 paper by Thomas-Keprta et al. on the origins of a suite of magnetites within the ALH84001 has offered strong arguments that some of the magnetites can only be formed by biogenic processes and not from thermal decomposition or shock events which happened to the meteorite. NASA s Astrobiology Institute was formed from the foundation laid by the ALH84001 hypothesis of finding life beyond the Earth. The strong astrobiology outreach programs have expanded because of the work done on the Martian meteorites. Despite the criticism on the biogenic-like features in ALH84001, the meteorite has opened a window into the early history of Mars. Clearly low-temperature fluids have left their signatures within the ALH84001 meteorite and subsequent cratering events on Mars have been recorded on observable features within the meteorite. The 15 years of detailed study on ALH84001 and its unique carbonate globules have clearly shown formational and secondary processes at work on Mars. The evidence for biogenic processes operating on early Mars along with ground water activity within the last 15% of the life of Mars offers clear evidence that another niche for life may be possible within our solar system. Now we need a well-documented Mars sample return mission.

  7. Unlocking the Power of Remittances in Mexico: Keys to a Government Strategy for Poverty Reduction

    Science.gov (United States)

    2011-10-28

    also Alina Rocha Menocal, “ Programa 3x1 para Migrantes,” Social Cohesion Practical Experiences and Initiatives, Coordination Office of EUROsociAL...FIIAPP and Overseas Development Institute (ODI), available at: http://www.odi.org.uk/resources/details.asp?id=1283&title= programa -3x1-para-migrantes...Southern Mexico. University of Texas Press, Austin: 2004. Consejo Nactional de Evaluacion de la Politica de Desarrollo Social (Coneval), available

  8. Revision of Khawia spp. (Cestoda: Caryophyllidea), parasites of cyprinid fish, including a key to their identification and molecular phylogeny.

    Science.gov (United States)

    Scholz, Tomás; Brabec, Jan; Král'ová-Hromadová, Ivica; Oros, Mikulás; Bazsalovicsová, Eva; Ermolenko, Alexey; Hanzelová, Vladimíra

    2011-09-01

    morphological characters was incongruent with that inferred from molecular data, which indicates that some morphological traits may be homoplastic. A key to identification of all species of Khawia based on morphological characteristics is provided.

  9. Workshop on Key Issues in Major Research Plan "Study on the Signal Conduction Process Based on Chemical Small Molecular Probe" Held

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    @@ The workshop on key analysis method and largescale facilities application in the project of Major Research Plan "Study on the Signal Conduction Process Based on Chemical Small Molecular Probe" was held in the National Synchrotron Radiation Laboratory, Anhui on January 5th, 2008.

  10. Modulation-mediated unlocking of a parametrically phase-locked spin torque oscillator

    Energy Technology Data Exchange (ETDEWEB)

    Dürrenfeld, P.; Iacocca, E. [Department of Physics, University of Gothenburg, 412 96 Gothenburg (Sweden); Åkerman, J. [Department of Physics, University of Gothenburg, 412 96 Gothenburg (Sweden); Materials Physics, KTH-Royal Institute of Technology, School of ICT, Electrum 229, 164 40 Kista (Sweden); Muduli, P. K. [Department of Physics, University of Gothenburg, 412 96 Gothenburg (Sweden); Department of Physics, Indian Institute of Technology, Delhi, 110016 New Delhi (India)

    2014-12-22

    Modulation of an oscillator is crucial for its application in communication devices. While the output power and linewidth of single magnetic tunnel junction-based spin-torque oscillators (MTJ-STO) are not yet adequate for practical uses, the synchronization of such devices can overcome these limitations. Here, we investigate the modulation behavior of a parametrically synchronized MTJ-STO and show experimentally that modulation of the synchronized state preserves synchronization as long as the modulation frequency, f{sub mod}, is above a characteristic frequency, f{sub unlock}. The unlocking frequency increases with the modulation amplitude in agreement with analytical estimates and numerical simulations. These phenomena are described as a non-resonant unlocking mechanism, whose characteristics are directly related to inherent parameters of the oscillator.

  11. MOLECULAR MODELLING OF HUMAN ALDEHYDE OXIDASE AND IDENTIFICATION OF THE KEY INTERACTIONS IN THE ENZYME-SUBSTRATE COMPLEX

    Directory of Open Access Journals (Sweden)

    Siavoush Dastmalchi

    2005-05-01

    Full Text Available Aldehyde oxidase (EC 1.2.3.1, a cytosolic enzyme containing FAD, molybdenum and iron-sulphur cluster, is a member of non-cytochrome P-450 enzymes called molybdenum hydroxylases which is involved in the metabolism of a wide range of endogenous compounds and many drug substances. Drug metabolism is one of the important characteristics which influences many aspects of a therapeutic agent such as routes of administration, drug interaction and toxicity and therefore, characterisation of the key interactions between enzymes and substrates is very important from drug development point of view. The aim of this study was to generate a three-dimensional model of human aldehyde oxidase (AO in order to assist us to identify the mode of interaction between enzyme and a set of phethalazine/quinazoline derivatives. Both sequence-based (BLAST and inverse protein fold recognition methods (THREADER were used to identify the crystal structure of bovine xanthine dehydrogenase (pdb code of 1FO4 as the suitable template for comparative modelling of human AO. Model structure was generated by aligning and then threading the sequence of human AO onto the template structure, incorporating the associated cofactors, and molecular dynamics simulations and energy minimization using GROMACS program. Different criteria which were measured by the PROCHECK, QPACK, VERIFY-3D were indicative of a proper fold for the predicted structural model of human AO. For example, 97.9 percentages of phi and psi angles were in the favoured and most favoured regions in the ramachandran plot, and all residues in the model are assigned environmentally positive compatibility scores. Further evaluation on the model quality was performed by investigation of AO-mediated oxidation of a set of phthalazine/quinazoline derivatives to develop QSAR model capable of describing the extent of the oxidation. Substrates were aligned by docking onto the active site of the enzyme using GOLD technology and then

  12. Characterization of key transcription factors as molecular signatures of HPV-positive and HPV-negative oral cancers.

    Science.gov (United States)

    Verma, Gaurav; Vishnoi, Kanchan; Tyagi, Abhishek; Jadli, Mohit; Singh, Tejveer; Goel, Ankit; Sharma, Ankita; Agarwal, Kiran; Prasad, Subhash Chandra; Pandey, Durgatosh; Sharma, Shashi; Mehrotra, Ravi; Singh, Sukh Mahendra; Bharti, Alok Chandra

    2017-02-03

    Prior studies established constitutively active AP-1, NF-κB, and STAT3 signaling in oral cancer. Differential expression/activation of specific members of these transcription factors has been documented in HPV-positive oral lesions that respond better to therapy. We performed a comprehensive analysis of differentially expressed, transcriptionally active members of these pivotal signaling mediators to develop specific signatures of HPV-positive and HPV-negative oral lesions by immunohistochemical method that is applicable in low-resource settings. We examined a total of 31 prospective and 30 formalin-fixed, paraffin-embedded tissues from treatment-naïve, histopathologically and clinically confirmed cases diagnosed as oral or oropharyngeal squamous cell carcinoma (OSCC/OPSCC). Following determination of their HPV status by GP5 + /GP6 +  PCR, the sequential sections of the tissues were evaluated for expression of JunB, JunD, c-Fos, p50, p65, STAT3, and pSTAT3(Y705), along with two key regulatory proteins pEGFR and p16 by IHC. Independent analysis of JunB and p65 showed direct correlation with HPV positivity, whereas STAT3 and pSTAT3 were inversely correlated. A combined analysis of transcription factors revealed a more restrictive combination, characterized by the presence of AP-1 and NF-κB lacking involvement of STAT3 that strongly correlated with HPV-positive tumors. Presence of STAT3/pSTAT3 with NF-κB irrespective of the presence or absence of AP-1 members was present in HPV-negative lesions. Expression of pSTAT3 strongly correlated with all the AP-1/NF-κB members (except JunD), its upstream activator pEGFR(Y)(1092) , and HPV infection-related negative regulator p16. Overall, we show a simple combination of AP-1, NF-κB, and STAT3 members' expression that may serve as molecular signature of HPV-positive lesions or more broadly the tumors that show better prognosis.

  13. Recovering ferromagnetic metal surfaces to fully exploit chemistry in molecular spintronics

    Science.gov (United States)

    Galbiati, Marta; Delprat, Sophie; Mattera, Michele; Mañas-Valero, Samuel; Forment-Aliaga, Alicia; Tatay, Sergio; Deranlot, Cyrile; Seneor, Pierre; Mattana, Richard; Petroff, Frédéric

    2015-05-01

    Organic spintronics is a new emerging field that promises to offer the full potential of chemistry to spintronics, as for example high versatility through chemical engineering and simple low cost processing. However, one key challenge that remains to be unlocked for further applications is the high incompatibility between spintronics key materials such as high Curie temperature Co, Ni, Fe (and their alloys) and wet chemistry. Indeed, the transition metal proneness to oxidation has so far hampered the integration of wet chemistry processes into the development of room temperature organic spintronics devices. As a result, they had mainly to rely on high vacuum physical processes, restraining the choice of available organic materials to a small set of sublimable molecules. In this letter, focusing on cobalt as an example, we show a wet chemistry method to easily and selectively recover a metallic surface from an air exposed oxidized surface for further integration into spintronics devices. The oxide etching process, using a glycolic acid based solution, proceeds without increasing the surface roughness and allows the retrieval of an oxygen-free chemically active cobalt layer. This unlocks the full potential of wet chemistry processes towards room temperature molecular spintronics with transition metals electrodes. We demonstrate this by the grafting of alkylthiols self-assembled monolayers on recovered oxidized cobalt surfaces.

  14. Recovering ferromagnetic metal surfaces to fully exploit chemistry in molecular spintronics

    Directory of Open Access Journals (Sweden)

    Marta Galbiati

    2015-05-01

    Full Text Available Organic spintronics is a new emerging field that promises to offer the full potential of chemistry to spintronics, as for example high versatility through chemical engineering and simple low cost processing. However, one key challenge that remains to be unlocked for further applications is the high incompatibility between spintronics key materials such as high Curie temperature Co, Ni, Fe (and their alloys and wet chemistry. Indeed, the transition metal proneness to oxidation has so far hampered the integration of wet chemistry processes into the development of room temperature organic spintronics devices. As a result, they had mainly to rely on high vacuum physical processes, restraining the choice of available organic materials to a small set of sublimable molecules. In this letter, focusing on cobalt as an example, we show a wet chemistry method to easily and selectively recover a metallic surface from an air exposed oxidized surface for further integration into spintronics devices. The oxide etching process, using a glycolic acid based solution, proceeds without increasing the surface roughness and allows the retrieval of an oxygen-free chemically active cobalt layer. This unlocks the full potential of wet chemistry processes towards room temperature molecular spintronics with transition metals electrodes. We demonstrate this by the grafting of alkylthiols self-assembled monolayers on recovered oxidized cobalt surfaces.

  15. Stepping towards highly flexible aptamers: enzymatic recognition studies of unlocked nucleic acid nucleotides

    DEFF Research Database (Denmark)

    Dubois, Camille; Campbell, Meghan A; Edwards, Stacey L

    2012-01-01

    Enzymatic recognition of unlocked nucleic acid (UNA) nucleotides was successfully accomplished. Therminator DNA polymerase was found to be an efficient enzyme in primer extension reactions. Polymerase chain reaction (PCR) amplification of a 81 mer UNA-modified DNA library was efficiently achieved...

  16. Unlocking the Constraints of Cyanobacterial Productivity: Acclimations Enabling Ultrafast Growth

    Energy Technology Data Exchange (ETDEWEB)

    Bernstein, Hans C.; McClure, Ryan S.; Hill, Eric A.; Markillie, Lye Meng; Chrisler, William B.; Romine, Margie F.; McDermott, Jason E.; Posewitz, Matthew C.; Bryant, Donald A.; Konopka, Allan E.; Fredrickson, James K.; Beliaev, Alexander S.

    2016-07-26

    ABSTRACT

    Harnessing the metabolic potential of photosynthetic microbes for next-generation biotechnology objectives requires detailed scientific understanding of the physiological constraints and regulatory controls affecting carbon partitioning between biomass, metabolite storage pools, and bioproduct synthesis. We dissected the cellular mechanisms underlying the remarkable physiological robustness of the euryhaline unicellular cyanobacteriumSynechococcussp. strain PCC 7002 (Synechococcus7002) and identify key mechanisms that allow cyanobacteria to achieve unprecedented photoautotrophic productivities (~2.5-h doubling time). Ultrafast growth ofSynechococcus7002 was supported by high rates of photosynthetic electron transfer and linked to significantly elevated transcription of precursor biosynthesis and protein translation machinery. Notably, no growth or photosynthesis inhibition signatures were observed under any of the tested experimental conditions. Finally, the ultrafast growth inSynechococcus7002 was also linked to a 300% expansion of average cell volume. We hypothesize that this cellular adaptation is required at high irradiances to support higher cell division rates and reduce deleterious effects, corresponding to high light, through increased carbon and reductant sequestration.

    IMPORTANCEEfficient coupling between photosynthesis and productivity is central to the development of biotechnology based on solar energy. Therefore, understanding the factors constraining maximum rates of carbon processing is necessary to identify regulatory mechanisms and devise strategies to overcome productivity constraints. Here, we interrogate the molecular mechanisms that operate at a systems level to allow cyanobacteria to achieve ultrafast growth. This was done by considering growth and photosynthetic kinetics with global transcription patterns. We have delineated

  17. Protein unlocking procedures of formalin-fixed paraffin-embedded tissues: application to MALDI-TOF imaging MS investigations.

    Science.gov (United States)

    Ronci, Maurizio; Bonanno, Elena; Colantoni, Alfredo; Pieroni, Luisa; Di Ilio, Carmine; Spagnoli, Luigi Giusto; Federici, Giorgio; Urbani, Andrea

    2008-09-01

    Archival formalin-fixed paraffin-embedded (FFPE) tissues are a powerful tool for examining the clinical course of diseases. These specimens represent an incredible mine of valuable clinical and biological information for proteomic investigation. MALDI-TOF imaging MS (MALDI-IMS) is a protein profiling technique which enables the direct sampling of histological section; however, the quality of molecular data are strongly influenced by the tissue preparation condition. In fact, in previous years most of the studies employing such a technological platform have been conducted using cryo-preserved tissues. We have developed an in vitro approach using "tissue surrogate" samples in order to explore different protein unlocking procedures which might enable a suitable recovery of polypeptides for MS analysis. The developed protocols have been compared both by MALDI-TOF MS and nLC-MS(E) analysis either on surrogate samples or on FFPE specimen from human breast cancer. The collected evidence has been applied for the preparation of FFPE tissue sections following MALDI-IMS analysis. Our results outline the possibility to obtain valuable peptide mass spectra profiles form FFPE preparations by applying a combined two steps procedure of heat induced antigen retrieval (HIAR) in presence of EDTA and on target trypsin hydrolysis. A multivariate statistical evaluation is presented and discussed according to molecular spatial distributions and tissue morphology.

  18. RNA sequencing of Populus x canadensis roots identifies key molecular mechanisms underlying physiological adaption to excess zinc.

    Science.gov (United States)

    Ariani, Andrea; Di Baccio, Daniela; Romeo, Stefania; Lombardi, Lara; Andreucci, Andrea; Lux, Alexander; Horner, David Stephen; Sebastiani, Luca

    2015-01-01

    Populus x canadensis clone I-214 exhibits a general indicator phenotype in response to excess Zn, and a higher metal uptake in roots than in shoots with a reduced translocation to aerial parts under hydroponic conditions. This physiological adaptation seems mainly regulated by roots, although the molecular mechanisms that underlie these processes are still poorly understood. Here, differential expression analysis using RNA-sequencing technology was used to identify the molecular mechanisms involved in the response to excess Zn in root. In order to maximize specificity of detection of differentially expressed (DE) genes, we consider the intersection of genes identified by three distinct statistical approaches (61 up- and 19 down-regulated) and validate them by RT-qPCR, yielding an agreement of 93% between the two experimental techniques. Gene Ontology (GO) terms related to oxidation-reduction processes, transport and cellular iron ion homeostasis were enriched among DE genes, highlighting the importance of metal homeostasis in adaptation to excess Zn by P. x canadensis clone I-214. We identified the up-regulation of two Populus metal transporters (ZIP2 and NRAMP1) probably involved in metal uptake, and the down-regulation of a NAS4 gene involved in metal translocation. We identified also four Fe-homeostasis transcription factors (two bHLH38 genes, FIT and BTS) that were differentially expressed, probably for reducing Zn-induced Fe-deficiency. In particular, we suggest that the down-regulation of FIT transcription factor could be a mechanism to cope with Zn-induced Fe-deficiency in Populus. These results provide insight into the molecular mechanisms involved in adaption to excess Zn in Populus spp., but could also constitute a starting point for the identification and characterization of molecular markers or biotechnological targets for possible improvement of phytoremediation performances of poplar trees.

  19. RNA sequencing of Populus x canadensis roots identifies key molecular mechanisms underlying physiological adaption to excess zinc.

    Directory of Open Access Journals (Sweden)

    Andrea Ariani

    Full Text Available Populus x canadensis clone I-214 exhibits a general indicator phenotype in response to excess Zn, and a higher metal uptake in roots than in shoots with a reduced translocation to aerial parts under hydroponic conditions. This physiological adaptation seems mainly regulated by roots, although the molecular mechanisms that underlie these processes are still poorly understood. Here, differential expression analysis using RNA-sequencing technology was used to identify the molecular mechanisms involved in the response to excess Zn in root. In order to maximize specificity of detection of differentially expressed (DE genes, we consider the intersection of genes identified by three distinct statistical approaches (61 up- and 19 down-regulated and validate them by RT-qPCR, yielding an agreement of 93% between the two experimental techniques. Gene Ontology (GO terms related to oxidation-reduction processes, transport and cellular iron ion homeostasis were enriched among DE genes, highlighting the importance of metal homeostasis in adaptation to excess Zn by P. x canadensis clone I-214. We identified the up-regulation of two Populus metal transporters (ZIP2 and NRAMP1 probably involved in metal uptake, and the down-regulation of a NAS4 gene involved in metal translocation. We identified also four Fe-homeostasis transcription factors (two bHLH38 genes, FIT and BTS that were differentially expressed, probably for reducing Zn-induced Fe-deficiency. In particular, we suggest that the down-regulation of FIT transcription factor could be a mechanism to cope with Zn-induced Fe-deficiency in Populus. These results provide insight into the molecular mechanisms involved in adaption to excess Zn in Populus spp., but could also constitute a starting point for the identification and characterization of molecular markers or biotechnological targets for possible improvement of phytoremediation performances of poplar trees.

  20. Molecular genetic key for the identification of 17 Ixodes species of the United States (Acari:Ixodidae): a methods model.

    Science.gov (United States)

    Poucher, K L; Hutcheson, H J; Keirans, J E; Durden, L A; Black, W C

    1999-08-01

    A taxonomic key, based on restriction enzyme analysis of the second internal-transcribed spacer (ITS-2) in the nuclear ribosomal DNA gene, was developed for identification of 17 Ixodes tick species in the United States. This key includes: Ixodes affinis Neumann, Ixodes angustus Neumann, Ixodes baergi Cooley and Kohls, Ixodes brunneus Koch, Ixodes cookei Packard, Ixodes dentatus Marx, Ixodes jellisoni Cooley and Kohls, Ixodes kingi Bishopp, Ixodes minor Neumann, Ixodes muris Bishopp and Smith, Ixodes pacificus Cooley and Kohls, Ixodes scapularis Say, Ixodes sculpularis Neumann, I. spinipalpis Hadwen and Nuttall, Ixodes texanus Banks, Ixodes uriae White, and Ixodes woodi Bishopp. A 900-bp fragment of the ITS-2 was amplified using the polymerase chain reaction. This fragment was then digested with the restriction enzymes MspI and CfoI, and the digested fragments were size fractionated on a 2.5% high-resolution agarose gel. A dichotomous key was developed based on digested fragment sizes relative to a standard set of size markers. Little intraspecific variation in restriction fragment banding patterns was detected.

  1. Whole-exome sequencing identifies ATRX mutation as a key molecular determinant in lower-grade glioma.

    Science.gov (United States)

    Kannan, Kasthuri; Inagaki, Akiko; Silber, Joachim; Gorovets, Daniel; Zhang, Jianan; Kastenhuber, Edward R; Heguy, Adriana; Petrini, John H; Chan, Timothy A; Huse, Jason T

    2012-10-01

    The molecular foundations of lower-grade gliomas (LGGs)-astrocytoma, oligodendroglioma, and oligoastrocytoma-remain less well characterized than those of their fully malignant counterpart, glioblastoma. Mutations in isocitrate dehydrogenase 1 and 2 (IDH1/2) likely represent initiating pathogenic events. However, while IDH mutations appear to dramatically alter cellular epigenomic landscapes, definitive downstream transformative mechanisms have not been characterized. It remains likely, therefore, that additional genomic abnormalities collaborate with IDH mutation to drive oncogenesis in LGG. We performed whole exome sequencing in 4 LGGs, followed by focused resequencing in an additional 28, and found a high incidence of mutations in the ATRX gene (α thalassemia/mental retardation syndrome X-linked). ATRX forms a core component of a chromatin remodeling complex active in telomere biology. Mutations in ATRX have been identified in multiple tumor types and appear to cause alternative lengthening of telomeres (ALT), a presumed precursor to genomic instability. In our samples, ATRX mutation was entirely restricted to IDH-mutant tumors, closely correlated with TP53 mutation and astrocytic differentiation, and mutually exclusive with 1p/19q codeletion, the molecular hallmark of oligodendroglioma. Moreover, ATRX mutation was highly enriched in tumors of so-called early progenitor-like transcriptional subclass (~85%), which our prior work has linked to specific cells of origin in the forebrain subventricular zone. Finally, ATRX mutation correlated with ALT, providing a mechanistic link to genomic instability. In summary, our findings both identify ATRX mutation as a defining molecular determinant for a large subset of IDH-mutant gliomas and have direct implications on pathogenic mechanisms across the wide spectrum of LGGs.

  2. Characterization of the Key Aroma Compounds in Heat-Processed Licorice (Succus Liquiritiae) by Means of Molecular Sensory Science.

    Science.gov (United States)

    Wagner, Juliane; Schieberle, Peter; Granvogl, Michael

    2017-01-11

    Application of the sensomics concept elucidated the key odorants of heat-processed licorice (Succus Liquiritiae). Forty-nine aroma-active compounds with flavor dilution (FD) factors between 16 and 2048 were detected; 47 thereof were identified, 23 for the first time in heated licorice. 4-Hydroxy-2,5-dimethylfuran-3(2H)-one revealed the highest FD factor of 2048, followed by 3-hydroxy-4,5-dimethylfuran-2(5H)-one, 4-hydroxy-3-methoxybenzaldehyde, 3-hydroxy-2-methyl-4H-pyran-4-one, and 2-methoxyphenol (all 1024). Forty-two substances were quantitated by stable isotope dilution assays (SIDAs), and odor activity values (OAVs; ratio of concentration to the respective odor threshold) were calculated revealing OAVs ≥ 1 for 29 compounds. Thereby, 3-hydroxy-4,5-dimethylfuran-2(5H)-one, 2,3-butanedione, 2-methoxyphenol, and 1,8-cineole showed the highest OAVs in Succus Liquiritiae. To validate the obtained data, a reconstitution model based on an aqueous sucrose solution (50%) was prepared, containing all 29 odorants with an OAV ≥ 1 in their naturally occurring concentrations. The recombinate elicited an aroma profile matching very well with the profile of the original heat-processed licorice, proving the correct identification and quantitation of all key aroma compounds of Succus Liquiritiae.

  3. Functions of key residues in the ligand-binding pocket of vitamin D receptor: Fragment molecular orbital interfragment interaction energy analysis

    Science.gov (United States)

    Yamagishi, Kenji; Yamamoto, Keiko; Yamada, Sachiko; Tokiwa, Hiroaki

    2006-03-01

    Fragment molecular orbital-interfragment interaction energy calculations of the vitamin D receptor (VDR)/1α,25-dihydroxyvitamin D 3 complex were utilized to assign functions of key residues of the VDR. Only one residue forms a significant interaction with the corresponding hydroxy group of the ligand, although two residues are located around each hydroxy group. The degradation of binding affinity for derivatives upon removal of a hydroxy group is closely related to the trend in the strength of the hydrogen bonds. Type II hereditary rickets due to an Arg274 point mutation is caused by the lack of the strongest hydrogen bond.

  4. Transcriptome Analysis of Ullrich Congenital Muscular Dystrophy Fibroblasts Reveals a Disease Extracellular Matrix Signature and Key Molecular Regulators.

    Directory of Open Access Journals (Sweden)

    Sonia Paco

    Full Text Available Collagen VI related myopathies encompass a range of phenotypes with involvement of skeletal muscle, skin and other connective tissues. They represent a severe and relatively common form of congenital disease for which there is no treatment. Collagen VI in skeletal muscle and skin is produced by fibroblasts.In order to gain insight into the consequences of collagen VI mutations and identify key disease pathways we performed global gene expression analysis of dermal fibroblasts from patients with Ullrich Congenital Muscular Dystrophy with and without vitamin C treatment. The expression data were integrated using a range of systems biology tools. Results were validated by real-time PCR, western blotting and functional assays.We found significant changes in the expression levels of almost 600 genes between collagen VI deficient and control fibroblasts. Highly regulated genes included extracellular matrix components and surface receptors, including integrins, indicating a shift in the interaction between the cell and its environment. This was accompanied by a significant increase in fibroblasts adhesion to laminin. The observed changes in gene expression profiling may be under the control of two miRNAs, miR-30c and miR-181a, which we found elevated in tissue and serum from patients and which could represent novel biomarkers for muscular dystrophy. Finally, the response to vitamin C of collagen VI mutated fibroblasts significantly differed from healthy fibroblasts. Vitamin C treatment was able to revert the expression of some key genes to levels found in control cells raising the possibility of a beneficial effect of vitamin C as a modulator of some of the pathological aspects of collagen VI related diseases.

  5. Inference of phylogenetic relationships among key angiosperm lineages using a compatibility method on a molecular data set

    Institute of Scientific and Technical Information of China (English)

    Yin-Long QIU; George F.ESTABROOK

    2008-01-01

    Phylogenetic relationships among the five key angiosperm lineages,Ceratophyllum,Chloranthaceae,eudicots,magnoliids,and monocots,have resisted resolution despite several large-scale analyses sampling taxa and characters extensively and using various analytical methods.Meanwhile,compatibility methods,which were explored together with parsimony and likelihood methods during the early development stage of phylogenetics.have been greatly under-appreciated and not been used to analyze the massive amount of sequence data to reconstruct thye basal angiosperm phylogeny.In this study,we used a compatibility method on a data set of eight genes (mitochondrial atp1,matR,and nad5,plastid atpB,marK,rbcL,and rpoC2,and nuclear 18S rDNA)gathered in an earlier study.We selected two sets of characters that are compatible with more of the other characters than a random character would be with at probabilities of pM<0.1 and p<0.5 respectively.The resulting data matrices were subjected to parsimony and likelihood bootstrap analyses.Our unrooted parsimony analyses showed that Ceratophyllum was immediately related to eudicots,this larger lineage was immediately related to magnoliids,and monocots were closely related to Chloranthaceae.All these relationships received 76%-96% bootstrap support.A likelihood analysis of the 8 gene pM<0.5 compatible site matrix recovered the same topology but with low support.Likelihood analyses of other compatible site matrices produced different topologies that were all weakly supported.The topology reconstructed in the parsimony analyses agrees with the one recovered in the previous study using both parsimony and likelihood methods when no character was eliminated.Parts of this topology have also been recovered in several earlier studies.Hence,this topology plausibly reflects the true relationships among the five key angiosperm lineages.

  6. Unlocking the Origin of Superior Performance of a Si-Ge Core-Shell Nanowire Quantum Dot Field Effect Transistor.

    Science.gov (United States)

    Dhungana, Kamal B; Jaishi, Meghnath; Pati, Ranjit

    2016-07-13

    The sustained advancement in semiconducting core-shell nanowire technology has unlocked a tantalizing route for making next generation field effect transistor (FET). Understanding how to control carrier mobility of these nanowire channels by applying a gate field is the key to developing a high performance FET. Herein, we have identified the switching mechanism responsible for the superior performance of a Si-Ge core-shell nanowire quantum dot FET over its homogeneous Si counterpart. A quantum transport approach is used to investigate the gate-field modulated switching behavior in electronic current for ultranarrow Si and Si-Ge core-shell nanowire quantum dot FETs. Our calculations reveal that for the ON state, the gate-field induced transverse localization of the wave function restricts the carrier transport to the outer (shell) layer with the pz orbitals providing the pathway for tunneling of electrons in the channels. The higher ON state current in the Si-Ge core-shell nanowire FET is attributed to the pz orbitals that are distributed over the entire channel; in the case of Si nanowire, the participating pz orbital is restricted to a few Si atoms in the channel resulting in a smaller tunneling current. Within the gate bias range considered here, the transconductance is found to be substantially higher in the case of a Si-Ge core-shell nanowire FET than in a Si nanowire FET, which suggests a much higher mobility in the Si-Ge nanowire device.

  7. Brain banks as key part of biochemical and molecular studies on cerebral cortex involvement in Parkinson's disease.

    Science.gov (United States)

    Ravid, Rivka; Ferrer, Isidro

    2012-04-01

    Exciting developments in basic and clinical neuroscience and recent progress in the field of Parkinson's disease (PD) are partly a result of the availability of human specimens obtained through brain banks. These banks have optimized the methodological, managerial and organizational procedures; standard operating procedures; and ethical, legal and social issues, including the code of conduct for 21st Century brain banking and novel protocols. The present minireview focuses on current brain banking organization and management, as well as the likely future direction of the brain banking field. We emphasize the potentials and pitfalls when using high-quality specimens of the human central nervous system for advancing PD research. PD is a generalized disease in which α-synuclein is not a unique component but, instead, is only one of the players accounting for the complex impairment of biochemical/molecular processes involved in metabolic pathways. This is particularly important in the cerebral cortex, where altered cognition has a complex neurochemical substrate. Mitochondria and energy metabolism impairment, abnormal RNA, microRNA, protein synthesis, post-translational protein modifications and alterations in the lipid composition of membranes and lipid rafts are part of these complementary factors. We have to be alert to the possible pitfalls of each specimen and its suitability for a particular study. Not all samples qualify for the study of DNA, RNA, proteins, post-translational modifications, lipids and metabolomes, although the use of carefully selected samples and appropriate methods minimizes pitfalls and errors and guarantees high-quality reserach.

  8. An accessible hydrophobic surface is a key element of the molecular chaperone action of Atp11p.

    Science.gov (United States)

    Sheluho, D; Ackerman, S H

    2001-10-26

    Atp11p is a soluble protein of mitochondria that binds unassembled beta subunits of the F(1)-ATPase and prevents them from aggregating in the matrix. In this report, we show that Atp11p protects the insulin B chain from aggregating in vitro and therefore acts as a molecular chaperone. The chaperone action of Atp11p is mediated by hydrophobic interactions. An accessible hydrophobic surface in Atp11p was identified with the environment-sensitive fluorescent probe 1,1'-bis(4-anilino-5-napththalenesulfonic acid (bis-ANS). The spectral changes of bis-ANS in the presence of Atp11p indicate that the probe binds to a nonpolar region of the protein. Furthermore, the dye quenches the fluorescence of Atp11p tryptophan residues in a concentration-dependent manner. Although up to three molecules of bis-ANS can bind cooperatively to Atp11p, the binding of only one dye molecule is sufficient to virtually eliminate the chaperone activity of the protein.

  9. New reports, phylogenetic analysis, and a key to Lactarius Pers. in the Greater Yellowstone Ecosystem informed by molecular data

    Directory of Open Access Journals (Sweden)

    Edward G. Barge

    2016-09-01

    Full Text Available The Greater Yellowstone Ecosystem (GYE, located in the Central Rocky Mountains of western North America, is one of the largest nearly intact temperate-zone ecosystems on Earth. Here, Lactarius is an important component of ectomycorrhizal communities in many habitat types, from low elevation riparian areas to high elevation conifer forests and alpine tundra. Molecular phylogenetic analyses of ITS and RPB2 gene sequences along with detailed morphological examination confirm at least 20 Lactarius species, as well as three varieties, and one unresolved species group in the GYE. Eight taxa are reported from the GYE for the first time, and nearly every major ectomycorrhizal host plant in the GYE appears to have at least one Lactarius species associated with it. Broad intercontinental distributions are suggested for alpine Salix and Betula associates, and for certain subalpine Picea and aspen (Populus spp. associates. Some species appear to be restricted to western North America with Pinus, Pseudotsuga or Abies. The distribution and/or host affinities of others is not clear due in part to ambiguous host assignment, taxonomic problems or the relative rarity with which they have been reported.

  10. A molecular phylogeny of Acronychia, Euodia, Melicope and relatives (Rutaceae) reveals polyphyletic genera and key innovations for species richness.

    Science.gov (United States)

    Appelhans, Marc S; Wen, Jun; Wagner, Warren L

    2014-10-01

    We present the first detailed phylogenetic study of the genus Melicope, the largest genus of the Citrus family (Rutaceae). The phylogenetic analysis sampled about 50% of the 235 accepted species of Melicope as well as representatives of 26 related genera, most notably Acronychia and Euodia. The results based on five plastid and nuclear markers have revealed that Acronychia, Euodia and Melicope are each not monophyletic in their current circumscriptions and that several small genera mainly from Australia and New Caledonia need to be merged with one of the three genera to ensure monophyly at the generic level. The phylogenetic position of the drupaceous Acronychia in relation to Melicope, which has capsular or follicular fruits, remains unclear and Acronychia might be a separate genus or a part of Melicope. The seed coats of Melicope, Acronychia and related genera show adaptations to bird-dispersal, which might be regarded as key innovations for species radiations. Euodia and its relatives, which lack these adaptations, include only about 20 species while the Melicope-Acronychia group consists of about 340 species. The drupaceous genera Comptonella, Dutaillyea, Picrella and Sarcomelicope are nested within Melicope and need to be merged with Melicope. The expanded genus is a prime example of the artificial classification system of Engler, who defined Rutaceous subfamilies mainly based on gynoecial and fruit characters.

  11. Characterization of the key aroma compounds in apricots (Prunus armeniaca) by application of the molecular sensory science concept.

    Science.gov (United States)

    Greger, Veronika; Schieberle, Peter

    2007-06-27

    An aroma extract dilution analysis applied on an aroma distillate prepared from fresh apricots revealed (R)-gamma-decalactone, (E)-beta-damascenone, delta-decalactone, and (R/S)-linalool with the highest flavor dilution (FD) factors among the 26 odor-active compounds identified. On the basis of quantitative measurements performed by application of stable isotope dilution assays, followed by a calculation of odor activity values (OAVs), beta-ionone, (Z)-1,5-octadien-3-one, gamma-decalactone, (E,Z)-2,6-nonadienal, linalool, and acetaldehyde appeared with OAVs >100, whereas in particular certain lactones, often associated with an apricot aroma note, such as gamma-undecalactone, gamma-nonalactone, and delta-decalactone, showed very low OAVs (<5). An aroma recombinate prepared by mixing the 18 most important odorants in concentrations as they occurred in the fresh fruits showed an overall aroma very similar to that of apricots. Omission experiments indicated that previously unknown constituents of apricots, such as (E,Z)-2,6-nonadienal or (Z)-1,5-octadien-3-one, are key contributors to the apricot aroma.

  12. Molecular dynamics simulations of mutated Mycobacterium tuberculosis L-alanine dehydrogenase to illuminate the role of key residues.

    Science.gov (United States)

    Ling, Baoping; Bi, Siwei; Sun, Min; Jing, Zhihong; Li, Xiaoping; Zhang, Rui

    2014-05-01

    L-Alanine dehydrogenase from Mycobacterium tuberculosis (L-MtAlaDH) catalyzes the NADH-dependent interconversion of l-alanine and pyruvate, and it is considered to be a potential target for the treatment of tuberculosis. The experiment has verified that amino acid replacement of the conserved active-site residues which have strong stability and no great changes in biological evolutionary process, such as His96 and Asp270, could lead to inactive mutants [Ågren et al., J. Mol. Biol. 377 (2008) 1161-1173]. However, the role of these conserved residues in catalytic reaction still remains unclear. Based on the crystal structures, a series of mutant structures were constructed to investigate the role of the conserved residues in enzymatic reaction by using molecular dynamics simulations. The results show that whatever the conserved residues were mutated, the protein can still convert its conformation from open state to closed state as long as NADH is present in active site. Asp270 maintains the stability of nicotinamide ring and ribose of NADH through hydrogen bond interactions, and His96 is helpful to convert the protein conformation by interactions with Gln271, whereas, they would lead to the structural rearrangement in active site and lose the catalytic activity when they were mutated. Additionally, we deduce that Met301 plays a major role in catalytic reaction due to fixing the nicotinamide ring of NADH to prevent its rotation, and we propose that Met301 would be mutated to the hydrophobic residue with large steric hindrance in side chain to test the activity of the protein in future experiment.

  13. Molecular characterization of adenosine 5'-monophosphate deaminase--the key enzyme responsible for the umami taste of nori (Porphyra yezoensis Ueda, Rhodophyta).

    Science.gov (United States)

    Minami, Seiko; Sato, Minoru; Shiraiwa, Yoshihiro; Iwamoto, Koji

    2011-12-01

    The enzyme adenosine 5'-monophosphate deaminase (AMPD, EC 3.5.4.6) catalyzes the conversion of adenosine 5'-monophosphate to inosine 5'-mononucleotide (IMP). IMP is generally known as the compound responsible for the umami taste of the edible red alga Porphyra yezoensis Ueda that is known in Japan as nori. Therefore, we suspect that AMPD plays a key role in providing a favorable nori taste. In this study, we undertake the molecular characterization of nori-derived AMPD. The nori AMPD protein has a molecular mass of 55 kDa as estimated from both gel filtration and sodium dodecyl sulfate polyacrylamide gel electrophoresis. The calculated molecular mass from the amino acid sequence deduced from cDNA is 57.1 kDa. The isoelectric point is 5.71. The coding region of AMPD consists of 1,566 bp encoding 522 amino acids and possesses a transmembrane domain and two N-glycosylation sites. The sequence identity of nori AMPD in human and yeast AMPDs was found to be less than 50% and 20% in DNA and amino acid sequences, respectively. Proline in the conserved motif of [SA]-[LIVM]-[NGS]-[STA]-D-D-P was found to be converted to glutamate. These results indicate that nori AMPD is a novel type of AMPD.

  14. Unlocking the potential of smart grid technologies with behavioral science

    Directory of Open Access Journals (Sweden)

    Nicole eSintov

    2015-04-01

    Full Text Available Smart grid systems aim to provide a more stable and adaptable electricity infrastructure, and to maximize energy efficiency. Grid-linked technologies vary widely in form and function, but generally share common potentials: to reduce energy consumption via efficiency and/or curtailment, to shift use to off-peak times of day, and to enable distributed storage and generation options. Although end users are key players in these systems, they tend to be overlooked. Behavioral science is therefore key to engaging end-users and maximizing the impact of smart grid technologies. In this paper, we highlight several ways in which behavioral science can be applied to better understand and engage customers in smart grid systems.

  15. Redescription and molecular characterisation of Dujardinascaris madagascariensis and a note on D. dujardini (Nematoda: Heterocheilidae), parasites of Crocodylus niloticus, with a key to Dujardinascaris spp. in crocodilians.

    Science.gov (United States)

    Mašová, Šárka; Baruš, Vlastimil; Seifertová, Mária; Malala, John; Jirků, Miloslav

    2014-12-08

    An examination of one specimen of Nile crocodile, Crocodylus niloticus (Laurenti, 1768), from Lake Turkana (Kenya), revealed the presence of two ascaridoid nematodes belonging to the genus Dujardinascaris Baylis, 1947. Dujardinascaris madagascariensis Chabaud & Caballero, 1966 was studied by scanning electron microscopy, redescribed, and differentiated from D. dujardini (Travassos, 1920). Dujardinascaris madagascariencsis is the second of the genus to be sequenced. An internal fragment of the small ribosomal subunit and nuclear ribosomal DNA internal transcribed spacer 2 region were amplified--the slowly evolving 18S gene region was used for phylogenetic analysis. Molecular data confirmed affinity of D. madagascariensis to the family Heterocheilidae and revealed its closest relationship with D. waltoni. A key to the species of Dujardinascaris parasitizing crocodiles is provided.

  16. Status of Gobiosoma (Teleostei: Gobiidae) from Brazil: description of a new species, redescription of G. hemigymnum, molecular phylogeny of the genus, and key to Atlantic species.

    Science.gov (United States)

    Van Tassell, James L; Joyeux, Jean-Christophe; Macieira, Raphael Mariano; Tornabene, Luke

    2015-08-31

    It is unclear how many species of Gobiosoma occur in Brazil and what their geographic distributions are. Here we combine data from a comprehensive morphological survey and a molecular analysis to clarify this uncertain taxonomy and place Brazilian Gobiosoma within a phylogenetic framework. Recent collections in Brazil, from the states of Ceará to Santa Catarina, and in Uruguay yielded two allopatric species of Gobiosoma that are distinct in genetics, meristics, morphometrics, scale pattern and coloration. Comparisons were made with types and specimens of Gobiosoma hemigymnum, Garmannia mediocricula, Gobiosoma spilotum and Gobiosoma parri and all other known species of Gobiosoma. We place G. parri in synonomy with G. hemigymnum with a distribution of Rio de Janeiro to Uruguay and Argentina. The northern species, that extends from the states of Espírito Santo to Ceará, is described as a new species, Gobiosoma alfiei. A key to the Atlantic species of Gobiosoma is provided.

  17. Unlocking the potential of lignocellulosic biomass through plant science.

    Science.gov (United States)

    Marriott, Poppy E; Gómez, Leonardo D; McQueen-Mason, Simon J

    2016-03-01

    The aim of producing sustainable liquid biofuels and chemicals from lignocellulosic biomass remains high on the sustainability agenda, but is challenged by the costs of producing fermentable sugars from these materials. Sugars from plant biomass can be fermented to alcohols or even alkanes, creating a liquid fuel in which carbon released on combustion is balanced by its photosynthetic capture. Large amounts of sugar are present in the woody, nonfood parts of crops and could be used for fuel production without compromising global food security. However, the sugar in woody biomass is locked up in the complex and recalcitrant lignocellulosic plant cell wall, making it difficult and expensive to extract. In this paper, we review what is known about the major polymeric components of woody plant biomass, with an emphasis on the molecular interactions that contribute to its recalcitrance to enzymatic digestion. In addition, we review the extensive research that has been carried out in order to understand and reduce lignocellulose recalcitrance and enable more cost-effective production of fuel from woody plant biomass.

  18. Unlocking Value Creation Using an Agritourism Business Model

    Directory of Open Access Journals (Sweden)

    Laura Broccardo

    2017-09-01

    Full Text Available Agritourism has achieved a greater importance in the last decade, but despite this relevance, the definition is not aligned everywhere, depending on the contingency variables of the context in which agritourism is located. This paper aims at analyzing the business model’s key success factors of Italian agritourism by studying their structural, social and economic features, integrated with a sustainability approach. The empirical analysis is based on a sample of agritourism, located in an Italian region. The empirical results show relevant and useful elements to support the sustainable development of agritourism business models in Italy, linking theory, policy and practices. Indeed, these results, together with others related to the economic dimension of the farms, their specialization, and the characteristics of the farmers make it possible to argue that there are common elements, which offer potential for agritourism. In addition, it was possible to identify two different models of agritourism. Agritourism can open new horizons in rural sustainable development, with possible beneficial effects on the environment, society, agricultural heritage and economic growth. In particular, regional policy developers should take into consideration these elements in order to direct correctly efforts. The research shows also some interesting theoretical implications as it contributes to enrich the literature on this particular kind of business model. At the same time, it helps family owners to increase the overall understanding of their agritourism, in order to finalize adequate planning and communication.

  19. Unlocking the Constraints of Cyanobacterial Productivity: Acclimations Enabling Ultrafast Growth

    Directory of Open Access Journals (Sweden)

    Hans C. Bernstein

    2016-07-01

    Full Text Available Harnessing the metabolic potential of photosynthetic microbes for next-generation biotechnology objectives requires detailed scientific understanding of the physiological constraints and regulatory controls affecting carbon partitioning between biomass, metabolite storage pools, and bioproduct synthesis. We dissected the cellular mechanisms underlying the remarkable physiological robustness of the euryhaline unicellular cyanobacterium Synechococcus sp. strain PCC 7002 (Synechococcus 7002 and identify key mechanisms that allow cyanobacteria to achieve unprecedented photoautotrophic productivities (~2.5-h doubling time. Ultrafast growth of Synechococcus 7002 was supported by high rates of photosynthetic electron transfer and linked to significantly elevated transcription of precursor biosynthesis and protein translation machinery. Notably, no growth or photosynthesis inhibition signatures were observed under any of the tested experimental conditions. Finally, the ultrafast growth in Synechococcus 7002 was also linked to a 300% expansion of average cell volume. We hypothesize that this cellular adaptation is required at high irradiances to support higher cell division rates and reduce deleterious effects, corresponding to high light, through increased carbon and reductant sequestration.

  20. Characterizing and sourcing ambient PM2.5 over key emission regions in China II: Organic molecular markers and CMB modeling

    Science.gov (United States)

    Zhou, Jiabin; Xiong, Ying; Xing, Zhenyu; Deng, Junjun; Du, Ke

    2017-08-01

    From November 2012 to July 2013, a sampling campaign was completed for comprehensive characterization of PM2.5 over four key emission regions in China: Beijing-Tianjin-Hebei (BTH), Yangzi River Delta (YRD), Pearl River Delta (PRD), and Sichuan Basin (SB). A multi-method approach, adopting different analytical and receptor modeling methods, was employed to determine the relative abundances of region-specific air pollution constituents and contributions of emission sources. This paper is focused on organic molecular marker based source apportionment using chemical mass balance (CMB) receptor modeling. Analyses of the organic molecular markers revealed that vehicle emission, coal combustion, biomass burning, meat cooking and natural gas combustion were the major contributors to organic carbon (OC) in PM2.5. The vehicle emission dominated the sources contributing to OC in spring at four sampling sites. During wintertime, the coal combustion had highest contribution to OC at BTH site, while the major source contributing to OC at YRD and PRD sites was vehicle emission. In addition, the relative contributions of different emission sources to PM2.5 mass at a specific location site and in a specific season revealed seasonal and spatial variations across all four sampling locations. The largest contributor to PM2.5 mass was secondary sulfate (14-17%) in winter at the four sites. The vehicle emission was found to be the major source (14-21%) for PM2.5 mass at PRD site. The secondary ammonium has minor variation (4-5%) across the sites, confirming the influences of regional emission sources on these sites. The distinct patterns of seasonal and spatial variations of source apportionment observed in this study were consistent with the findings in our previous paper based upon water-soluble ions and carbonaceous fractions. This makes it essential for the local government to make season- and region-specific mitigation strategies for abating PM2.5 pollution in China.

  1. Molecular Identification of Atlantic Bluefin Tuna (Thunnus thynnus, Scombridae Larvae and Development of a DNA Character-Based Identification Key for Mediterranean Scombrids.

    Directory of Open Access Journals (Sweden)

    Gregory Neils Puncher

    Full Text Available The Atlantic bluefin tuna, Thunnus thynnus, is a commercially important species that has been severely over-exploited in the recent past. Although the eastern Atlantic and Mediterranean stock is now showing signs of recovery, its current status remains very uncertain and as a consequence their recovery is dependent upon severe management informed by rigorous scientific research. Monitoring of early life history stages can inform decision makers about the health of the species based upon recruitment and survival rates. Misidentification of fish larvae and eggs can lead to inaccurate estimates of stock biomass and productivity which can trigger demands for increased quotas and unsound management conclusions. Herein we used a molecular approach employing mitochondrial and nuclear genes (CO1 and ITS1, respectively to identify larvae (n = 188 collected from three spawning areas in the Mediterranean Sea by different institutions working with a regional fisheries management organization. Several techniques were used to analyze the genetic sequences (sequence alignments using search algorithms, neighbour joining trees, and a genetic character-based identification key and an extensive comparison of the results is presented. During this process various inaccuracies in related publications and online databases were uncovered. Our results reveal important differences in the accuracy of the taxonomic identifications carried out by different ichthyoplanktologists following morphology-based methods. While less than half of larvae provided were bluefin tuna, other dominant taxa were bullet tuna (Auxis rochei, albacore (Thunnus alalunga and little tunny (Euthynnus alletteratus. We advocate an expansion of expertise for a new generation of morphology-based taxonomists, increased dialogue between morphology-based and molecular taxonomists and increased scrutiny of public sequence databases.

  2. Unlocking Index Animalium: From paper slips to bytes and bits.

    Science.gov (United States)

    Pilsk, Suzanne C; Kalfatovic, Martin R; Richard, Joel M

    2016-01-01

    In 1996 Smithsonian Libraries (SIL) embarked on the digitization of its collections. By 1999, a full-scale digitization center was in place and rare volumes from the natural history collections, often of high illustrative value, were the focus for the first years of the program. The resulting beautiful books made available for online display were successful to a certain extent, but it soon became clear that the data locked within the texts needed to be converted to more usable and re-purposable form via digitization methods that went beyond simple page imaging and included text conversion elements. Library staff met with researchers from the taxonomic community to understand their path to the literature and identified tools (indexes and bibliographies) used to connect to the library holdings. The traditional library metadata describing the titles, which made them easily retrievable from the shelves of libraries, was not meeting the needs of the researcher looking for more detailed and granular data within the texts. The result was to identify proper print tools that could potential assist researchers in digital form. This paper outlines the project undertaken to convert Charles Davies Sherborn's Index Animalium into a tool to connect researchers to the library holdings: from a print index to a database to eventually a dataset. Sherborn's microcitation of a species name and his bibliographies help bridge the gap between taxonomist and literature holdings of libraries. In 2004, SIL received funding from the Smithsonian's Atherton Seidell Endowment to create an online version of Sherborn's Index Animalium. The initial project was to digitize the page images and re-key the data into a simple data structure. As the project evolved, a more complex database was developed which enabled quality field searching to retrieve species names and to search the bibliography. Problems with inconsistent abbreviations and styling of his bibliographies made the parsing of the data

  3. Agro-industrial lignocellulosic biomass a key to unlock the future bio-energy: A brief review

    Directory of Open Access Journals (Sweden)

    Zahid Anwar

    2014-04-01

    Full Text Available From the last several years, in serious consideration of the worldwide economic and environmental pollution issues there has been increasing research interest in the value of bio-sourced lignocellulosic biomass. Agro-industrial biomass comprised on lignocellulosic waste is an inexpensive, renewable, abundant and provides a unique natural resource for large-scale and cost-effective bio-energy collection. To expand the range of natural bio-resources the rapidly evolving tools of biotechnology can lower the conversion costs and also enhance target yield of the product of interest. In this background green biotechnology presents a promising approach to convert most of the solid agricultural wastes particularly lignocellulosic materials into liquid bio based energy-fuels. In fact, major advances have already been achieved to competitively position cellulosic ethanol with corn ethanol. The present summarized review work begins with an overview on the physico-chemical features and composition of agro-industrial biomass. The information is also given on the multi-step processing technologies of agro-industrial biomass to fuel ethanol followed by a brief summary of future considerations.

  4. Unlocking the nature of the phonological-deep dyslexia continuum: the keys to reading aloud are in phonology and semantics.

    Science.gov (United States)

    Crisp, Jenni; Lambon Ralph, Matthew A

    2006-03-01

    It has been argued that normal reading and acquired dyslexias reflect the role of three underlying primary systems (phonology, semantics, and vision) rather than neural mechanisms dedicated to reading. This proposal is potentially consistent with the suggestion that phonological and deep dyslexia represent variants of a single reading disorder rather than two separate entities. The current study explored this possibility, the nature of any continuum between the disorders, and the possible underlying bases of it. A case series of patients were given an assessment battery to test for the characteristics of phonological and deep dyslexia. The status of their underlying phonological and semantic systems was also investigated. The majority of participants exhibited many of the symptoms associated with deep dyslexia whether or not they made semantic errors. Despite wide variation in word and nonword reading accuracy, there was considerable symptom overlap across the cohort and, thus, no sensible dividing line to separate the participants into distinct groups. The patient data indicated that the deep-phonological continuum might best be characterized according to the severity of the individual's reading impairment rather than in terms of a strict symptom succession. Assessments of phonological and semantic impairments suggested that the integrity of these primary systems underpinned the patients' reading performance. This proposal was supported by eliciting the symptoms of deep-phonological dyslexia in nonreading tasks.

  5. Unlocking the nature of the phonological-deep dyslexial continuum: the keys to reading aloud are in phonology and semantics

    OpenAIRE

    Crisp, J; Lambon Ralph, Matthew

    2006-01-01

    It has been argued that normal reading and acquired dyslexias reflect the role of three underlying primary systems (phonology, semantics, and vision) rather than neural mechanisms dedicated to reading. This proposal is potentially consistent with the suggestion that phonological and deep dyslexia represent variants of a single reading disorder rather than two separate entities. The current study explored this possibility, the nature of any continuum between the disorders, and the possible und...

  6. Entrepreneurial Orientation- A Key to Unlock Teacher’s Potential in Higher Education. A Case of Finland & Pakistan

    Directory of Open Access Journals (Sweden)

    Naeem HAYAT

    2015-12-01

    Full Text Available This paper attempt to appropriately measure student perception about the performance their lecturers/teacher in higher education by means of entrepreneurship orientation construct. In this study, efforts are made to evaluate the students perception with three factors of entrepreneurship orientation construct i.e. innovativeness, proactiveness and risk taking. Using the data collected from Finland and Pakistan on the questionnaire developed on the basis of the previous entrepreneurship orientation construct. We find evidence that students’ perception can be explained with use of innovativeness, proactiveness and risk taking attributes of the lecturer/ teacher in Finland and Pakistan. Leadership in higher education can leverage their role by including lecturers/teachers. Inferences are made of the finding along with the recommended prospect studies.

  7. The tearing mode locking-unlocking mechanism to an external resonant field in EXTRAP T2R

    Science.gov (United States)

    Frassinetti, L.; Fridström, R.; Menmuir, S.; Brunsell, P. R.

    2014-10-01

    The tearing mode (TM) locking and unlocking process due to an external resonant magnetic perturbation (RMP) is experimentally studied in EXTRAP T2R. The RMP produces a reduction of the natural TM velocity and ultimately the TM locking if a threshold in the RMP amplitude is exceeded. During the braking process, the TM slows down via a mechanism composed of deceleration and acceleration phases. During the acceleration phases, the TM can reach velocities higher than the natural velocity. Once the TM locking occurs, the RMP must be reduced to a small amplitude to obtain the TM unlocking, showing that the unlocking threshold is significantly smaller than the locking threshold and that the process is characterized by hysteresis. Experimental results are in qualitative agreement with a model that describes the locking-unlocking process via the balance of the electromagnetic torque produced by the RMP that acts to brake the TM and the viscous torque that tends to re-establish the unperturbed velocity.

  8. Unlocking the Power of Big Data at the National Institutes of Health.

    Science.gov (United States)

    Coakley, Meghan F; Leerkes, Maarten R; Barnett, Jason; Gabrielian, Andrei E; Noble, Karlynn; Weber, M Nick; Huyen, Yentram

    2013-09-01

    The era of "big data" presents immense opportunities for scientific discovery and technological progress, with the potential to have enormous impact on research and development in the public sector. In order to capitalize on these benefits, there are significant challenges to overcome in data analytics. The National Institute of Allergy and Infectious Diseases held a symposium entitled "Data Science: Unlocking the Power of Big Data" to create a forum for big data experts to present and share some of the creative and innovative methods to gleaning valuable knowledge from an overwhelming flood of biological data. A significant investment in infrastructure and tool development, along with more and better-trained data scientists, may facilitate methods for assimilation of data and machine learning, to overcome obstacles such as data security, data cleaning, and data integration.

  9. Unlocking the Power of Big Data at the National Institutes of Health

    Science.gov (United States)

    Coakley, Meghan F.; Leerkes, Maarten R.; Barnett, Jason; Gabrielian, Andrei E.; Noble, Karlynn; Weber, M. Nick

    2013-01-01

    Abstract The era of “big data” presents immense opportunities for scientific discovery and technological progress, with the potential to have enormous impact on research and development in the public sector. In order to capitalize on these benefits, there are significant challenges to overcome in data analytics. The National Institute of Allergy and Infectious Diseases held a symposium entitled “Data Science: Unlocking the Power of Big Data” to create a forum for big data experts to present and share some of the creative and innovative methods to gleaning valuable knowledge from an overwhelming flood of biological data. A significant investment in infrastructure and tool development, along with more and better-trained data scientists, may facilitate methods for assimilation of data and machine learning, to overcome obstacles such as data security, data cleaning, and data integration. PMID:27442200

  10. Evaluating the Spectrum of Unlocked Injection Frequency Dividers in Pulling Mode

    Directory of Open Access Journals (Sweden)

    Alessandro Lo Schiavo

    2013-09-01

    Full Text Available We study the phenomenon of periodic pulling which occurs in certain integrated microcircuits of relevant interest in applications, namely the injection-locked frequency dividers (ILFDs. They are modelled as second-order driven oscillators working in the subharmonic (secondary resonance regime, i.e., when the self-oscillating frequency is close (resonant to an integer submultiple n of the driving frequency. Under the assumption of weak injection, we find the spectrum of the system’s oscillatory response in the unlocked mode through closed-form expressions, showing that such spectrum is double-sided and asymmetric, unlike the single-sided spectrum of systems with primary resonance (n=1. An analytical expression for the amplitude modulation of the oscillatory response is also presented. Numerical results are presented to support theoretical relations derived.

  11. The role of dose rate in radiation cancer risk: evaluating the effect of dose rate at the molecular, cellular and tissue levels using key events in critical pathways following exposure to low LET radiation.

    Science.gov (United States)

    Brooks, Antone L; Hoel, David G; Preston, R Julian

    2016-08-01

    This review evaluates the role of dose rate on cell and molecular responses. It focuses on the influence of dose rate on key events in critical pathways in the development of cancer. This approach is similar to that used by the U.S. EPA and others to evaluate risk from chemicals. It provides a mechanistic method to account for the influence of the dose rate from low-LET radiation, especially in the low-dose region on cancer risk assessment. Molecular, cellular, and tissues changes are observed in many key events and change as a function of dose rate. The magnitude and direction of change can be used to help establish an appropriate dose rate effectiveness factor (DREF). Extensive data on key events suggest that exposure to low dose-rates are less effective in producing changes than high dose rates. Most of these data at the molecular and cellular level support a large (2-30) DREF. In addition, some evidence suggests that doses delivered at a low dose rate decrease damage to levels below that observed in the controls. However, there are some data human and mechanistic data that support a dose-rate effectiveness factor of 1. In summary, a review of the available molecular, cellular and tissue data indicates that not only is dose rate an important variable in understanding radiation risk but it also supports the selection of a DREF greater than one as currently recommended by ICRP ( 2007 ) and BEIR VII (NRC/NAS 2006 ).

  12. Hysteresis in the tearing mode locking/unlocking due to resonant magnetic perturbations in EXTRAP T2R

    Science.gov (United States)

    Fridström, R.; Frassinetti, L.; Brunsell, P. R.

    2015-10-01

    The physical mechanisms behind the hysteresis in the tearing mode locking and unlocking to a resonant magnetic perturbation (RMP) are experimentally studied in EXTRAP T2R reversed-field pinch. The experiments show that the electromagnetic and the viscous torque increase with increasing perturbation amplitude until the mode locks to the wall. At the wall-locking, the plasma velocity reduction profile is peaked at the radius where the RMP is resonant. Thereafter, the viscous torque drops due to the relaxation of the velocity in the central plasma. This is the main reason for the hysteresis in the RMP locking and unlocking amplitude. The increased amplitude of the locked tearing mode produces further deepening of the hysteresis. Both experimental results are in qualitative agreement with the model in Fitzpatrick et al (2001 Phys. Plasmas 8 4489)

  13. IDENTIFICATION OF KEY MOLECULAR COMPONENTS OF THE RESISTANCE OF CHERRY TOMATO AGAINSTPhytophthora infestans Identificación de los principales componentes moleculares de la resistencia de tomate cherry contra Phytophthora infestans

    Directory of Open Access Journals (Sweden)

    LILIANA LÓPEZ KLEINE

    2012-12-01

    Full Text Available Cherry tomato Solanum lycopersicum var cerasiforme cv Matt's wild cherry is a very resistant cultivar to most Phytophthora infestans isolates. Two isolates were identified, US940480 and US970001 that cause an incompatible and a compatible interaction respectively. US970001 is one of the few isolates producing a compatible interaction with this cultivar. To identify genes with a differential gene expression between compatible and incompatible interactions, gene expression patterns were analyzed with tomato cDNA microarrays including 12,899 independent tomato cDNA clones at different time points after inoculation. A diverse set of statistical tools were used to identify key components of the plant response to the pathogen. Forty-three genes were up-regulated during the incompatible reaction at time point 36 hours, 15 globally at all time points and twelve were found both in globally and at 36 hours. Northern blots analysis was performed to confirm differential expression showed by microarray analysis and to study the differential expression of more plant resistance genes (PR genes between compatible and incompatible interactions for this interaction.El tomate cherry Solanum lycopersicum var cerasiforme cv Matt's es bastante resistente a la gran parte de aislamientos de Phytophthora infestans. Se han identificado dos aislamientos, US940480 y US970001 que causan interacción incompatible y compatible respectivamente. US970001 es uno de los pocos aislamientos causantes de interacción compatible con este cultivo. Con el fin de identificar genes con expresión diferencial en interacciones compatible e incompatible, analizamos DNA copia de 12899 clones independientes en tres tiempos posteriores a la inoculación del patógeno. Se aplicaron diversas herramientas estadísticas para identificar componentes moleculares claves de la respuesta de la planta al patógeno. Cuarenta y tres genes fueron detectados como activados durante la interacci

  14. Unlocking the full potential of Earth observation during the 2015 Texas flood disaster

    Science.gov (United States)

    Schumann, G. J.-P.; Frye, S.; Wells, G.; Adler, R.; Brakenridge, R.; Bolten, J.; Murray, J.; Slayback, D.; Policelli, F.; Kirschbaum, D.; Wu, H.; Cappelaere, P.; Howard, T.; Flamig, Z.; Clark, R.; Stough, T.; Chini, M.; Matgen, P.; Green, D.; Jones, B.

    2016-05-01

    Intense rainfall during late April and early May 2015 in Texas and Oklahoma led to widespread and sustained flooding in several river basins. Texas state agencies relevant to emergency response were activated when severe weather then ensued for 6 weeks from 8 May until 19 June following Tropical Storm Bill. An international team of scientists and flood response experts assembled and collaborated with decision-making authorities for user-driven high-resolution satellite acquisitions over the most critical areas; while experimental automated flood mapping techniques provided daily ongoing monitoring. This allowed mapping of flood inundation from an unprecedented number of spaceborne and airborne images. In fact, a total of 27,174 images have been ingested to the USGS Hazards Data Distribution System (HDDS) Explorer, except for the SAR images used. Based on the Texas flood use case, we describe the success of this effort as well as the limitations in fulfilling the needs of the decision-makers, and reflect upon these. In order to unlock the full potential for Earth observation data in flood disaster response, we suggest in a call for action (i) stronger collaboration from the onset between agencies, product developers, and decision-makers; (ii) quantification of uncertainties when combining data from different sources in order to augment information content; (iii) include a default role for the end-user in satellite acquisition planning; and (iv) proactive assimilation of methodologies and tools into the mandated agencies.

  15. Challenges facing procurement professionals in developing economies: Unlocking value through professional international purchasing

    Directory of Open Access Journals (Sweden)

    Marian Tukuta

    2015-02-01

    Full Text Available Background: Until recently, procurement was seen as a necessity only. In fact, in many developing economies the profession is still being treated as a ‘back-office’ function. However, not much has been done to explore and address challenges facing procurement professionals in developing economies.Objectives: The purpose of this article was to examine the critical role played by the procurement function in business and to reveal the challenges faced by procurement professionals in developing economies as well as to suggest solutions to these challenges.Method: A sequential literary analysis was used, complemented by cross-country qualitative data gathered from one hundred diverse procurement practitioners from Botswana, Namibia and Zimbabwe. These were primarily participants in a series of procurement workshops run by the researchers from January to June 2014.Results: Findings suggested that limited recognition, increasing unethical behaviour, poor supplier service delivery, poor regulatory environment, varying supplier standards and poor corporate governance are the main challenges faced by the procurement profession in these countries.Conclusion: The study’s findings imply that there is limited understanding regarding the role procurement plays in both government and non-government institutions in developing economies. The article suggests solutions which procurement professionals and organisations can implement in order to unlock the potential value in the procurement function.

  16. Molecular mechanism of extrinsic factors affecting antiagingof stem cells

    Institute of Scientific and Technical Information of China (English)

    Tzyy Yue Wong; Mairim Alexandra Solis; Ying-Hui Chen; Lynn Ling-Huei Huang

    2015-01-01

    Scientific evidence suggests that stem cells possessthe anti-aging ability to self-renew and maintaindifferentiation potentials, and quiescent state. Theobjective of this review is to discuss the microenvironmentwhere stem cells reside in vivo , thesecreted factors to which stem cells are exposed, thehypoxic environment, and intracellular factors includinggenome stability, mitochondria integrity, epigeneticregulators, calorie restrictions, nutrients, and vitaminD. Secreted tumor growth factor-β and fibroblastgrowth factor-2 are reported to play a role in stem cellquiescence. Extracellular matrices may interact withcaveolin-1, the lipid raft on cell membrane to regulatequiescence. N-cadherin, the adhesive protein on nichecells provides support for stem cells. The hypoxicmicro-environment turns on hypoxia-inducible factor-1to prevent mesenchymal stem cells aging throughp16 and p21 down-regulation. Mitochondria expressglucosephosphate isomerase to undergo glycolysisand prevent cellular aging. Epigenetic regulators suchas p300, protein inhibitors of activated Stats and H19help maintain stem cell quiescence. In addition, calorierestriction may lead to secretion of paracrines cyclicADP-ribose by intestinal niche cells, which help maintainintestinal stem cells. In conclusion, it is crucial tounderstand the anti-aging phenomena of stem cells atthe molecular level so that the key to solving the agingmystery may be unlocked.

  17. Topological sub-structural molecular design (TOPS-MODE): a useful tool to explore key fragments of human A3 adenosine receptor ligands.

    Science.gov (United States)

    Saíz-Urra, Liane; Teijeira, Marta; Rivero-Buceta, Virginia; Helguera, Aliuska Morales; Celeiro, Maria; Terán, Ma Carmen; Besada, Pedro; Borges, Fernanda

    2016-02-01

    Adenosine regulates tissue function by activating four G-protein-coupled adenosine receptors (ARs). Selective agonists and antagonists for A3 ARs have been investigated for the treatment of a variety of immune disorders, cancer, brain, and heart ischemic conditions. We herein present a QSAR study based on a Topological sub-structural molecular design (TOPS-MODE) approach, intended to predict the A3 ARs of a diverse dataset of 124 (94 training set/ 30 prediction set) adenosine derivatives. The final model showed good fit and predictive capability, displaying 85.1 % of the experimental variance. The TOPS-MODE approach afforded a better understanding and interpretation of the developed model based on the useful information extracted from the analysis of the contribution of different molecular fragments to the affinity.

  18. Depth keying

    Science.gov (United States)

    Gvili, Ronen; Kaplan, Amir; Ofek, Eyal; Yahav, Giora

    2003-05-01

    We present a new solution to the known problem of video keying in a natural environment. We segment foreground objects from background objects using their relative distance from the camera, which makes it possible to do away with the use of color for keying. To do so, we developed and built a novel depth video camera, capable of producing RGB and D signals, where D stands for the distance to each pixel. The new RGBD camera enables the creation of a whole new gallery of effects and applications such as multi-layer background substitutions. This new modality makes the production of real time mixed reality video possible, as well as post-production manipulation of recorded video. We address the problem of color spill -- in which the color of the foreground object is mixed, along its boundary, with the background color. This problem prevents an accurate separation of the foreground object from its background, and it is most visible when compositing the foreground objects to a new background. Most existing techniques are limited to the use of a constant background color. We offer a novel general approach to the problem with enabling the use of the natural background, based upon the D channel generated by the camera.

  19. The molecular chaperone HSPA2 plays a key role in regulating the expression of sperm surface receptors that mediate sperm-egg recognition.

    Science.gov (United States)

    Redgrove, Kate A; Nixon, Brett; Baker, Mark A; Hetherington, Louise; Baker, Gordon; Liu, De-Yi; Aitken, R John

    2012-01-01

    A common defect encountered in the spermatozoa of male infertility patients is an idiopathic failure of sperm-egg recognition. In order to resolve the molecular basis of this condition we have compared the proteomic profiles of spermatozoa exhibiting an impaired capacity for sperm-egg recognition with normal cells using label free mass spectrometry (MS)-based quantification. This analysis indicated that impaired sperm-zona binding was associated with reduced expression of the molecular chaperone, heat shock 70 kDa protein 2 (HSPA2), from the sperm proteome. Western blot analysis confirmed this observation in independent patients and demonstrated that the defect did not extend to other members of the HSP70 family. HSPA2 was present in the acrosomal domain of human spermatozoa as a major component of 5 large molecular mass complexes, the most dominant of which was found to contain HSPA2 in close association with just two other proteins, sperm adhesion molecule 1 (SPAM1) and arylsulfatase A (ARSA), both of which that have previously been implicated in sperm-egg interaction. The interaction between SPAM1, ARSA and HSPA2 in a multimeric complex mediating sperm-egg interaction, coupled with the complete failure of this process when HSPA2 is depleted in infertile patients, provides new insights into the mechanisms by which sperm function is impaired in cases of male infertility.

  20. Molecular Insight into Substrate Recognition and Catalysis of Baeyer-Villiger Monooxygenase MtmOIV, the Key Frame-Modifying Enzyme in the Biosynthesis of Anticancer Agent Mithramycin

    Energy Technology Data Exchange (ETDEWEB)

    Bosserman, Mary A.; Downey, Theresa; Noinaj, Nicholas; Buchanan, Susan K.; Rohr, Jürgen [NIH; (Kentucky)

    2014-02-14

    Baeyer–Villiger monooxygenases (BVMOs) have been shown to play key roles for the biosynthesis of important natural products. MtmOIV, a homodimeric FAD- and NADPH-dependent BVMO, catalyzes the key frame-modifying steps of the mithramycin biosynthetic pathway, including an oxidative C–C bond cleavage, by converting its natural substrate premithramycin B into mithramycin DK, the immediate precursor of mithramycin. The drastically improved protein structure of MtmOIV along with the high-resolution structure of MtmOIV in complex with its natural substrate premithramycin B are reported here, revealing previously undetected key residues that are important for substrate recognition and catalysis. Kinetic analyses of selected mutants allowed us to probe the substrate binding pocket of MtmOIV and also to discover the putative NADPH binding site. This is the first substrate-bound structure of MtmOIV providing new insights into substrate recognition and catalysis, which paves the way for the future design of a tailored enzyme for the chemo-enzymatic preparation of novel mithramycin analogues.

  1. The transcriptome of Trichuris suis--first molecular insights into a parasite with curative properties for key immune diseases of humans.

    Directory of Open Access Journals (Sweden)

    Cinzia Cantacessi

    Full Text Available BACKGROUND: Iatrogenic infection of humans with Trichuris suis (a parasitic nematode of swine is being evaluated or promoted as a biological, curative treatment of immune diseases, such as inflammatory bowel disease (IBD and ulcerative colitis, in humans. Although it is understood that short-term T. suis infection in people with such diseases usually induces a modified Th2-immune response, nothing is known about the molecules in the parasite that induce this response. METHODOLOGY/PRINCIPAL FINDINGS: As a first step toward filling the gaps in our knowledge of the molecular biology of T. suis, we characterised the transcriptome of the adult stage of this nematode employing next-generation sequencing and bioinformatic techniques. A total of ∼65,000,000 reads were generated and assembled into ∼20,000 contiguous sequences ( = contigs; ∼17,000 peptides were predicted and classified based on homology searches, protein motifs and gene ontology and biological pathway mapping. CONCLUSIONS: These analyses provided interesting insights into a number of molecular groups, particularly predicted excreted/secreted molecules (n = 1,288, likely to be involved in the parasite-host interactions, and also various molecules (n = 120 linked to chemokine, T-cell receptor and TGF-β signalling as well as leukocyte transendothelial migration and natural killer cell-mediated cytotoxicity, which are likely to be immuno-regulatory or -modulatory in the infected host. This information provides a conceptual framework within which to test the immunobiological basis for the curative effect of T. suis infection in humans against some immune diseases. Importantly, the T. suis transcriptome characterised herein provides a curated resource for detailed studies of the immuno-molecular biology of this parasite, and will underpin future genomic and proteomic explorations.

  2. Combined analysis of mRNA and miRNA identifies dehydration and salinity responsive key molecular players in citrus roots

    Science.gov (United States)

    Xie, Rangjin; Zhang, Jin; Ma, Yanyan; Pan, Xiaoting; Dong, Cuicui; Pang, Shaoping; He, Shaolan; Deng, Lie; Yi, Shilai; Zheng, Yongqiang; Lv, Qiang

    2017-01-01

    Citrus is one of the most economically important fruit crops around world. Drought and salinity stresses adversely affected its productivity and fruit quality. However, the genetic regulatory networks and signaling pathways involved in drought and salinity remain to be elucidated. With RNA-seq and sRNA-seq, an integrative analysis of miRNA and mRNA expression profiling and their regulatory networks were conducted using citrus roots subjected to dehydration and salt treatment. Differentially expressed (DE) mRNA and miRNA profiles were obtained according to fold change analysis and the relationships between miRNAs and target mRNAs were found to be coherent and incoherent in the regulatory networks. GO enrichment analysis revealed that some crucial biological processes related to signal transduction (e.g. ‘MAPK cascade’), hormone-mediated signaling pathways (e.g. abscisic acid- activated signaling pathway’), reactive oxygen species (ROS) metabolic process (e.g. ‘hydrogen peroxide catabolic process’) and transcription factors (e.g., ‘MYB, ZFP and bZIP’) were involved in dehydration and/or salt treatment. The molecular players in response to dehydration and salt treatment were partially overlapping. Quantitative reverse transcriptase-polymerase chain reaction (qRT-PCR) analysis further confirmed the results from RNA-seq and sRNA-seq analysis. This study provides new insights into the molecular mechanisms how citrus roots respond to dehydration and salt treatment. PMID:28165059

  3. Unlocking patients with mental disorders who were in restraints at home: a national follow-up study of China's new public mental health initiatives.

    Directory of Open Access Journals (Sweden)

    Lili Guan

    Full Text Available In 2005, China implemented a demonstration program known as "686" to scale-up nation-wide basic mental health services designed to improve access to evidence-based care and to promote human rights for people with severe mental disorders. As part of the 686 Program, teams "unlocked" and provided continuous mental health care to people with severe mental disorders who were found in restraints and largely untreated in their family homes. We implemented a nation-wide two-stage follow-up study to measure the effectiveness and sustainability of the "unlocking and treatment" intervention and its impact on the well-being of patients' families.266 patients unlocked from 2005 in "686" demonstration sites across China were recruited in Stage One of the study in 2009. In 2012, 230 of the 266 cases were re-interviewed (the Stage Two study. Outcome measures included the patient medication adherence and social functioning, family burden ratings, and relocking rate. We utilized pre-post tests to analyze the changes over time following the unlocking efforts.96% of patients were diagnosed with schizophrenia. Prior to unlocking, their total time locked ranged from two weeks to 28 years, with 32% having been locked multiple times. The number of persons regularly taking medicines increased from one person at the time of unlocking to 74% in 2009 and 76% in 2012. Pre-post tests showed sustained improvement in patient social functioning and significant reductions in family burden. Over 92% of patients remained free of restraints in 2012.Practice-based evidence from our study suggests an important model for protecting the human rights of people with mental disorders and keeping them free of restraints can be achieved by providing accessible, community based mental health services with continuity of care. China's "686" Program can inform similar efforts in low-resource settings where community locking of patients is practiced.

  4. Comparative analysis of detection limits and specificity of molecular diagnostic markers for three pathogens (Microsporidia, Nosema spp.) in the key pollinators Apis mellifera and Bombus terrestris.

    Science.gov (United States)

    Erler, Silvio; Lommatzsch, Stefanie; Lattorff, H Michael G

    2012-04-01

    Global pollinator decline has recently been discussed in the context of honey and bumble bee infections from various pathogens including viruses, bacteria, microsporidia and mites. The microsporidian pathogens Nosema apis, Nosema ceranae and Nosema bombi may in fact be major candidates contributing to this decline. Different molecular and non-molecular detection methods have been developed; however, a comparison, especially of the highly sensitive PCR based methods, is currently lacking. Here, we present the first comparative quantitative real-time PCR study of nine Nosema spp. primers within the framework of primer specificity and sensitivity. With the help of dilution series of defined numbers of spores, we reveal six primer pairs amplifying N. apis, six for N. bombi and four for N. ceranae. All appropriate primer pairs detected an amount of at least 10(4) spores, the majority of which were even as sensitive to detect such low amounts as 10(3) to ten spores. Species specificity of primers was observed for N. apis and N. bombi, but not for N. ceranae. Additionally, we did not find any significant correlation for the amplified fragments with PCR efficiency or the limit of detection. We discuss our findings on the background of false positive and negative results using quantitative real-time PCR. On the basis of these results, future research might be based on appropriate primer selection depending on the experimental needs. Primers may be selected on the basis of specificity or sensitivity. Pathogen species and load may be determined with higher precision enhancing all kinds of diagnostic studies.

  5. Myeloid cell leukemia-1 is a key molecular target for mithramycin A-induced apoptosis in androgen-independent prostate cancer cells and a tumor xenograft animal model.

    Science.gov (United States)

    Choi, Eun-Sun; Jung, Ji-Youn; Lee, Jin-Seok; Park, Jong-Hwan; Cho, Nam-Pyo; Cho, Sung-Dae

    2013-01-01

    Mithramycin A (Mith) is a natural polyketide that has been used in multiple areas of research including apoptosis of various cancer cells. Here, we examined the critical role of Mith in apoptosis and its molecular mechanism in DU145 and PC3 prostate cancer cells and tumor xenografts. Mith decreased cell growth and induced apoptosis in DU145 and PC-3 cells. Myeloid cell leukemia-1 (Mcl-1) was over-expressed in both cell lines compared to RWPE1 cells. Mith inhibited Mcl-1 protein expression in both cells, but only altered Mcl-1 mRNA levels in PC-3 cells. We also found that Mith reduced Mcl-1 protein levels through both proteasome-dependent protein degradation and the inhibition of protein synthesis in DU145 cells. Studies using siRNA confirmed that the knockdown of Mcl-1 induced apoptosis. Mith significantly suppressed TPA-induced neoplastic cell transformation through the down-regulation of the Mcl-1 protein in JB6 cells, and suppressed the transforming activity of both cell types. Mith also inhibited tumor growth and Mcl-1 levels, in addition to inducing apoptosis, in athymic nude mice bearing DU145 cell xenografts without affecting five normal organs. Therefore, Mith inhibits cell growth and induces apoptosis by suppressing Mcl-1 in both prostate cancer cells and xenograft tumors, and thus is a potent anticancer drug candidate for prostate cancer. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  6. Morphological and molecular differentiation of two new species of Pseudoacanthocephalus Petrochenko, 1958 (Acanthocephala: Echinorhynchidae) from amphibians and reptiles in the Philippines, with identification key for the genus.

    Science.gov (United States)

    Tkach, Vasyl V; Lisitsyna, Olga I; Crossley, Janna L; Binh, Tran Thi; Bush, Sarah E

    2013-05-01

    The genus Pseudoacanthocephalus Petrochenko, 1958 currently includes 14 species of acanthocephalans parasitic in amphibians and reptiles worldwide. This work describes two new species of Pseudoacanthocephalus from amphibians and reptiles collected in several localities on Luzon Island, Philippines. Pseudoacanthocephalus nickoli n. sp. was found in two species of frogs, Rana luzonensis Boulenger and Rana similis (Günther), and Pseudoacanthocephalus smalesi n. sp. was found in a scincid lizard, Sphenomorphus abdictus Brown & Alcala. Differential diagnoses of the two new species of Pseudoacanthocephalus from their congeners are provided. Comparative analysis of nuclear ribosomal rRNA sequences encompassing the 3' end of 18S nuclear rDNA gene, internal transcribed spacer region (ITS1+5.8S+ITS2), and 5' end of the 28S gene strongly corroborated the morphological evidence and demonstrated significant differences between the two new species as well as between these species and closely related species from continental China and Vietnam. No intraspecific sequence variability was detected among different individuals representing each of the examined species. This is the first report of Pseudoacanthocephalus in the Philippines. A key to known species of Pseudoacanthocephalus is provided.

  7. Impact of adding a second-layer to a single unlocked closure of Cesarean uterine incision: a randomized controlled trial

    DEFF Research Database (Denmark)

    Rudnicki, Martin; Bennich, G; Wilken-Jensen, C;

    2016-01-01

    The purpose of the present study was to investigate short- and long term effects on residual myometrial thickness (RMT) by adding a second-layer to a single unlocked closure of caesarean uterine incision. METHOD: he study was a randomized double-blind controlled trial. Healthy nulliparous scheduled...... the criteria and accepted participation. Thirty-eight women were assigned to single-layer and 38 to double-layer unlocked closure technique. Groups were comparable regarding gestational age at delivery, duration of surgery and peroperative blood loss. RMT was without difference between the two groups, both...... at discharge (20.2±8.0 mm vs. 21.0±9.7 mm (mean±sd)) and five months postpartum (5.7±2.9 mm vs. 5.7±2.2 mm (mean±sd)). RMT was about half that of the normal myometrium at both examinations. CONCLUSION: The present results suggest that double-layer closure of the caesarean uterine incision does not increase RMT...

  8. BIM-23A760 influences key functional endpoints in pituitary adenomas and normal pituitaries: molecular mechanisms underlying the differential response in adenomas.

    Science.gov (United States)

    Ibáñez-Costa, Alejandro; López-Sánchez, Laura M; Gahete, Manuel D; Rivero-Cortés, Esther; Vázquez-Borrego, Mari C; Gálvez, María A; de la Riva, Andrés; Venegas-Moreno, Eva; Jiménez-Reina, Luis; Moreno-Carazo, Alberto; Tinahones, Francisco J; Maraver-Selfa, Silvia; Japón, Miguel A; García-Arnés, Juan A; Soto-Moreno, Alfonso; Webb, Susan M; Kineman, Rhonda D; Culler, Michael D; Castaño, Justo P; Luque, Raúl M

    2017-02-09

    Chimeric somatostatin/dopamine compounds such as BIM-23A760, an sst2/sst5/D2 receptors-agonist, have emerged as promising new approaches to treat pituitary adenomas. However, information on direct in vitro effects of BIM-23A760 in normal and tumoral pituitaries remains incomplete. The objective of this study was to analyze BIM-23A760 effects on functional parameters (Ca(2+) signaling, hormone expression/secretion, cell viability and apoptosis) in pituitary adenomas (n = 74), and to compare with the responses of normal primate and human pituitaries (n = 3-5). Primate and human normal pituitaries exhibited similar sst2/sst5/D2 expression patterns, wherein BIM-23A760 inhibited the expression/secretion of several pituitary hormones (specially GH/PRL), which was accompanied by increased sst2/sst5/D2 expression in primates and decreased Ca(2+) concentration in human cells. In tumoral pituitaries, BIM-23A760 also inhibited Ca(2+) concentration, hormone secretion/expression and proliferation. However, BIM-23A760 elicited stimulatory effects in a subset of GHomas, ACTHomas and NFPAs in terms of Ca(2+) signaling and/or hormone secretion, which was associated with the relative somatostatin/dopamine-receptors levels, especially sst5 and sst5TMD4. The chimeric sst2/sst5/D2 compound BIM-23A760 affects multiple, clinically relevant parameters on pituitary adenomas and may represent a valuable therapeutic tool. The relative ssts/D2 expression profile, particularly sst5 and/or sst5TMD4 levels, might represent useful molecular markers to predict the ultimate response of pituitary adenomas to BIM-23A760.

  9. BIM-23A760 influences key functional endpoints in pituitary adenomas and normal pituitaries: molecular mechanisms underlying the differential response in adenomas

    Science.gov (United States)

    Ibáñez-Costa, Alejandro; López-Sánchez, Laura M.; Gahete, Manuel D.; Rivero-Cortés, Esther; Vázquez-Borrego, Mari C.; Gálvez, María A.; de la Riva, Andrés; Venegas-Moreno, Eva; Jiménez-Reina, Luis; Moreno-Carazo, Alberto; Tinahones, Francisco J.; Maraver-Selfa, Silvia; Japón, Miguel A.; García-Arnés, Juan A.; Soto-Moreno, Alfonso; Webb, Susan M.; Kineman, Rhonda D.; Culler, Michael D.; Castaño, Justo P.; Luque, Raúl M.

    2017-01-01

    Chimeric somatostatin/dopamine compounds such as BIM-23A760, an sst2/sst5/D2 receptors-agonist, have emerged as promising new approaches to treat pituitary adenomas. However, information on direct in vitro effects of BIM-23A760 in normal and tumoral pituitaries remains incomplete. The objective of this study was to analyze BIM-23A760 effects on functional parameters (Ca2+ signaling, hormone expression/secretion, cell viability and apoptosis) in pituitary adenomas (n = 74), and to compare with the responses of normal primate and human pituitaries (n = 3–5). Primate and human normal pituitaries exhibited similar sst2/sst5/D2 expression patterns, wherein BIM-23A760 inhibited the expression/secretion of several pituitary hormones (specially GH/PRL), which was accompanied by increased sst2/sst5/D2 expression in primates and decreased Ca2+ concentration in human cells. In tumoral pituitaries, BIM-23A760 also inhibited Ca2+ concentration, hormone secretion/expression and proliferation. However, BIM-23A760 elicited stimulatory effects in a subset of GHomas, ACTHomas and NFPAs in terms of Ca2+ signaling and/or hormone secretion, which was associated with the relative somatostatin/dopamine-receptors levels, especially sst5 and sst5TMD4. The chimeric sst2/sst5/D2 compound BIM-23A760 affects multiple, clinically relevant parameters on pituitary adenomas and may represent a valuable therapeutic tool. The relative ssts/D2 expression profile, particularly sst5 and/or sst5TMD4 levels, might represent useful molecular markers to predict the ultimate response of pituitary adenomas to BIM-23A760. PMID:28181484

  10. Revision of torrent mites (Parasitengona, Torrenticolidae, Torrenticola of the United States and Canada: 90 descriptions, molecular phylogenetics, and a key to species

    Directory of Open Access Journals (Sweden)

    J. Ray Fisher

    2017-09-01

    Full Text Available The descriptive biology of torrent mites (Parasitengona: Torrenticolidae: Torrenticola of North America (north of Mexico is investigated using integrative methods. Material examined includes approximately 2,300 specimens from nearly 500 localities across the United States and Canada, and a few collections in Mexico and Central America. Species hypotheses are derived from a phylogenetic analysis of the barcoding region of cytochrome c oxidase subunit 1 (COI for 476 specimens and supported with morphology and biogeography. Relationships between species are examined with a combined analysis of COI and two expansion regions (D2–3 of the large ribosomal subunit (28S rDNA for 57 specimens. All previously described species from the US and Canada are examined. Our results indicate the need to synonymize four species: T. mercedensis (Marshall, 1943 is a junior synonym of T. sierrensis (Marshall, 1943; T. rectiforma Habeeb, 1974 is a junior synonym of T. ellipsoidalis (Marshall, 1943; T. neoconnexa Habeeb, 1957 is a junior synonym of T. magnexa Habeeb, 1955; and T. esbelta Cramer, 1992 is a junior synonym of T. boettgeri KO Viets, 1977. We describe 66 new species and re-describe all previously described regional species. Our findings indicate that total diversity of Torrenticola in the United States and Canada comprises 90 species, 57 known from the east and 33 from the west. We organize these species into four species complexes that include 13 identification groups. An additional 13 species do not fit within an identification group. The southern Appalachians are suspected to contain the highest concentration of remaining undescribed diversity. A key is provided to all known species in the US and Canada.

  11. Characterization of Behavioral, Neuropathological, Brain Metabolic and Key Molecular Changes in zQ175 Knock-In Mouse Model of Huntington's Disease.

    Directory of Open Access Journals (Sweden)

    Qi Peng

    Full Text Available Huntington's disease (HD is caused by an expansion of the trinucleotide poly (CAG tract located in exon 1 of the huntingtin (Htt gene leading to progressive neurodegeneration in selected brain regions, and associated functional impairments in motor, cognitive, and psychiatric domains. Since the discovery of the gene mutation that causes the disease, mouse models have been developed by different strategies. Recently, a new model, the zQ175 knock-in (KI line, was developed in an attempt to have the Htt gene in a context and causing a phenotype that more closely mimics HD in humans. The behavioral phenotype was characterized across the independent laboratories and important features reminiscent of human HD are observed in zQ175 mice. In the current study, we characterized the zQ175 model housed in an academic laboratory under reversed dark-light cycle, including motor function, in vivo longitudinal structural MRI imaging for brain volume, MRS for striatal metabolites, neuropathology, as well as a panel of key disease marker proteins in the striatum at different ages. Our results suggest that homozygous zQ175 mice exhibited significant brain atrophy before the motor deficits and brain metabolite changes. Altered striatal medium spiny neuronal marker, postsynaptic marker protein and complement component C1qC also characterized zQ175 mice. Our results confirmed that the zQ175 KI model is valuable in understanding of HD-like pathophysiology and evaluation of potential therapeutics. Our data also provide suggestions to select appropriate outcome measurements in preclinical studies using the zQ175 mice.

  12. Exploiting Data Intensive Applications on High Performance Computers to Unlock Australia's Landsat Archive

    Science.gov (United States)

    Purss, Matthew; Lewis, Adam; Edberg, Roger; Ip, Alex; Sixsmith, Joshua; Frankish, Glenn; Chan, Tai; Evans, Ben; Hurst, Lachlan

    2013-04-01

    Australia's Earth Observation Program has downlinked and archived satellite data acquired under the NASA Landsat mission for the Australian Government since the establishment of the Australian Landsat Station in 1979. Geoscience Australia maintains this archive and produces image products to aid the delivery of government policy objectives. Due to the labor intensive nature of processing of this data there have been few national-scale datasets created to date. To compile any Earth Observation product the historical approach has been to select the required subset of data and process "scene by scene" on an as-needed basis. As data volumes have increased over time, and the demand for the processed data has also grown, it has become increasingly difficult to rapidly produce these products and achieve satisfactory policy outcomes using these historic processing methods. The result is that we have been "drowning in a sea of uncalibrated data" and scientists, policy makers and the public have not been able to realize the full potential of the Australian Landsat Archive and its value is therefore significantly diminished. To overcome this critical issue, the Australian Space Research Program has funded the "Unlocking the Landsat Archive" (ULA) Project from April 2011 to June 2013 to improve the access and utilization of Australia's archive of Landsat data. The ULA Project is a public-private consortium led by Lockheed Martin Australia (LMA) and involving Geoscience Australia (GA), the Victorian Partnership for Advanced Computing (VPAC), the National Computational Infrastructure (NCI) at the Australian National University (ANU) and the Cooperative Research Centre for Spatial Information (CRC-SI). The outputs from the ULA project will become a fundamental component of Australia's eResearch infrastructure, with the Australian Landsat Archive hosted on the NCI and made openly available under a creative commons license. NCI provides access to researchers through significant HPC

  13. Unlock The Genıus Within:NEUROBIOLOGICAL TRAUMA, TEACHING, AND TRANSFORMATIVE LEARNING

    Directory of Open Access Journals (Sweden)

    Tojde

    2005-07-01

    Full Text Available Here, Daniel S. Janik, MD, PhD, argues replacing education and teaching with non-traumatic, curiosity-based, discovery-driven, and mentor-assisted transformational learning. Unlock the Genius Within is an easy read that explains-in conversational manner-the newest ideas on neurobiological and transformational learning beginning with what's wrong with education and ending with a call for reader participation in developing an applying neurobiological learning and transformational learning theory and methodology. Janik draws extensively from his own experiences first as a physician working with psychological recovery from trauma, and then as an educator and linguist in applying neurobiological-based transformational learning in clinics, classrooms, and tutoring. Features:· Descriptions of classical and contemporary research alongside allusions to popular movies and television programs· Suggested further readings· Neurobiological learning web resourcesThroughout this book, the author incorporates humor, wisdom, and anecdotes to draw readers into traditionally incomprehensible concepts and information that demonstrates transformational learning. It will be of interest to teachers (postsecondary, secondary, and ESL, administrators, counselors, parents, students, and medical researchers. http://www.rowmaneducation.com/ISBN/1578862914 Throughout this book, the author incorporates humor, wisdom, and anecdotes to draw readers into traditionally incomprehensible concepts and information that demonstrates transformational learning. It will be of interest to teachers (postsecondary, secondary, and ESL, administrators, counselors, parents, students, and medical researchers. About The Author Dr. Daniel S. Janik is a physician and University Studies Coordinator at Intercultural Communications College, a private English second language and college preparation school in Honolulu, Hawaii, USA. Reviews for Unlock the Genius Within: Neurobiological Trauma

  14. Unlocking the black box of feather louse diversity: A molecular phylogeny of the hyper-diverse genus Brueelia.

    Science.gov (United States)

    Bush, Sarah E; Weckstein, Jason D; Gustafsson, Daniel R; Allen, Julie; DiBlasi, Emily; Shreve, Scott M; Boldt, Rachel; Skeen, Heather R; Johnson, Kevin P

    2016-01-01

    Songbirds host one of the largest, and most poorly understood, groups of lice: the Brueelia-complex. The Brueelia-complex contains nearly one-tenth of all known louse species (Phthiraptera), and the genus Brueelia has over 300 species. To date, revisions have been confounded by extreme morphological variation, convergent evolution, and periodic movement of lice between unrelated hosts. Here we use Bayesian inference based on mitochondrial (COI) and nuclear (EF-1α) gene fragments to analyze the phylogenetic relationships among 333 individuals within the Brueelia-complex. We show that the genus Brueelia, as it is currently recognized, is paraphyletic. Many well-supported and morphologically unified clades within our phylogenetic reconstruction of Brueelia were previously described as genera. These genera should be recognized, and the erection of several new genera should be explored. We show that four distinct ecomorphs have evolved repeatedly within the Brueelia-complex, mirroring the evolutionary history of feather-lice across the entire order. We show that lice in the Brueelia-complex, with some notable exceptions, are extremely host specific and that the host family associations and geographic distributions of these lice are significantly correlated with our understanding of their phylogenetic history. Several ecological phenomena, including phoresis, may be responsible for the macroevolutionary patterns in this diverse group.

  15. Molecular mechanism of extrinsic factors affecting anti-aging of stem cells.

    Science.gov (United States)

    Wong, Tzyy Yue; Solis, Mairim Alexandra; Chen, Ying-Hui; Huang, Lynn Ling-Huei

    2015-03-26

    Scientific evidence suggests that stem cells possess the anti-aging ability to self-renew and maintain differentiation potentials, and quiescent state. The objective of this review is to discuss the micro-environment where stem cells reside in vivo, the secreted factors to which stem cells are exposed, the hypoxic environment, and intracellular factors including genome stability, mitochondria integrity, epigenetic regulators, calorie restrictions, nutrients, and vitamin D. Secreted tumor growth factor-β and fibroblast growth factor-2 are reported to play a role in stem cell quiescence. Extracellular matrices may interact with caveolin-1, the lipid raft on cell membrane to regulate quiescence. N-cadherin, the adhesive protein on niche cells provides support for stem cells. The hypoxic micro-environment turns on hypoxia-inducible factor-1 to prevent mesenchymal stem cells aging through p16 and p21 down-regulation. Mitochondria express glucosephosphate isomerase to undergo glycolysis and prevent cellular aging. Epigenetic regulators such as p300, protein inhibitors of activated Stats and H19 help maintain stem cell quiescence. In addition, calorie restriction may lead to secretion of paracrines cyclic ADP-ribose by intestinal niche cells, which help maintain intestinal stem cells. In conclusion, it is crucial to understand the anti-aging phenomena of stem cells at the molecular level so that the key to solving the aging mystery may be unlocked.

  16. The oryza map alignment project: the golden path to unlocking the genetic potential of wild rice species.

    Science.gov (United States)

    Wing, Rod A; Ammiraju, Jetty S S; Luo, Meizhong; Kim, Hyeran; Yu, Yeisoo; Kudrna, Dave; Goicoechea, Jose L; Wang, Wenming; Nelson, Will; Rao, Kiran; Brar, Darshan; Mackill, Dave J; Han, Bin; Soderlund, Cari; Stein, Lincoln; SanMiguel, Phillip; Jackson, Scott

    2005-09-01

    The wild species of the genus Oryza offer enormous potential to make a significant impact on agricultural productivity of the cultivated rice species Oryza sativa and Oryza glaberrima. To unlock the genetic potential of wild rice we have initiated a project entitled the 'Oryza Map Alignment Project' (OMAP) with the ultimate goal of constructing and aligning BAC/STC based physical maps of 11 wild and one cultivated rice species to the International Rice Genome Sequencing Project's finished reference genome--O. sativa ssp. japonica c. v. Nipponbare. The 11 wild rice species comprise nine different genome types and include six diploid genomes (AA, BB, CC, EE, FF and GG) and four tetrapliod genomes (BBCC, CCDD, HHKK and HHJJ) with broad geographical distribution and ecological adaptation. In this paper we describe our strategy to construct robust physical maps of all 12 rice species with an emphasis on the AA diploid O. nivara--thought to be the progenitor of modern cultivated rice.

  17. 木质素生物合成途径中关键酶基因的分子特征%Molecular Characterization of Key Enzyme Genes Related to the Pathway of Lignin Biosynthesis

    Institute of Scientific and Technical Information of China (English)

    石海燕; 张玉星

    2011-01-01

    主要对苯丙氨酸裂解酶(phcnylalanine ammonia-lyase,PAL)基因、4-香豆酸辅酶A连接酶(4-coumarate-CoA ligase,4CL)基因、肉桂醇脱氢酶(cinnamyl alcohol dehydrogenase,CAD)基因、过氧化物酶(peroxidase,POX)基因、漆酶(laccase,LAC)基因、dirigent(DIR)蛋白基因等木质素生物合成途径中关键酶基因的克隆、表达、调控等研究进展进行综述,旨在揭示上述木质素生物合成途径中关键酶基因的分子特征.为通过转基因技术来调控植物体中木质素的含量及其化学组成从而得到改良的新植物资源提供思路.%This review focused on the cloning, expression and regulation of key enzyme genes, such as phenylalanine ammonia-lysate genes (PALs), 4-coumarate-CoA ligase genes (4CLs), cinnamyl alcohol dehydrogenase genes (CADs), peroxidase genes (POXs), laccase genes (LACs), and dirigent genes (DIRs),which were related to the pathway of lignin biosynthesis.It would provide some ideas for regulating content and chemical composition of plant lignin and obtaining improved new plant resource by genetic manipulation at the key metabolic steps through disclosing the molecular characterization of the above key enzyme genes related to the pathway of lignin biosynthesis.

  18. 技术创新路径锁定与解锁%Lock-in and Unlocking of Technological Innovation Path

    Institute of Scientific and Technical Information of China (English)

    王子龙; 许箫迪

    2012-01-01

    技术创新路径锁定是一个历史依赖过程,路径锁定的根本原因在于各类技术之间存在巨大转移成本和潜在不同市场均衡。报酬递增效应、自增强机制以及群体博弈均会影响到市场对技术的选择,这种选择会使技术发展陷入固定轨道。研究了技术创新路径锁定机理、锁定效应以及解锁模式,从提高参与人认知能力、改善外部环境、实施利益诱导和外部冲击四个方面提出实现技术创新解锁的途径。%The path lock-in of technological innovation is a dependence process of the history.The fundamental reason of the path lock-in is that existing transfer costs and potential different market equilibrium in all types of technology.Increasing returns effect,self strengthening mechanism and group game will be affecting the market choice of technology.This choice will make the technology development in a fixed orbit.The path lock-in mechanism,lock-in effect and unlocking pattern of technological innovation is systematically researched in this paper.The way of technical innovation unlocking is put forward from promoting participants cognitive ability,improving external environment,implementing benefit induction and external shocks.

  19. Quantum-Locked Key Distribution at Nearly the Classical Capacity Rate

    Science.gov (United States)

    Lupo, Cosmo; Lloyd, Seth

    2014-10-01

    Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.

  20. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin;

    2016-01-01

    We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...

  1. Unlocking the milk protein gene loci during mammary gland development and differentiation; a role for chromatin

    Science.gov (United States)

    Mammary gland development and differentiation occur mostly postnatally. Chromatin organization plays a key role in transcriptional and epigenetic regulation during development and differentiation. Considerable knowledge of the systemic hormones and local growth factors important for development and ...

  2. Molecular basis of cannabinoid CB1 receptor coupling to the G protein heterotrimer Gαiβγ: identification of key CB1 contacts with the C-terminal helix α5 of Gαi.

    Science.gov (United States)

    Shim, Joong-Youn; Ahn, Kwang H; Kendall, Debra A

    2013-11-01

    The cannabinoid (CB1) receptor is a member of the rhodopsin-like G protein-coupled receptor superfamily. The human CB1 receptor, which is among the most expressed receptors in the brain, has been implicated in several disease states, including drug addiction, anxiety, depression, obesity, and chronic pain. Different classes of CB1 agonists evoke signaling pathways through the activation of specific subtypes of G proteins. The molecular basis of CB1 receptor coupling to its cognate G protein is unknown. As a first step toward understanding CB1 receptor-mediated G protein signaling, we have constructed a ternary complex structural model of the CB1 receptor and Gi heterotrimer (CB1-Gi), guided by the x-ray structure of β2-adrenergic receptor (β2AR) in complex with Gs (β2AR-Gs), through 824-ns duration molecular dynamics simulations in a fully hydrated 1-palmitoyl-2-oleoyl-sn-glycero-3-phosphocholine bilayer environment. We identified a group of residues at the juxtamembrane regions of the intracellular loops 2 and 3 (IC2 and IC3) of the CB1 receptor, including Ile-218(3.54), Tyr-224(IC2), Asp-338(6.30), Arg-340(6.32), Leu-341(6.33), and Thr-344(6.36), as potential key contacts with the extreme C-terminal helix α5 of Gαi. Ala mutations of these residues at the receptor-Gi interface resulted in little G protein coupling activity, consistent with the present model of the CB1-Gi complex, which suggests tight interactions between CB1 and the extreme C-terminal helix α5 of Gαi. The model also suggests that unique conformational changes in the extreme C-terminal helix α5 of Gα play a crucial role in the receptor-mediated G protein activation.

  3. Entropy-as-a-Service: Unlocking the Full Potential of Cryptography

    Science.gov (United States)

    Vassilev, Apostol; Staples, Robert

    2016-01-01

    Securing the Internet requires strong cryptography, which depends on the availability of good entropy for generating unpredictable keys and accurate clocks. Attacks abusing weak keys or old inputs portend challenges for the Internet. EaaS is a novel architecture providing entropy and timestamps from a decentralized root of trust, scaling gracefully across diverse geopolitical locales and remaining trustworthy unless much of the collective is compromised. PMID:28003687

  4. The molecular basis of color vision in colorful fish: Four Long Wave-Sensitive (LWS opsins in guppies (Poecilia reticulata are defined by amino acid substitutions at key functional sites

    Directory of Open Access Journals (Sweden)

    Ward Pam R

    2008-07-01

    Full Text Available Abstract Background Comparisons of functionally important changes at the molecular level in model systems have identified key adaptations driving isolation and speciation. In cichlids, for example, long wavelength-sensitive (LWS opsins appear to play a role in mate choice and male color variation within and among species. To test the hypothesis that the evolution of elaborate coloration in male guppies (Poecilia reticulata is also associated with opsin gene diversity, we sequenced long wavelength-sensitive (LWS opsin genes in six species of the family Poeciliidae. Results Sequences of four LWS opsin genes were amplified from the guppy genome and from mRNA isolated from adult guppy eyes. Variation in expression was quantified using qPCR. Three of the four genes encode opsins predicted to be most sensitive to different wavelengths of light because they vary at key amino acid positions. This family of LWS opsin genes was produced by a diversity of duplication events. One, an intronless gene, was produced prior to the divergence of families Fundulidae and Poeciliidae. Between-gene PCR and DNA sequencing show that two of the guppy LWS opsins are linked in an inverted orientation. This inverted tandem duplication event occurred near the base of the poeciliid tree in the common ancestor of Poecilia and Xiphophorus. The fourth sequence has been uncovered only in the genus Poecilia. In the guppies surveyed here, this sequence is a hybrid, with the 5' end most similar to one of the tandem duplicates and the 3' end identical to the other. Conclusion Enhanced wavelength discrimination, a possible consequence of opsin gene duplication and divergence, might have been an evolutionary prerequisite for color-based sexual selection and have led to the extraordinary coloration now observed in male guppies and in many other poeciliids.

  5. Locking-to-unlocking system is an efficient strategy to design DNA/silver nanoclusters (AgNCs) probe for human miRNAs

    DEFF Research Database (Denmark)

    Shah, Pratik; Choi, Suk Won; Kim, Ho-jin;

    2016-01-01

    to the great sequence diversity of miRNAs in humans and other organisms, a uniform strategy for miRNA detection is attractive. The concept presented is an oligonucleotide-based locking-to-unlocking system that can be endowed with miRNA complementarity while maintaining the same secondary structure. The locking...... detect a number of cancer related miRNAs in RNA extracts from human cancer cell lines....

  6. The second coming of Christ as the golden key to unlock the Book of Daniel: an analysis of a Pentecostal interpretation of the dream in Daniel 2

    Directory of Open Access Journals (Sweden)

    M. Nel

    2008-07-01

    Full Text Available Pentecostals regard the doctrine of the second coming of Christ as very important. All passages in the Bible deemed to be “prophetical” are interpreted in premillennialist terms. Bennie Kleynhans’ interpretation of the dream in Daniel 2 is used to demonstrate how an endeavour to find relevance through a contemporary interpretation of a Biblical passage, easily be- comes outdated. He was of the opinion that communism, the Council on Foreign Relations and the European Economic Community with its ten members would introduce the Antichrist as the leader of a one-world government, eventually leading to the second coming of Christ. Daniel 2 is read as “prophecy”, describing the global situation at the latter half of the twentieth century. This demonstrates that the differences in interpreting the dream in Daniel 2 reflect different ways of viewing and treating the Bible. A fundamentalist perspective sees the Bible as a blueprint of what God is going to do in future and how he is going to do this. The “future” – the “last days” just before the second coming of Christ – is inevitably linked to the present day.

  7. 'Unlocking the archive': Using photogrammetry of historic aerial photographs to extend the record of glacier change on the Antarctic Peninsula

    Science.gov (United States)

    Clarke, Lucy; Fox, Adrian

    2014-05-01

    Changes to glacier fronts and ice shelves and glacier acceleration are well documented, but there is almost no data on mass changes for the more than 400 glaciers on the Antarctic Peninsula. Current research demonstrates that the Antarctic Peninsula is contributing to sea-level change at a similar rate to that of other fast-changing near-polar or large mountain-glacier environments such as Iceland, Patagonia and Alaska (Hock, 2009). Forecasting the future impacts of the Antarctic Peninsula ice sheet on sea level will require a much improved understanding of 20th Century and contemporary glacier mass changes. Satellite data has been used to calculate these changes over the last three decades, but methods to quantify this over a longer time scale have eluded researchers. However, there is an archive of aerial photography of the Antarctic Peninsula dating back to the 1940s, this has been largely ignored due to the range of technical problems associated with deriving quantitative data from historic aerial photographs. This presentation demonstrates how advances in photogrammetric processing and capture of modern aerial photography have allowed this archive to be 'unlocked'. Accurate photogrammetric reconstruction from aerial photographs traditionally requires known ground control points acquired in the field; in remote and inaccessible areas, such as the Antarctic Peninsula, this is often impossible and so has restricted the use of photogrammetric analysis of the available aerial photography. A method for providing control for historic photos without fieldwork on the ground, by linking them to a newly acquired, highly accurate photogrammetric model adjusted through direct kinematic GPS positioning of the camera was developed by Fox and Cziferszky (2008), and this is now being applied to a number of glaciers across the Antarctic Peninsular using Intergraph Photogrammetry Suite (Erdas LPS 2013) software. This presentation will outline the photogrammetric workflow and

  8. Unlocking Human Dignity: A Plan to Transform the US Immigrant Detention System

    Directory of Open Access Journals (Sweden)

    Migration and Refugee Services/ United States Conference of Catholic Bishops

    2015-05-01

    Full Text Available Unlocking Human Dignity: A Plan to Transform the US Immigrant Detention System addresses one of the most troubled features of the US immigration system and highlights the need for fundamental changes to it. The report comes six years since the inception of the Obama administration’s detention reform initiative. In the interim, the number of immigrant detainees per year has risen to more than 400,000, the administration has opened immense new family detention centers, and the overwhelming majority of persons in the custody of the Department of Homeland Security (DHS have remained in prisons, jails and other secure facilities where they are subject to standards designed for criminal defendants and, in many ways, treated more harshly than criminals.The report’s overarching recommendation is that the US immigrant detention system be dismantled and replaced with a network of supervised release, case management, and community support programs, designed to ensure court appearances. It recognizes that detention may be necessary for short periods and in certain cases, but it rejects detention as a central immigrant “management” tool, and argues that detention should only be used as a last resort if less harmful strategies and programs—viewed on a continuum beginning with the least restrictive and moving to release programs with different levels of supervision, monitoring, and support—cannot reasonably ensure court appearances or (in rare cases protect the public. It opposes the detention of pregnant and nursing women, bona fide asylum seekers, the very ill, the disabled, the elderly, and other vulnerable persons. It calls for the substantial contraction of detention facilities and “bed space.”As the first step in this process, the report urges Congress to commission a comprehensive study on the benefits, challenges, cost, and time frame for creating a civil immigration detention system. It also proposes that the administration create a

  9. Bis-pyrene-modified unlocked nucleic acids: synthesis, hybridization studies, and fluorescent properties

    DEFF Research Database (Denmark)

    Perlíková, Pavla; Ejlersen, Maria; Langkjaer, Niels

    2014-01-01

    in DNA*/DNA duplexes. Nevertheless, the destabilization effect of bis-pyrene-modified UNA is weaker than that of unmodified UNA. Some oligonucleotides with bis-pyrene-modified UNA incorporations displayed superior mismatch discrimination capabilities. UV/Vis absorption and molecular modeling studies...

  10. Davanloo’s Intensive Short-Term Dynamic Psychotherapy in a tertiary psychotherapy service: overall effectiveness and association between unlocking the unconscious and outcome

    Directory of Open Access Journals (Sweden)

    Robert Johansson

    2014-08-01

    Full Text Available Background. Intensive Short-Term Dynamic Psychotherapy (ISTDP, as developed by Habib Davanloo, is an intensive emotion-focused psychodynamic therapy with an explicit focus on handling resistance in treatment. A core assumption in ISTDP is that psychotherapeutic effects are dependent on in-session emotional processing in the form of rise in complex transference feelings that occurs when treatment resistance is challenged. Recent research indicates that an unlocking of the unconscious, a powerful emotional breakthrough achieved at a high rise in complex transference feelings, can potentially enhance ISTDP’s effectiveness. While ISTDP has a growing evidence base, most of the research conducted has used small samples and has tested therapy delivered by expert therapists. The aims of this study were to evaluate the overall effectiveness of ISTDP when delivered in a tertiary psychotherapy service, and to investigate if having an unlocking of the unconscious during therapy predicted enhanced treatment effectiveness. Methods. A total of 412 patients were included in the analyses. The average length of treatment was 10.2 sessions (SD 13.3. Multilevel growth curve modeling was used to evaluate treatment effectiveness and the association between unlocking the unconscious and outcome. A number of control predictors including type of treatment resistance were selected and included in the analyses. Outcome measures were the Brief Symptom Inventory (BSI and the Inventory of Interpersonal Problems (IIP. About half of the patients in the study were treated by therapists in training and the other half by more experienced therapists. Results. Growth curve analyses using the full intention-to-treat sample revealed significant within-group effects of ISTDP on both the BSI and the IIP. Effect sizes were large (>0.80. Unlocking the unconscious during therapy was associated with significantly larger treatment outcome. The relationship was further moderated by type of

  11. Games-to-teach or games-to-learn unlocking the power of digital game-based learning through performance

    CERN Document Server

    Chee, Yam San

    2016-01-01

    The book presents a critical evaluation of current approaches related to the use of digital games in education. The author identifies two competing paradigms: that of games-to-teach and games-to-learn. Arguing in favor of the latter, the author advances the case for approaching game-based learning through the theoretical lens of performance, rooted in play and dialog, to unlock the power of digital games for 21st century learning. Drawing upon the author’s research, three concrete exemplars of game-based learning curricula are described and discussed. The challenge of advancing game-based learning in education is addressed in the context of school reform. Finally, future prospects of and educational opportunities for game-based learning are articulated. Readers of the book will find the explication of performance theory applied to game-based learning especially interesting. This work constitutes the author’s original theorization. Readers will derive four main benefits: (1) an explication of the differenc...

  12. Enforced neutrality and color-flavor unlocking in the three-flavor Polyakov-loop Nambu Jona-Lasinio model

    Science.gov (United States)

    Abuki, H.; Ciminale, M.; Gatto, R.; Nardulli, G.; Ruggieri, M.

    2008-04-01

    We study how the charge neutrality affects the phase structure of the three-flavor Polyakov-loop Nambu Jona-Lasinio (PNJL) model. We point out that, within the conventional PNJL model at finite density, the color neutrality is missing because the Wilson line serves as an external colored field coupled to dynamical quarks. In this paper we heuristically assume that the model may still be applicable. To get color neutrality, one has then to allow nonvanishing color chemical potentials. We study how the quark matter phase diagram in (T,ms2/μ)-plane is affected by imposing neutrality and by including the Polyakov-loop dynamics. Although these two effects are correlated in a nonlinear way, the impact of the Polyakov loop turns out to be significant in the T direction, while imposing neutrality brings a remarkable effect in the ms2/μ direction. In particular, we find a novel unlocking transition, when the temperature is increased, even in the chiral SU(3) limit. We clarify how and why this is possible once the dynamics of the colored Polyakov loop is taken into account. Also we succeed in giving an analytic expression for Tc for the transition from two-flavor pairing (2SC) to unpaired quark matter in the presence of the Polyakov loop.

  13. Enforced neutrality and color-flavor unlocking in the three-flavor Polyakov-loop NJL model

    CERN Document Server

    Abuki, H; Gatto, R; Nardulli, G; Ruggieri, M

    2008-01-01

    We study how the charge neutrality affects the phase structure of three-flavor PNJL model. We point out that, within the conventional PNJL model at finite density the color neutrality is missing because the Wilson line serves as an external ``colored'' field coupled to dynamical quarks. In this paper we heuristically assume that the model may still be applicable. To get color neutrality one has then to allow non vanishing color chemical potentials. We study how the quark matter phase diagram in $(T,m_s^2/\\mu)$-plane is affected by imposing neutrality and by including the Polyakov loop dynamics. Although these two effects are correlated in a nonlinear way, the impact of the Polyakov loop turns out to be significant in the $T$ direction, while imposing neutrality brings a remarkable effect in the $m_s^2/\\mu$ direction. In particular, we find a novel unlocking transition, when the temperature is increased, even in the chiral SU(3) limit. We clarify how and why this is possible once the dynamics of the colored Po...

  14. Photoacoustically Measured Speeds of Sound of Liquid HBO2: On Unlocking the Fuel Potential of Boron

    Energy Technology Data Exchange (ETDEWEB)

    Bastea, S; Crowhurst, J; Armstrong, M; ., N T

    2010-03-24

    Elucidation of geodynamic, geochemical, and shock induced processes is often limited by challenges to accurately determine molecular fluid equations of state (EOS). High pressure liquid state reactions of carbon species underlie physiochemical mechanisms such as differentiation of planetary interiors, deep carbon sequestration, propellant deflagration, and shock chemistry. Here we introduce a versatile photoacoustic technique developed to measure accurate and precise speeds of sound (SoS) of high pressure molecular fluids and fluid mixtures. SoS of an intermediate boron oxide, HBO{sub 2} are measured up to 0.5 GPa along the 277 C isotherm. A polarized Exponential-6 interatomic potential form, parameterized using our SoS data, enables EOS determinations and corresponding semi-empirical evaluations of > 2000 C thermodynamic states including energy release from bororganic formulations. Our thermochemical model propitiously predicts boronated hydrocarbon shock Hugoniot results.

  15. Molecular profiling of gene copy number abnormalities in key regulatory genes in high-risk B-lineage acute lymphoblastic leukemia: frequency and their association with clinicopathological findings in Indian patients.

    Science.gov (United States)

    Bhandari, Prerana; Ahmad, Firoz; Das, Bibhu Ranjan

    2017-05-01

    Genes related to key cellular pathways are frequently altered in B cell ALL and are associated with poor survival especially in high-risk (HR) subgroups. We examined gene copy number abnormalities (CNA) in 101 Indian HR B cell ALL patients and their correlation with clinicopathological features by multiplex ligation-dependent probe amplification. Overall, CNA were detected in 59 (59%) cases, with 26, 10 and 23% of cases harboring 1, 2 or +3 CNA. CNA were more prevalent in BCR-ABL1 (60%), pediatric (64%) and high WCC (WBC count) (63%) patients. Frequent genes deletions included CDNK2A/B (26%), IKZF1 (25%), PAX5 (14%), JAK2 (7%), BTG1 (6%), RB1 (5%), EBF1 (4%), ETV6 (4%), while PAR1 region genes were predominantly duplicated (20%). EBF1 deletions selectively associated with adults, IKZF1 deletions occurred frequently in high WCC and BCR-ABL1 cases, while PAR1 region gains significantly associated with MLL-AF4 cases. IKZF1 haploinsufficiency group was predominant, especially in adults (65%), high WCC (60%) patients and BCR-ABL1-negative (78%) patients. Most cases harbored multiple concurrent CNA, with IKZF1 concomitantly occurring with CDNK2A/B, PAX5 and BTG1, while JAK2 occurred with CDNK2A/B and PAX5. Mutually exclusive CNA included ETV6 and IKZF1/RB1, and EBF1 and JAK2. Our results corroborate with global reports, aggregating molecular markers in Indian HR B-ALL cases. Integration of CNA data from rapid methods like MLPA, onto background of existing gold-standard methods detecting significant chromosomal abnormalities, provides a comprehensive genetic profile in B-ALL.

  16. Unlocking the potential of supported liquid phase catalysts with supercritical fluids: low temperature continuous flow catalysis with integrated product separation.

    Science.gov (United States)

    Franciò, Giancarlo; Hintermair, Ulrich; Leitner, Walter

    2015-12-28

    Solution-phase catalysis using molecular transition metal complexes is an extremely powerful tool for chemical synthesis and a key technology for sustainable manufacturing. However, as the reaction complexity and thermal sensitivity of the catalytic system increase, engineering challenges associated with product separation and catalyst recovery can override the value of the product. This persistent downstream issue often renders industrial exploitation of homogeneous catalysis uneconomical despite impressive batch performance of the catalyst. In this regard, continuous-flow systems that allow steady-state homogeneous turnover in a stationary liquid phase while at the same time effecting integrated product separation at mild process temperatures represent a particularly attractive scenario. While continuous-flow processing is a standard procedure for large volume manufacturing, capitalizing on its potential in the realm of the molecular complexity of organic synthesis is still an emerging area that requires innovative solutions. Here we highlight some recent developments which have succeeded in realizing such systems by the combination of near- and supercritical fluids with homogeneous catalysts in supported liquid phases. The cases discussed exemplify how all three levels of continuous-flow homogeneous catalysis (catalyst system, separation strategy, process scheme) must be matched to locate viable process conditions.

  17. Unlocking New Physics and Enabling Plasmonic and Metamaterial Devices with Improved Materials

    Science.gov (United States)

    2014-11-19

    Nanotechnology Award from UNESCO (Shalaev) 2012 National Academy of Engineering (NAE) U.S. Frontiers of Engineering (FOE...mm.   Similarly   structured   TiN   waveguides   on   sapphire   covered   with   index   oil   (noil  =  nsapphire...OMEx  download  since  April   2012,  highlighted  in  OSA  press  release  and  key   industry  media  outlets

  18. Unlocking the transcriptomes of two carcinogenic parasites, Clonorchis sinensis and Opisthorchis viverrini.

    Directory of Open Access Journals (Sweden)

    Neil D Young

    Full Text Available The two parasitic trematodes, Clonorchis sinensis and Opisthorchis viverrini, have a major impact on the health of tens of millions of humans throughout Asia. The greatest impact is through the malignant cancer ( = cholangiocarcinoma that these parasites induce in chronically infected people. Therefore, both C. sinensis and O. viverrini have been classified by the World Health Organization (WHO as Group 1 carcinogens. Despite their impact, little is known about these parasites and their interplay with the host at the molecular level. Recent advances in genomics and bioinformatics provide unique opportunities to gain improved insights into the biology of parasites as well as their relationships with their hosts at the molecular level. The present study elucidates the transcriptomes of C. sinensis and O. viverrini using a platform based on next-generation (high throughput sequencing and advanced in silico analyses. From 500,000 sequences, >50,000 sequences were assembled for each species and categorized as biologically relevant based on homology searches, gene ontology and/or pathway mapping. The results of the present study could assist in defining molecules that are essential for the development, reproduction and survival of liver flukes and/or that are linked to the development of cholangiocarcinoma. This study also lays a foundation for future genomic and proteomic research of C. sinensis and O. viverrini and the cancers that they are known to induce, as well as novel intervention strategies.

  19. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  20. Quantum key management

    Science.gov (United States)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  1. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  2. ALS-causing cleavages of TDP-43 abolish its RRM2 structure and unlock CTD for enhanced aggregation and toxicity.

    Science.gov (United States)

    Wei, Yuanyuan; Lim, Liangzhong; Wang, Lu; Song, Jianxing

    2017-04-15

    Pathological TDP-43 is cleaved into various fragments. Two major groups of ∼35 and ∼25 kDa have enhanced aggregation and cytotoxicity but the underlying mechanisms remain elusive. While the ∼35-kDa fragments contain entire RRM1, RRM2 and C-terminal domain (CTD) with a middle hydrophobic segment flanked by two prion-like regions; the ∼25-kDa one cleaved at Arg208 only consists of the truncated RRM2 and CTD. Remarkably, the 25-kDa fragment was characterized to induce cell death by gain of cytotoxicity and recapitulate pathological features of TDP-43 proteinopathies. Here by NMR spectroscopy we successfully characterized residue-specific conformations and inter-domain interactions of several fragments and the results show that: 1) ALS-causing truncation at Arg208 completely eliminates the intrinsic ability of RRM2 to fold, and consequently the truncated RRM2 becomes highly disordered and prone to aggregation. 2) By disrupting inter-domain interactions upon deleting the N-terminal ubiquitin-like fold in TDP-43 (102-414), the extreme C-terminal prion-like region of CTD is released, while in TDP-43 (208-414), almost the whole CTD is unlocked. As CTD itself is prone to aggregation and highly toxic, our study suggests that at least two mechanisms, namely to abolish RRM2 structure and to release CTD, may account for enhanced aggregation and toxicity of pathologically cleaved TDP-43. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Quantum Key Distribution

    Science.gov (United States)

    Seshu, Ch.

    Quantum Key Distribution (QKD) uses Quantum Mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages.

  4. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  5. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  6. Quantum dense key distribution

    CERN Document Server

    Degiovanni, I P; Castelletto, S; Rastello, M L; Bovino, F A; Colla, A M; Castagnoli, G C

    2004-01-01

    This paper proposes a new protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than BB84 one. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  7. Unlocking the early fossil record of the arthropod central nervous system

    Science.gov (United States)

    Edgecombe, Gregory D.; Ma, Xiaoya; Strausfeld, Nicholas J.

    2015-01-01

    Extant panarthropods (euarthropods, onychophorans and tardigrades) are hallmarked by stunning morphological and taxonomic diversity, but their central nervous systems (CNS) are relatively conserved. The timing of divergences of the ground pattern CNS organization of the major panarthropod clades has been poorly constrained because of a scarcity of data from their early fossil record. Although the CNS has been documented in three-dimensional detail in insects from Cenozoic ambers, it is widely assumed that these tissues are too prone to decay to withstand other styles of fossilization or geologically older preservation. However, Cambrian Burgess Shale-type compressions have emerged as sources of fossilized brains and nerve cords. CNS in these Cambrian fossils are preserved as carbon films or as iron oxides/hydroxides after pyrite in association with carbon. Experiments with carcasses compacted in fine-grained sediment depict preservation of neural tissue for a more prolonged temporal window than anticipated by decay experiments in other media. CNS and compound eye characters in exceptionally preserved Cambrian fossils predict divergences of the mandibulate and chelicerate ground patterns by Cambrian Stage 3 (ca 518 Ma), a dating that is compatible with molecular estimates for these splits. PMID:26554038

  8. Unlocking the mystery of biomarkers: A brief introduction, challenges and opportunities in Parkinson Disease.

    Science.gov (United States)

    Tropea, Thomas F; Chen-Plotkin, Alice S

    2017-07-22

    First described 200 years ago, Parkinson Disease (PD) exhibits considerable heterogeneity in clinical presentation, as well as trajectory of motor and non-motor decline. This heterogeneity, in turn, complicates the planning of clinical research, particularly trials of disease-modifying therapies, as well as the care of PD patients. While clinical features have been used to delineate subgroups of PD patients, clinical subtyping is hampered by change in features over time, and clinical subtyping may fail to capture the biological processes underlying heterogeneity. In contrast, biomarkers - objective measures that serve as indicators of normal biological processes, pathogenic processes, or pharmacologic responses to therapeutic interventions - have promise to delineate molecularly-defined subgroups of PD patients who may be most likely to benefit from specific therapeutic interventions. Here we review the present role of genetic and biochemical biomarkers in PD. Moreover, we highlight areas where the use of biomarkers may benefit clinical trial planning, as well as clinical care through the application of a "precision medicine" approach, in the near term. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Unlocking the early fossil record of the arthropod central nervous system.

    Science.gov (United States)

    Edgecombe, Gregory D; Ma, Xiaoya; Strausfeld, Nicholas J

    2015-12-19

    Extant panarthropods (euarthropods, onychophorans and tardigrades) are hallmarked by stunning morphological and taxonomic diversity, but their central nervous systems (CNS) are relatively conserved. The timing of divergences of the ground pattern CNS organization of the major panarthropod clades has been poorly constrained because of a scarcity of data from their early fossil record. Although the CNS has been documented in three-dimensional detail in insects from Cenozoic ambers, it is widely assumed that these tissues are too prone to decay to withstand other styles of fossilization or geologically older preservation. However, Cambrian Burgess Shale-type compressions have emerged as sources of fossilized brains and nerve cords. CNS in these Cambrian fossils are preserved as carbon films or as iron oxides/hydroxides after pyrite in association with carbon. Experiments with carcasses compacted in fine-grained sediment depict preservation of neural tissue for a more prolonged temporal window than anticipated by decay experiments in other media. CNS and compound eye characters in exceptionally preserved Cambrian fossils predict divergences of the mandibulate and chelicerate ground patterns by Cambrian Stage 3 (ca 518 Ma), a dating that is compatible with molecular estimates for these splits.

  10. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  11. Unlocking the Physiochemical Controls on Organic Carbon Dynamics from the Soil Pore- to Core-Scale

    Science.gov (United States)

    Smith, A. P.; Tfaily, M. M.; Bond-Lamberty, B. P.; Todd-Brown, K. E.; Bailey, V. L.

    2015-12-01

    The physical organization of soil includes pore networks of varying size and connectivity. These networks control microbial access to soil organic carbon (C) by spatially separating microorganisms and C by both distance and size exclusion. The extent to which this spatially isolated C is vulnerable to microbial transformation under hydrologically dynamic conditions is unknown, and limits our ability to predict the source and sink capacity of soils. We investigated the effects of shifting hydrologic connectivity and soil structure on greenhouse gas C emissions from surface soils collected from the Disney Wilderness Preserve (Florida, USA). We subjected intact soil cores and re-packed homogenized soil cores to simulated groundwater rise or precipitation, monitoring their CO2 and CH4 emissions over 24 hours. Soil pore water was then extracted from each core using different suctions to sample water retained by pore throats of different sizes and then characterized by Fourier transform ion cyclotron resonance (FT-ICR) mass spectrometry. Greater respiration rates were observed from homogenized cores compared to intact cores, and from soils wet from below, in which the wetting front is driven by capillary forces, filling fine pores first. This suggests that C located in fine pores may turn over via diffusion processes that lead to the colocation of this C with other resources and microorganisms. Both the complexity and concentration of soluble-C increased with decreasing pore size domains. Pore water extracted from homogenized cores had greater C concentrations than from intact cores, with the greatest concentrations in pore waters sampled from very fine pores, highlighting the importance of soil structure in physically protecting C. These results suggest that the spatial separation of decomposers from C is a key mechanism stabilizing C in these soils. Further research is ongoing to accurately represent this protection mechanism, and the conditions under which it breaks

  12. Epigenetic Modifications Unlock the Milk Protein Gene Loci during Mouse Mammary Gland Development and Differentiation

    Science.gov (United States)

    Rijnkels, Monique; Freeman-Zadrowski, Courtneay; Hernandez, Joseph; Potluri, Vani; Wang, Liguo; Li, Wei; Lemay, Danielle G.

    2013-01-01

    Background Unlike other tissues, development and differentiation of the mammary gland occur mostly after birth. The roles of systemic hormones and local growth factors important for this development and functional differentiation are well-studied. In other tissues, it has been shown that chromatin organization plays a key role in transcriptional regulation and underlies epigenetic regulation during development and differentiation. However, the role of chromatin organization in mammary gland development and differentiation is less well-defined. Here, we have studied the changes in chromatin organization at the milk protein gene loci (casein, whey acidic protein, and others) in the mouse mammary gland before and after functional differentiation. Methodology/Principal Findings Distal regulatory elements within the casein gene cluster and whey acidic protein gene region have an open chromatin organization after pubertal development, while proximal promoters only gain open-chromatin marks during pregnancy in conjunction with the major induction of their expression. In contrast, other milk protein genes, such as alpha-lactalbumin, already have an open chromatin organization in the mature virgin gland. Changes in chromatin organization in the casein gene cluster region that are present after puberty persisted after lactation has ceased, while the changes which occurred during pregnancy at the gene promoters were not maintained. In general, mammary gland expressed genes and their regulatory elements exhibit developmental stage- and tissue-specific chromatin organization. Conclusions/Significance A progressive gain of epigenetic marks indicative of open/active chromatin on genes marking functional differentiation accompanies the development of the mammary gland. These results support a model in which a chromatin organization is established during pubertal development that is then poised to respond to the systemic hormonal signals of pregnancy and lactation to achieve the

  13. Boron Isotopes in Benthic Foraminifera by MC-ICPMS: Unlocking the Ocean's Carbon Cycle

    Science.gov (United States)

    Rae, J. W.; Foster, G. L.; Schmidt, D. N.; Elliott, T. R.

    2008-12-01

    factor of [1] - allowing a ready determination of deep water pH. Here we combine this with measurements of B/Ca ratios, a proxy for carbonate ion saturation [2], to determine all components of the ocean's carbonate system. We will present results from several key locations in order to gain insights into the mechanisms responsible for glacial-interglacial pCO2 change. [1] K. Klochko, A. J. Kaufman, W. Yao, R. H. Byrne, and J. A. Tossell (2006), Earth and Planetary Science Letters, 248, 261-270. [2] J. Yu and H. Elderfield (2007), Earth and Planetary Science Letters, 258, 73-86.

  14. European chemistry for growth. Unlocking a competitive, low carbon and energy efficient future

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-04-15

    The long term role of the chemical industry as Europe progresses to an energy efficient and low GHG emission future, and the sector's potential to assist Europe in meeting its decarbonisation targets is investigated. The timeline for deploying existing and new technologies from 2020 to 2050 and their potential impact on energy efficiency and GHG emission levels, as well as the competitive position of the European chemical industry is assessed. Cefic commissioned Ecofys to perform analyses and bring forward key conclusions and recommendations from their independent viewpoint, in close collaboration with the sector. As a strategic orientation for this industry and a high level priority for Cefic's Board, this Roadmap meets the need for the European chemical industry to develop a new, longer term strategic approach to energy and climate policy and contributes to the debate on the post-2020 policy framework. This Roadmap has three main objectives: (1) Provide quantitative and more qualitative evidence on the options available to the European chemical industry to contribute to the EU's long term GHG emissions reduction goals. These options apply to technologies and product development for the sector itself and for other sectors of the EU economy; (2) Based on this evidence, define a long term vision for the European chemical industry within a European Union that progresses to a low GHG emission future by defining a number of plausible scenarios in the context of global market developments; (3) Formulate recommendations externally to policy makers and internally to the European chemical industry based on the scenarios studied. Chapter 2 provides an overview of the European chemical industry, while Chapter 3 describes the current policy landscape for the European chemical industry. Chapter 4 focuses on the European chemical industry as an enabler of energy efficiency and emissions reduction for sectors across the economy. In Chapter 5, the energy efficiency

  15. Unlocking community capability through promotion of self-help for health: experience from Chakaria, Bangladesh

    Directory of Open Access Journals (Sweden)

    Abbas Bhuiya

    2016-11-01

    attendance, facility deliveries and sanitary latrines were substantially more in intervention than comparison areas. Conclusion Building community capability by working with pre-existing SHOs, encouraging them to place health on their agendas, strengthening their functioning and implementation of health activities led to sustained improvements in utilization of services for over 20 years. Key elements underpinning success include efforts to build and maintain trust, ensuring social inclusion in project activities, and balancing demands for material resources with flexibility to be responsive to community needs.

  16. The Homomorphic Key Agreement

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    There are various challenges that are faced in group communication, so it is necessary to ensure session key. Key agreement is the fundamental cryptographic primitive for establishing a secure communication. It is a process of computing a shared secret contributed by two or more entities such that no single node can predetermine the resulting value. An authenticated key agreement is attained by combining the key agreement protocol with digital signatures. After a brief introduction to existing key agreement in group communication, Making use of the additive-multiplicative homomorphism in the integer ring defined by Sander and Tschudin: A new protocols, called the homomorphism key agreement, was designed, which can be self-contributory, robust, scalable and applicable in group communication.

  17. Key Account Management

    OpenAIRE

    Dvořák, Dalibor

    2007-01-01

    This note tries to explain concept of key account management (KAM), factors leading to importance of this emerging concept, criteria to determine key accounts from customer base, benefits to both buyers and sellers agreeing to practice it, stages of KAM relationship, conditions under which power lies with buyer or seller, outlines risks faced by both the parties, key success factors, challenges faced in implementing this concept and relevance to infrastructure sector.

  18. Unlocking the Energy Potential of Manure—An Assessment of the Biogas Production Potential at the Farm Level in Germany

    Directory of Open Access Journals (Sweden)

    Mattes Scheftelowitz

    2016-04-01

    Full Text Available Residues from animal husbandry are one of the major greenhouse gas (GHG emission sources in agriculture. The production of biogas from agricultural residues can reduce GHG emissions through an improved handling of the material streams such as manure storage. Additionally, biogas can substitute fossil energy carriers in the provision of heat, power, and transport fuels. The aim of this work is to estimate the manure potential for biogas production in Germany under the consideration of the farm size of livestock production. In Germany, cattle and pig farming is of major relevance with more than 130,000 farms throughout the country. To unlock the biogas potential of manure, the low energy density of manure, depending on the dry matter content, needs to be considered, meaning that biogas installations need to be built close to the manure production on the farm site. This not only results in a high number of biogas plants, but also due to the wide range of farm sizes in Germany, a huge number of very small biogas plants. Small biogas installations have higher specific investment costs. Together with the relatively low methane yields from manure, costs for power generation would be very high. Co-substrates with higher methane yield can lower the costs for biogas. Thus, the use of a co-substrate could help to use small manure potentials. Biogas plants with the necessary minimum size of 50 kWel installed power could be established at farms representing 12% of all cattle and 16.5% of all pigs respectively in Germany. Using excrement from pigs, farms representing 16.5% of the total amount of pigs could establish a biogas plant. The use of manure in combination with energy crops can increase the size of biogas plants on a farm site significantly. At cattle farms, the share would increase to 31.1% with 40% co-substrate and to 40.8% with 60% co-substrate. At pig farms, the share would increase to 36% if co-substrates were used.

  19. Physical Chemistry of Molecular

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    @@ Established in 2009, the group consists of six researchers and more than 70 research assistants and graduate students from the CAS Key Laboratory of Molecular Nanostructures and Nanotechnologies at the CAS Institute of Chemistry.Its research focuses on the physical chemistry involved in molecular assembly, molecular nanostructures, functional nanomaterials and conceptual nano-devices.

  20. Financial Key Ratios

    Directory of Open Access Journals (Sweden)

    Tănase Alin-Eliodor

    2014-08-01

    Full Text Available This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  1. The compact key

    NARCIS (Netherlands)

    NN,

    1966-01-01

    Here is given a sample of a new sort of identification key, recently developed by Dr. P. W. Leenhouts of the Rijksherbarium. Having to sort many specimens of Sapindaceae into genera, he became dissatisfied with the common dichotomous key, which too often does not work when the material is not comple

  2. An Alternative to Keys

    Science.gov (United States)

    O'Hagan, James

    1977-01-01

    For the secondary school, the author discourages the use of dichotomous keys in favor of a punch-card system. The system is readily constructed by students for use in plant and animal classification. (CP)

  3. 汽车遥控钥匙按键策略%The Strategy of Remote Keyless Key

    Institute of Scientific and Technical Information of China (English)

    周靖

    2012-01-01

    汽车遥控门禁系统(RKE-remote keyless entry system)是一种应用于车辆的防盗技术.它可以用来远程遥控车门的上锁和解锁请求.该系统通过钥匙端发送一串特殊编码的数据,汽车防盗系统在接收到该数据后,进行解码运算来判断该数据的有效性,之后执行上锁或解锁的请求.由于无线干扰问题的存在,当钥匙和汽车间的通讯时间越长,受干扰的几率就越大.为了避免经常出错,对整个发送方式做一改进,以尽量减少受干扰的情况发生.%A Remote Keyless Entry System is an anti-theft technology for vehicles. It can be used to remote control door lock and unlock requests. The system sends a stream through a specially coded data, the receiver in car gets the data and decodes with encrypt algorithm. After decrypting the key information, the vehicle performs lock or unlock request. As wireless interference problems, the longer the communication spends between the key and the vehicle, the greater the chance of interference. In order to avoid these mistakes, this paper tries to improve the method for key fob's button strategy.

  4. Keys to the City

    DEFF Research Database (Denmark)

    Monsson, Christian Kjær

    2014-01-01

    Review of: Keys to the City: How Economics, Institutions, Social Interaction, and Politics Shape Development / Michael Storper Princeton University Press, Princeton, NJ, 2013, 288 pp., $39.95/£27.95 (cloth), ISBN 9780691143118......Review of: Keys to the City: How Economics, Institutions, Social Interaction, and Politics Shape Development / Michael Storper Princeton University Press, Princeton, NJ, 2013, 288 pp., $39.95/£27.95 (cloth), ISBN 9780691143118...

  5. Key concepts in energy

    CERN Document Server

    Madureira, Nuno Luis

    2014-01-01

    Highlights how key energy concepts surfaced, tracing their evolution throughout history to encompasses four economic concepts and four technological-engineering concepts developed through their history to conclude with current economic and environmental sciences Considers the process of energy-substitutions through complementary usages, hybridization and technological mixes Combines a conceptual approach with key theoretical concepts from engineering, geological and economic sciences providing cross disciplinary overview of energy fundamentals in a short and focused reading

  6. Secret Key Crypto Implementations

    Science.gov (United States)

    Bertoni, Guido Marco; Melzani, Filippo

    This chapter presents the algorithm selected in 2001 as the Advanced Encryption Standard. This algorithm is the base for implementing security and privacy based on symmetric key solutions in almost all new applications. Secret key algorithms are used in combination with modes of operation to provide different security properties. The most used modes of operation are presented in this chapter. Finally an overview of the different techniques of software and hardware implementations is given.

  7. Unlocking the Locker Room.

    Science.gov (United States)

    St. Clair, Dean

    1996-01-01

    Discusses locker-room design standards and common challenges when complying with the Americans with Disabilities Act. Accessibility and safety considerations for shower, toilet, and locker areas are addressed, as are entrance vestibules, drying and grooming areas, and private dressing rooms. (GR)

  8. Unlocking Personality Type.

    Science.gov (United States)

    Tieger, Paul D.

    2002-01-01

    This article examines some of the intricacies of personality types and their effect on career choices. Proposes that knowing students' Myers-Briggs personality types can help school counselors guide them down the right career path. (GCP)

  9. Unlocking Academic Vocabulary

    Science.gov (United States)

    DeLuca, Eileen

    2010-01-01

    How can we teach science to English language learners (ELLs) when even our native English speakers have trouble reading the textbook? To help science teachers meet this challenge, this article presents six text-comprehension strategies used by English for Speakers of other Languages (ESOL) teachers: metalinguistic awareness development,…

  10. Unlock Your Personalization

    DEFF Research Database (Denmark)

    Prasad, Ramjee

    and anxiety. In our post-modern, technoscience world, every effort is being made to achieve a high standard of living. Still, few people find an effective solution for relieving stress and achieving their objectives in life. This book promotes an innovative and novel approach to achieving a good quality...

  11. Unlocking radio broadcasts

    DEFF Research Database (Denmark)

    Lykke, Marianne; Skov, Mette

    2012-01-01

    This poster reports the preliminary results of a user study uncovering the information seeking behaviour of humanities scholars dedicated to radio research. The study is part of an interdisciplinary research project on radio culture and auditory resources. The purpose of the study is to inform...... the design of information architecture and interaction design of a research infrastructure that will enable future radio and audio based research. Results from a questionnaire survey on humanities scholars’ research interest and information needs, preferred access points, and indexing levels are reported...

  12. Unlocking Personality Type.

    Science.gov (United States)

    Tieger, Paul D.

    2002-01-01

    This article examines some of the intricacies of personality types and their effect on career choices. Proposes that knowing students' Myers-Briggs personality types can help school counselors guide them down the right career path. (GCP)

  13. Keeping the door unlocked

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Once a young girl got tired of living with her strict parents and then she ran away from home.But she soon found out that life was not easy on her own.She couldn't find a job.She didn't have money.She had to begging in the street. Years passed.Her father died.Her mother grew older.And the daughter's life just got worse and terribly unhappy.But she still would not write or go home to see her mother.One day the mother heard that her daughter

  14. Unlocking Boys' Potential

    Science.gov (United States)

    Reichert, Michael C.

    2016-01-01

    Long stereotyped as not being interested in building relationships with teachers, boys actually search for--and are in need of--teachers who make meaningful connections with them, writes Reichert in this article. The author examines how school practices of the past and present have contributed to the so-called gender achievement gap and stresses…

  15. Social safety unlocked

    NARCIS (Netherlands)

    Lonneke van Noije; Karin Wittebrood

    2008-01-01

    Original title: Sociale veiligheid ontsleuteld. The Dutch government employs a range of measures aimed at achieving a safer society, varying from more police on the streets, CCTV surveillance and modified street lighting to providing support for at-risk young people and imposing heavier sanctions.

  16. Unlocking radio broadcasts

    DEFF Research Database (Denmark)

    Skov, Mette; Lykke, Marianne

    2012-01-01

    This poster reports the preliminary results of a user study uncovering the information seeking behaviour of humanities scholars dedicated to radio research. The study is part of an interdisciplinary research project on radio culture and auditory resources. The purpose of the study is to inform...... the design of information architecture and interaction design of a research infrastructure that will enable future radio and audio based research. Results from a questionnaire survey on humanities scholars‟ research interest and information needs, preferred access points, and indexing levels are reported...

  17. Unlocking the bovine genome

    Directory of Open Access Journals (Sweden)

    Worley Kim C

    2009-04-01

    Full Text Available Abstract The draft genome sequence of cattle (Bos taurus has now been analyzed by the Bovine Genome Sequencing and Analysis Consortium and the Bovine HapMap Consortium, which together represent an extensive collaboration involving more than 300 scientists from 25 different countries.

  18. Escherichia Coli--Key to Modern Genetics.

    Science.gov (United States)

    Bregegere, Francois

    1982-01-01

    Mid-nineteenth century work by Mendel on plant hybrids and by Pasteur on fermentation gave birth by way of bacterial genetics to modern-day molecular biology. The bacterium Escherichia Coli has occupied a key position in genetic studies leading from early gene identification with DNA to current genetic engineering using recombinant DNA technology.…

  19. Soil carbon unlocked from MIS 5 to MIS 1 aged North Siberian permafrost: state and fate of decomposition

    Science.gov (United States)

    Schwamborn, Georg; Stapel, Janina G.; Mangelsdorff, Kai; Walz, Josefine; Knoblauch, Christian; Wetterich, Sebastian; Schirrmeister, Lutz

    2017-04-01

    At Bol'shoy Lyakhovsky, New Siberian Archipelago, multiple permafrost cores were obtained providing a Late Quaternary environmental record with deposits from marine isotope stages MIS 5 to MIS 1. This exceptionally long record is used to evaluate the stored potential of the freeze-locked organic matter (OM) to serve as substrate provider for greenhouse gas producing microorganisms. We relate modern signals of OM degradation from MIS 1 deposits to previous glacial-time deposits (MIS 4 and MIS 3) and to interglacial deposits (MIS 5), which may serve as an analogue for a future Arctic warmer than modern. From the oldest to the youngest, the composite record includes re-frozen MIS 5 lake deposits (sandy silt), floodplain deposits (sandy silt) from MIS 4, Ice Complex (i.e. Yedoma) deposits from MIS 4 to 3 (sandy silt), and alas deposits (sandy silt) from a drained and re-frozen thermokarst basin with MIS 1 ages. Whereas glacial-time deposits (MIS 4 and MIS 3) are fairly ice-rich with a median at 43 wt% ice content, interglacial deposits (MIS 5 and MIS 1) are moderately ice-rich with a median at 31 wt% ice content. In terms of total organic carbon content glacial-time deposits have moderate values with a median at 2.4 wt% and interglacial deposits have low values with a median at 0.4 wt%. Deposits from MIS 4 and MIS 3 possess an increased aliphatic character and therefore higher OM quality in terms of biodegradation compared to deposits from MIS 5 and MIS 1. The strongest primal and future substrate potential is stored within the glacial-time deposits, especially in those layers deposited during environmental conditions with increased moisture. The interstadial MIS 3 deposits hold the highest concentrations of pore-water acetate, which serve as optimal substrate for greenhouse gas generating microorganisms once it is unlocked from the perennially frozen ground. MIS 3 deposits also contain the highest concentrations of organic acids ester-bound to the organic matrix

  20. Keys through ARQ

    CERN Document Server

    Latif, Mohamed Abdel; Gamal, Hesham El

    2009-01-01

    This paper develops a novel framework for sharing secret keys using the well-known Automatic Repeat reQuest (ARQ) protocol. The proposed key sharing protocol does not assume any prior knowledge about the channel state information (CSI), but, harnesses the available opportunistic secrecy gains using only the one bit feedback, in the form of ACK/NACK. The distribution of key bits among multiple ARQ epochs, in our approach, allows for mitigating the secrecy outage phenomenon observed in earlier works. We characterize the information theoretic limits of the proposed scheme, under different assumptions on the channel spatial and temporal correlation function, and develop low complexity explicit implementations. Our analysis reveals a novel role of "dumb antennas" in overcoming the negative impact of spatial correlation, between the legitimate and eavesdropper channels, on the achievable secrecy rates. We further develop an adaptive rate allocation policy which achieves higher secrecy rates by exploiting the channe...

  1. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  2. Molecular dynamics simulations of Hsp40 J-domain mutants identifies disruption of the critical HPD-motif as the key factor for impaired curing in vivo of the yeast prion [URE3].

    Science.gov (United States)

    Xue, You-Lin; Wang, Hao; Riedy, Michael; Roberts, Brittany-Lee; Sun, Yuna; Song, Yong-Bo; Jones, Gary W; Masison, Daniel C; Song, Youtao

    2017-08-02

    Genetic screens using Saccharomyces cerevisiae have identified an array of Hsp40 (Ydj1p) J-domain mutants that are impaired in the ability to cure the yeast [URE3] prion through disrupting functional interactions with Hsp70. However, biochemical analysis of some of these Hsp40 J-domain mutants has so far failed to provide major insight into the specific functional changes in Hsp40-Hsp70 interactions. To explore the detailed structural and dynamic properties of the Hsp40 J-domain, 20 ns molecular dynamic simulations of 4 mutants (D9A, D36A, A30T, and F45S) and wild-type J-domain were performed, followed by Hsp70 docking simulations. Results demonstrated that although the Hsp70 interaction mechanism of the mutants may vary, the major structural change was targeted to the critical HPD motif of the J-domain. Our computational analysis fits well with previous yeast genetics studies regarding highlighting the importance of J-domain function in prion propagation. During the molecular dynamics simulations several important residues were identified and predicted to play an essential role in J-domain structure. Among these residues, Y26 and F45 were confirmed, using both in silico and in vivo methods, as being critical for Ydj1p function.

  3. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  4. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  5. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  6. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  7. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without infor

  8. Morphological and molecular descriptions of Moniliformis saudi sp. n. (Acanthocephala: Moniliformidae) from the desert hedgehog, Paraechinus aethiopicus (Ehrenberg) in Saudi Arabia, with a key to species and notes on histopathology.

    Science.gov (United States)

    Amin, Omar M; Heckmann, Richard A; Osama, Mohammed; Evans, R Paul

    2016-04-26

    A new acanthocepohalan species, Moniliformis saudi sp. n. is described from the desert hedgehog, Paraechinus aethiopicus (Ehrenberg), in central Saudi Arabia. Fourteen other valid species of Moniliformis Travassos, 1915 are recognised. The new species of Moniliformis is distinguished by having a small proboscis (315-520 µm long and 130-208 µm wide) with two apical pores, 14 rows of 8 hooks each and small hooks, thre largest being 25-31 µm long anteriorly. Distinguishing features are incorporated in a dichotomous key to the species of Moniliformis. The description is augmented by scanning electron microscopical (SEM) observation and DNA analysis of nuclear (18S rRNA) and mitochondrial (cytochrome oxidase subunit 1; cox1) gene sequences. Attached worms cause extensive damage to the immediate area of attachment in the host intestine. This includes tissue necrosis and blood loss due to damage to capillary beds. Worms also obstruct essential absorbing surfaces.

  9. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  10. Efficient Quantum Key Distribution

    CERN Document Server

    Ardehali, M; Chau, H F; Lo, H K

    1998-01-01

    We devise a simple modification that essentially doubles the efficiency of a well-known quantum key distribution scheme proposed by Bennett and Brassard (BB84). Our scheme assigns significantly different probabilities for the different polarization bases during both transmission and reception to reduce the fraction of discarded data. The actual probabilities used in the scheme are announced in public. As the number of transmitted signals increases, the efficiency of our scheme can be made to approach 100%. The security of our scheme (against single-photon eavesdropping strategies) is guaranteed by a refined analysis of accepted data which is employed to detect eavesdropping: Instead of lumping all the accepted data together to estimate a single error rate, we separate the accepted data into various subsets according to the basis employed and estimate an error rate for each subset individually. Our scheme is the first quantum key distribution with an efficiency greater than 50%. We remark that our idea is rath...

  11. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  12. Ancel Keys: a tribute.

    Science.gov (United States)

    Vanitallie, Theodore B

    2005-02-14

    Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study - which was immediately recognized to be a classic - continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  13. Molecular Bases of Cutaneous and Uveal Melanomas

    Directory of Open Access Journals (Sweden)

    Sudeep Gaudi

    2011-01-01

    Full Text Available Intensive research in recent years has begun to unlock the mysteries surrounding the molecular pathogenesis of melanoma, the deadliest of skin cancers. The high-penetrance, low-frequency susceptibility gene CDKN2A produces tumor suppressor proteins that function in concert with p53 and retinoblastoma protein to thwart melanomagenesis. Aberrant CDKN2A gene products have been implicated in a great many cases of familial cutaneous melanoma. Sporadic cases, on the other hand, often involve constitutive signal transduction along the mitogen-activated protein kinase (MAPK pathway, with particular focus falling upon mutated RAS and RAF protooncogenes. The proliferative effects of the MAPK pathway may be complemented by the antiapoptotic signals of the PI3K/AKT pathway. After skin, melanoma most commonly affects the eye. Data for the constitutive activation of the MAPK pathway in uveal melanoma exists as well, however, not through mutations of RAS and RAF. Rather, evidence implicates the proto-oncogene GNAQ. In the following discussion, we review the major molecular pathways implicated in both familial and sporadic cutaneous melanomagenesis, the former accounting for approximately 10% of cases. Additionally, we discuss the molecular pathways for which preliminary evidence suggests a role in uveal melanomagenesis.

  14. Design and research of the measure system about Servo unlock construction%伺服系统气动解锁机构测试系统设计与研究

    Institute of Scientific and Technical Information of China (English)

    曹木云; 柴永利

    2015-01-01

    针对某导弹伺服系统气动解锁机构,该机构用于导弹舵面的锁定与解锁,采用高压气源装置和压力采集技术建立一套测试系统,该系统通过PXI技术与LabWindows/CVI编程语言实现,完成气动解锁机构的性能测试与评估,实现了气源压力与解锁状态同步测试功能,文中详细介绍了系统组成、测试原理和软件组成。实验证明,该系统工作良好,具有一定创新性,已运用于产品研制中,提高了产品测试性和产品测试效率。%Considering the pneumatic unlock construction of some missile Servo,The construction is used in lock or unlock the missile Rudder,Build the measure systemused by the device of air supply and the technology of pressure acquisition, The system realized by the PXI and LabWindows/CVI programming language, Complete the test and evaluation of the unlock construction,Achieve synchronous test of the presure of air supply and unlock state, The consists of system、test principle、the consists of soft are detailed introduced in this paper.The experiment result proved that the system working regular ,Has certain innovation, The test equipment has been used in product developing,And improved the product testing and testing efficiency.

  15. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Establishment of a Method for Content Determination of Polysaccharide in Membranous milkveteh root Applied in Fisheries Yu Xiao-qing et al. (1) Abstract Some chemical component in the traditional Chinese medicine Membranous milkvetch root can improve the ability of disease-prevention of animal and it can be applied in fisheries. In the paper, the method about content determination of polysaccharide in the root was established based on orthogonal experimental design Key words medicine; polysaccharide in Membranous milkvetch root; method of determination

  16. Ancel Keys: a tribute

    OpenAIRE

    VanItallie Theodore B

    2005-01-01

    Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recogni...

  17. Identification key to Quivira milkweeds

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document is a key to milkweed identification at Quivira National Wildlife Refuge. It contains a dichotomous key as well as a picture key. Milkweeds found on the...

  18. Quantum Key Distribution Protocol with Private-Public Key

    OpenAIRE

    Serna, Eduin H.

    2009-01-01

    A quantum cryptographic protocol based in public key cryptography combinations and private key cryptography is presented. Unlike the BB84 protocol [1] and its many variants [2,3] two quantum channels are used. The present research does not make reconciliation mechanisms of information to derive the key. A three related system of key distribution are described.

  19. ID-based Key-insulated Authenticated Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHOU Yuan; CHENG Xiao-ming; CHAI Zhen-chuan

    2007-01-01

    The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information. Comparing with the traditional certificate-based cryptography, identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate. However, exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost. In this paper, an ID-based authenticated key agreement protocol was presented. For solving the problem of key exposure of the basic scheme, the technique of key insulation was applied and a key insulated version is developed.

  20. Paediatric pharmacokinetics: key considerations

    Science.gov (United States)

    Batchelor, Hannah Katharine; Marriott, John Francis

    2015-01-01

    A number of anatomical and physiological factors determine the pharmacokinetic profile of a drug. Differences in physiology in paediatric populations compared with adults can influence the concentration of drug within the plasma or tissue. Healthcare professionals need to be aware of anatomical and physiological changes that affect pharmacokinetic profiles of drugs to understand consequences of dose adjustments in infants and children. Pharmacokinetic clinical trials in children are complicated owing to the limitations on blood sample volumes and perception of pain in children resulting from blood sampling. There are alternative sampling techniques that can minimize the invasive nature of such trials. Population based models can also limit the sampling required from each individual by increasing the overall sample size to generate robust pharmacokinetic data. This review details key considerations in the design and development of paediatric pharmacokinetic clinical trials. PMID:25855821

  1. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Determination of the Estrogen Alkylphenols and Bisphenol A in Marine Sediments by Gas Chromatography-Mass Spectrometry Deng Xu-xiu et al. (1) Abstract Octylphenol, nonylphenol and bisphenol A are recognized environmental endocrine disruptors. A quantitative method was established for the simultaneous determination of octylphenol, nonylphenol and bisphenol A in marine sediments by gas chromatography-mass spectrometry. The test sample was extracted by methanol with ultrasonic technique, purified with copper powder and carbon solid phase extraction column, and derived with heptafluorobutyric anhydride. Then the analytes were separated on HP-5ms column and determined by gas chromatography-mass. The recovery of the method was between 84.3% and 94.5%, and the LOQ of 4-N- octylphenol, nonylphenol and bisphenol A was 0.25 g/kg, 0.15 g/kg and 0.15 g/kg. Key words octylphenol; nonylphenol; bisphenol A; gas chromatography-mass spectrometry

  2. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  3. Nanofluids research: key issues.

    Science.gov (United States)

    Wang, Liqiu; Fan, Jing

    2010-05-22

    Nanofluids are a new class of fluids engineered by dispersing nanometer-size structures (particles, fibers, tubes, droplets) in base fluids. The very essence of nanofluids research and development is to enhance fluid macroscopic and megascale properties such as thermal conductivity through manipulating microscopic physics (structures, properties and activities). Therefore, the success of nanofluid technology depends very much on how well we can address issues like effective means of microscale manipulation, interplays among physics at different scales and optimization of microscale physics for the optimal megascale properties. In this work, we take heat-conduction nanofluids as examples to review methodologies available to effectively tackle these key but difficult problems and identify the future research needs as well. The reviewed techniques include nanofluids synthesis through liquid-phase chemical reactions in continuous-flow microfluidic microreactors, scaling-up by the volume averaging and constructal design with the constructal theory. The identified areas of future research contain microfluidic nanofluids, thermal waves and constructal nanofluids.

  4. Nanofluids Research: Key Issues

    Directory of Open Access Journals (Sweden)

    Wang Liqiu

    2010-01-01

    Full Text Available Abstract Nanofluids are a new class of fluids engineered by dispersing nanometer-size structures (particles, fibers, tubes, droplets in base fluids. The very essence of nanofluids research and development is to enhance fluid macroscopic and megascale properties such as thermal conductivity through manipulating microscopic physics (structures, properties and activities. Therefore, the success of nanofluid technology depends very much on how well we can address issues like effective means of microscale manipulation, interplays among physics at different scales and optimization of microscale physics for the optimal megascale properties. In this work, we take heat-conduction nanofluids as examples to review methodologies available to effectively tackle these key but difficult problems and identify the future research needs as well. The reviewed techniques include nanofluids synthesis through liquid-phase chemical reactions in continuous-flow microfluidic microreactors, scaling-up by the volume averaging and constructal design with the constructal theory. The identified areas of future research contain microfluidic nanofluids, thermal waves and constructal nanofluids.

  5. Key Updating Methods for Combinatorial Design Based Key Management Schemes

    Directory of Open Access Journals (Sweden)

    Chonghuan Xu

    2014-01-01

    Full Text Available Wireless sensor network (WSN has become one of the most promising network technologies for many useful applications. However, for the lack of resources, it is different but important to ensure the security of the WSNs. Key management is a corner stone on which to build secure WSNs for it has a fundamental role in confidentiality, authentication, and so on. Combinatorial design theory has been used to generate good-designed key rings for each sensor node in WSNs. A large number of combinatorial design based key management schemes have been proposed but none of them have taken key updating into consideration. In this paper, we point out the essence of key updating for the unital design based key management scheme and propose two key updating methods; then, we conduct performance analysis on the two methods from three aspects; at last, we generalize the two methods to other combinatorial design based key management schemes and enhance the second method.

  6. A threshold key escrow scheme based on public key cryptosystem

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme.

  7. Unlocked nucleic acids with a pyrene-modified uracil: Synthesis, hybridization studies, fluorescent properties and i-motif stability

    DEFF Research Database (Denmark)

    Perlíková, P.; Karlsen, K.K.; Pedersen, E.B.

    2014-01-01

    .2, both under molecular crowding and noncrowding conditions. The presence of the pyrene-modified UNA monomers in DNA strands led to decreases in the thermal stabilities of DNA/DNA and DNA/RNA duplexes, but these duplexes' thermal stabilities were better than those of duplexes containing unmodified UNA...... intensities upon hybridization to DNA or RNA. Efficient quenching of fluorescence of pyrene-modified UNA monomers was observed after formation of i-motif structures at pH 5.2. The stabilizing/destabilizing effect of pyrene-modified nucleic acids might be useful for designing antisense oligonucleotides...... and hybridization probes....

  8. Sets, Subsets, and Dichotomous Keys

    Science.gov (United States)

    Cole, E. James

    1973-01-01

    Discusses the procedures that should be observed in constructing a dichotomous key. The keying exercise described was used as a laboratory activity in a biology course for elementary education majors, however it could be used in other courses. (JR)

  9. Key Concepts in Informatics: Algorithm

    Science.gov (United States)

    Szlávi, Péter; Zsakó, László

    2014-01-01

    "The system of key concepts contains the most important key concepts related to the development tasks of knowledge areas and their vertical hierarchy as well as the links of basic key concepts of different knowledge areas." (Vass 2011) One of the most important of these concepts is the algorithm. In everyday life, when learning or…

  10. Social function improvement in locked patients with psychoses after unlocking and treatment%重性精神疾病关锁患者解锁救治后社会功能的改善

    Institute of Scientific and Technical Information of China (English)

    吴霞民; 刘津; 马宁; 管丽丽; 马弘; 于欣; 王燕

    2013-01-01

    目的:探讨解锁救治对重性精神疾病关锁患者社会功能的改善情况,为制订关锁患者的救助政策提供参考.方法:使用自编调查问卷,在中央补助地方重性精神疾病管理治疗项目(简称“686”项目)区免费解锁救治的患者中,对符合研究标准的266例患者进行调查,分析解锁救治前后患者社会功能的变化.结果:解锁救治后,患者社会功能明显改善,其中变化最大的是个人生活料理能力和家务劳动能力.生活料理能力差的患者比例从解锁治疗前的97.0%下降到7.5%,家务劳动能力差的患者比例从97.8%下降到18.8%.患者被关锁时间越长,社会功能改善越差(β=0.07~0.14).结论:解锁救治明显改善了患者的社会功能,提高了患者的生活质量.建议各级政府部门应借鉴686服务模式,不断加大和健全精神疾病社区防治康复网络建设,由点到面逐渐展开解锁救治工作.%Objective: To explore the change of social function in patients with psychoses after unlocking and treatment, to provide information and references for making policy to aid locked patients. Methods: Totally 266 patients involved in "National Continuing Management and Intervention Program for Psychoses" (named as "686" Program) who met the study criteria and were assessed with the self-made questionnaire and unlocked for free. The change of their social function before and after unlocking and treatment were estimated. The inclusion criteria were, 1) diagnosed as schizophrenia, schizoaffective, bipolar disorder, paranoid psychosis, mental retardation, mental disorder caused by epilepsy according to the Chinese Classification and Diagnostic Criteria for Mental Disorders, Third Edition (CCMD-3);2) diagnoses were made by two psychiatrists; 3) outpatients; 4) having the inform consent of patient himself/herself or his/her custodian. Results: After unlocking and treatment, the social function of patients improved remarkably. One

  11. Limitations on quantum key repeaters.

    Science.gov (United States)

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  12. 'Unlocking the archive': Using digital photogrammetry of modern and historic aerial photography to reconstruct 60 years of volumetric change on the Moider Glacier, Antarctic Peninsula

    Science.gov (United States)

    Clarke, Lucy; Miller, Pauline; Ireland, Louise; Fox, Adrian; Mills, Jon; Fieber, Karolina

    2016-04-01

    The Antarctic Peninsula is a mountain glacier system comprised of over 400 glaciers, and is an important contributor to historical and future sea level rise. Assessment and monitoring of AP glaciers is crucial for understanding sensitivity to climate change. Changes to glacier fronts and ice shelves and glacier acceleration are well documented, but there are almost no data on mass changes on the Antarctic Peninsula. Satellite data have been used to calculate change over the last 3 decades, but methods to quantify this over longer timescales have eluded researchers. However there is an archive of aerial photography dating back to the 1940s, this has been largely ignored due to the range of technical problems associated with deriving quantitative data from historic imagery and the lack of ground control data. This presentation demonstrates how advances in photogrammetric processing and capture of modern aerial photography has allowed this archive to be 'unlocked'. Accurate photogrammetric reconstruction from aerial photographs traditionally requires known ground control points acquired in the field; in remote and inaccessible areas, such as the Antarctic Peninsula, this is often impossible. A method for providing control for historic photos without fieldwork, by linking them to a newly acquired, highly accurate photogrammetric model adjusted through direct kinematic GPS positioning of the camera has been applied to a number of glaciers across the Antarctic Peninsula. This presentation will outline the photogrammetric workflow with focus on the Moider Glacier in the Marguerite Bay region of the western Antarctic Peninsula to investigate the quality of data that can be obtained. Volumetric changes on the glaciers from the 1950s to present day (2015) have been reconstructed and can be used to explore the spatial and temporal changes that have occurred on this glacier. In particular, there is near-annual data over the last 5 years recording a period when there has been

  13. Polymer Nanofibers with Outstanding Thermal Conductivity and Thermal Stability: Fundamental Linkage between Molecular Characteristics and Macroscopic Thermal Properties

    CERN Document Server

    Zhang, Teng; Luo, Tengfei

    2014-01-01

    Polymer nanofibers with high thermal conductivities and outstanding thermal stabilities are highly desirable in heat transfer-critical applications such as thermal management, heat exchangers and energy storage. In this work, we unlock the fundamental relations between the thermal conductivity and thermal stability of polymer nanofibers and their molecular characteristics by studying the temperature-induced phase transitions and thermal transport of a series of polymer nanofibers. Ten different polymer nanofibers with systematically chosen molecular structures are studied using large scale molecular dynamics simulations. We found that high thermal conductivity and good thermal stability can be achieved in polymers with rigid backbones, exemplified by {\\pi}-conjugated polymers, due to suppressed segmental rotations and large phonon group velocities. The low probability of segmental rotation does not only prevent temperature-induced phase transition but also enables long phonon mean free paths due to reduced di...

  14. "解锁工程"精神病患者的社区防治康复护理%The community prevention,therapy and rehabilitation of psychiatric patients undergoing "unlock program"

    Institute of Scientific and Technical Information of China (English)

    张雪静; 骆焕荣

    2008-01-01

    Objective To discuss the effect of community prevention,therapy and rehabilitation for psychiatric patients undergoing "unlock program" and free from captivity. Methods We collected and compared the result for 71 pschiatric patients before and after free from captivity by the Brief Psychiatric Rating Scale(BPRS)and Global Assessment Scale(GAS)according to the work model of the psychiatric prevention,therapy and rehabilitation nursing program which complied with "socialization,comprehension and accessibility". Results After the unlock program the total score of BPRS and GAS greatly dropped to (22.57±3.13)and (80.67±15.57)respectively 2 years later,which were statistically different from those before the attendance of the unlock program (P<0.01). Conclusions The unlock program proved to be a novel and effective nursing program for community prevention,therapy and rehabilitation of psychiatric patients free from captivity.%目的 探讨"解锁工程"后曾经被关锁的精神病患者社区防治康复护理工作效果.方法 按"社会化、综合性、开放式"的精神病社区防治康复护理工作模式,采用简明精神病评定量表(BPRS)和大体评定量表(GAS)进行疗效评定,对曾经被关锁的71例精神病患者在"解锁工程"治疗前后进行比较.结果 71例精神病患者在"解锁工程"后,BPRS总均分显著降低,2年后为(22.57±3.13)分,P<0.01;GAS总均分显著升高,2年后为(80.67±15.57)分,P<0.01.结论 "解锁工程"是一种新的、行之有效的救助被关锁精神病患者的社区防治康复护理工作形式,应积极推广应用.

  15. KeyChains: A Decentralized Public-Key Infrastructure

    Science.gov (United States)

    2006-03-02

    exposed. This problem is easily solved in KeyChains, taking inspiration from existing techniques: certificate expiration, revocation lists and online...the peer. The peer maintains an access control list indicating what operations (key storage, key retrieval, and peer management) are permitted to a...2002, Norfolk, VA, September 2002. [9] http://www.umiacs.umd.edu/˜mmarsh/ CODEX /. [10] A. Datta, M. Hauswirth, and K. Aberer. Beyond ”web of trust

  16. Unlocking the secrets of the δ2 glutamate receptor: A gatekeeper for synaptic plasticity in the cerebellum.

    Science.gov (United States)

    Kohda, Kazuhisa; Kakegawa, Wataru; Yuzaki, Michisuke

    2013-11-01

    Long-term changes in synaptic transmission in the central nervous system, such as long-term potentiation and long-term depression (LTD), are believed to underlie learning and memory in vivo. Despite intensive research, the precise molecular mechanisms underlying these phenomena have remained unclear. LTD is most commonly caused by the endocytosis of postsynaptic AMPA-type glutamate receptors, triggered by activity-induced serine phosphorylation of the GluA2 subunit. Interestingly, cerebellar LTD, which occurs at synapses between parallel fibers (PFs; axons of granule cells) and Purkinje cells, is unique in requiring an additional type of glutamate receptor, the δ2 receptor (GluD2). Cbln1 was recently identified as a GluD2 ligand that regulates PF synapse formation and maintenance. However, how GluD2 induces downstream signaling in Purkinje cells to regulate LTD induction is unknown. We here present evidence that GluD2 reduces the tyrosine phosphorylation level of the GluA2 subunit via PTPMEG, a protein tyrosine phosphatase that binds to GluD2's C-terminus. We also found that the serine phosphorylation of GluA2, a crucial step for AMPA-receptor endocytosis, requires prior tyrosine dephosphorylation. Thus, GluD2 may serve as a gatekeeper for LTD induction by coordinating interactions between GluA2's 2 phosphorylation sites.

  17. Molecular physics

    CERN Document Server

    Williams, Dudley

    2013-01-01

    Methods of Experimental Physics, Volume 3: Molecular Physics focuses on molecular theory, spectroscopy, resonance, molecular beams, and electric and thermodynamic properties. The manuscript first considers the origins of molecular theory, molecular physics, and molecular spectroscopy, as well as microwave spectroscopy, electronic spectra, and Raman effect. The text then ponders on diffraction methods of molecular structure determination and resonance studies. Topics include techniques of electron, neutron, and x-ray diffraction and nuclear magnetic, nuclear quadropole, and electron spin reson

  18. Unlocked Concanavalin A Forms Amyloid-like Fibrils from Coagulation of Long-lived “Crinkled” Intermediates

    Science.gov (United States)

    Vetri, Valeria; Leone, Maurizio; Morozova-Roche, Ludmilla A.; Vestergaard, Bente; Foderà, Vito

    2013-01-01

    Understanding the early events during amyloid aggregation processes is crucial to single out the involved molecular mechanisms and for designing ad hoc strategies to prevent and reverse amyloidogenic disorders. Here, we show that, in conditions in which the protein is positively charged and its conformational flexibility is enhanced, Concanavalin A leads to fibril formation via a non-conventional aggregation pathway. Using a combination of light scattering, circular dichroism, small angle X-ray scattering, intrinsic (Tryptophan) and extrinsic (ANS) fluorescence and confocal and 2-photon fluorescence microscopy we characterize the aggregation process as a function of the temperature. We highlight a multi-step pathway with the formation of an on-pathway long-lived intermediate and a subsequent coagulation of such “crinkled” precursors into amyloid-like fibrils. The process results in a temperature-dependent aggregation-coagulation pathway, with the late phase of coagulation determined by the interplay between hydrophobic and electrostatic forces. Our data provide evidence for the complex aggregation pathway for a protein with a highly flexible native conformation. We demonstrate the possibility to generate a long-lived intermediate whose proportion and occurrence are easily tunable by experimental parameters (i.e. temperature). As a consequence, in the case of aggregation processes developing through well-defined energy barriers, our results can open the way to new strategies to induce more stable in vitro on-pathway intermediate species through a minute change in the initial conformational flexibility of the protein. This will allow isolating and experimentally studying such transient species, often indicated as relevant in neurodegenerative diseases, both in terms of structural and cytotoxic properties. PMID:23874809

  19. An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  20. ZooKeys, unlocking Earth's incredible biodiversity and building a sustainable bridge into the public domain: From "€œprint-based"€ to "web-based" taxonomy, systematics, and natural history

    NARCIS (Netherlands)

    Penev, L.; Erwin, T.; Thompson, F.C.; Sues, H.-D.; Engel, M.S.; Agosti, D.; Pyle, R.; Ivie, M.; Assmann, T.; Henry, T.; Miller, J.; Ananjeva, N.B.; Casale, A.; Lourenco, W.; Golovatch, S.; Fagerholm, H.-P.; Taiti, S.; Alonso-Zarazaga, M.; Nieukerken, van E.

    2008-01-01

    Publishing taxonomic and systematics studies in the digital era faces major challenges and requires new approaches, many of which are currently stimulating spirited discussions amongst taxonomists and systematists. New amendments to the International Code of Zoological Nomenclature are expected to r

  1. The locks and keys to industrial biotechnology.

    Science.gov (United States)

    Wohlgemuth, Roland

    2009-04-01

    The sustainable use of resources by Nature to synthesize the required products at the right place, when they are needed, continues to be the role model for total synthesis and production in general. The combination of molecular and engineering science and technology in the biotechnological approach needs no protecting groups at all and has therefore been established for numerous large-scale routes to both natural and synthetic products in industry. The use of biobased raw materials for chemical synthesis, and the economy of molecular transformations like atom economy and step economy are of growing importance. As safety, health and environmental issues are key drivers for process improvements in the chemical industry, the development of biocatalytic reactions or pathways replacing hazardous reagents is a major focus. The integration of the biocatalytic reaction and downstream processing with product isolation has led to a variety of in situ product recovery techniques and has found numerous successful applications. With the growing collection of biocatalytic reactions, the retrosynthetic thinking can be applied to biocatalysis as well. The introduction of biocatalytic reactions is uniquely suited to cost reductions and higher quality products, as well as to more sustainable processes. The transfer of Nature's simple and robust sensing and control principles as well as its reaction and separation organization into useful technical systems can be applied to different fermentations, biotransformations and downstream processes. Biocatalyst and pathway discovery and development is the key towards new synthetic transformations in industrial biotechnology.

  2. Key Findings for Interpersonal Skills

    Science.gov (United States)

    2013-12-04

    2005). Beyond difference and domination? Intercultural communication in legal contexts. Intercultural discourse and communication . The essential...trainable and consequential to warfighters in being good strangers. These key skills include observing and adapting to variation in communicative norms...warfighters in being good strangers. These key skills include observing and adapting to variation in communicative norms; allowing civilian

  3. Keys to the Natural World.

    Science.gov (United States)

    Misiti, Frank L., Jr.

    1996-01-01

    Presents a lesson that uses the learning cycle to introduce the concept of classification and the use of dichotomous keys to identify plants and animals. Encourages students to become better observers and helps them gain confidence and experience in using simple classification keys. (JRH)

  4. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Harinarayan Tiwari; Nayan Sharma

    2015-10-01

    This paper presents fundamental outcomes from an experimental study on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). Hydrodynamic performance was tested in a circulated open channel that comprised of PKW and sand bed (d50 = 0.25 mm). Instantaneous velocities were measured at 20 cross sections using Laser Doppler Velocimeter (LDV) with constant discharge and depth. Average velocity and turbulence intensities in both directions were investigated. Average longitudinal velocities are found very much consistent at every point and maximum around the midway of inlet key. In transverse direction, flow is bifurcating in two directions which are also confirmed by average transverse velocity estimation. Variation of turbulence intensity presents average 10 times higher transverse turbulence than longitudinal turbulence near inlet key of PKW.

  5. Molecular Dynamics Modeling of Hydrated Calcium-Silicate-Hydrate (CSH) Cement Molecular Structure

    Science.gov (United States)

    2014-08-30

    properties of key hydrated cement constituent calcium-silicate-hydrate (CSH) at the molecular, nanometer scale level. Due to complexity, still unknown...public release; distribution is unlimited. Molecular Dynamics Modeling of Hydrated Calcium-Silicate- Hydrate (CSH) Cement Molecular Structure The views... Cement Molecular Structure Report Title Multi-scale modeling of complex material systems requires starting from fundamental building blocks to

  6. Time-resolved molecular imaging

    Science.gov (United States)

    Xu, Junliang; Blaga, Cosmin I.; Agostini, Pierre; DiMauro, Louis F.

    2016-06-01

    Time-resolved molecular imaging is a frontier of ultrafast optical science and physical chemistry. In this article, we review present and future key spectroscopic and microscopic techniques for ultrafast imaging of molecular dynamics and show their differences and connections. The advent of femtosecond lasers and free electron x-ray lasers bring us closer to this goal, which eventually will extend our knowledge about molecular dynamics to the attosecond time domain.

  7. Slips of the Typewriter Key.

    Science.gov (United States)

    Berg, Thomas

    2002-01-01

    Presents an analysis of 500 submorphemic slips of the typewriter key that escaped the notice of authors and other proofreaders and thereby made their way into the published records of scientific research. (Author/VWL)

  8. Secret Key Generation From Mobility

    CERN Document Server

    Gungor, Onur; Koksal, C Emre

    2011-01-01

    We consider secret key generation from relative localization information of a pair of nodes in a mobile wireless network in the presence of a mobile eavesdropper. Our scheme consists of two phases: in the first phase, legitimate node pair exchanges beacon signals to establish localization information based on noisy observations of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can be categorized under the source models of information theoretic secrecy, where the distance between the legitimate nodes acts as the observed common randomness. We characterize the achievable secret key bit rate in terms of the observation noise variance at the legitimate nodes and the eavesdropper. This work provides a framework that combines information theoretic secrecy and wireless localization, and proves that the localization information provides a significant additional resource for secret key generation in mobile wireless networks.

  9. Security of Quantum Key Distribution

    CERN Document Server

    Renner, R

    2005-01-01

    We propose various new techniques in quantum information theory, including a de Finetti style representation theorem for finite symmetric quantum states. As an application, we give a proof for the security of quantum key distribution which applies to arbitrary protocols.

  10. Key Statistics for Thyroid Cancer

    Science.gov (United States)

    ... and Treatment? Thyroid Cancer About Thyroid Cancer Key Statistics for Thyroid Cancer How common is thyroid cancer? ... remains very low compared with most other cancers. Statistics on survival rates for thyroid cancer are discussed ...

  11. Wiki keys on mobile devices

    OpenAIRE

    Weber, Gisela; Hagedorn, Gregor

    2010-01-01

    The development of increasingly powerful mobile devices like PDAs (Personal Digital Assistants) and Smartphones, with larger displays and greater resolution makes them increasingly suitable for identification tools available directly “in the field”. One of several approaches towards this aim in the KeyToNature project is based on wiki-stored documents. Important features of wiki-based keys, such as hidden text and media information as well as links to glossary entries are su...

  12. Finite-key security analysis for multilevel quantum key distribution

    Science.gov (United States)

    Brádler, Kamil; Mirhosseini, Mohammad; Fickler, Robert; Broadbent, Anne; Boyd, Robert

    2016-07-01

    We present a detailed security analysis of a d-dimensional quantum key distribution protocol based on two and three mutually unbiased bases (MUBs) both in an asymptotic and finite-key-length scenario. The finite secret key rates (in bits per detected photon) are calculated as a function of the length of the sifted key by (i) generalizing the uncertainly relation-based insight from BB84 to any d-level 2-MUB QKD protocol and (ii) by adopting recent advances in the second-order asymptotics for finite block length quantum coding (for both d-level 2- and 3-MUB QKD protocols). Since the finite and asymptotic secret key rates increase with d and the number of MUBs (together with the tolerable threshold) such QKD schemes could in principle offer an important advantage over BB84. We discuss the possibility of an experimental realization of the 3-MUB QKD protocol with the orbital angular momentum degrees of freedom of photons.

  13. DNA based random key generation and management for OTP encryption.

    Science.gov (United States)

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  14. Magnetismo Molecular (Molecular Magentism)

    Energy Technology Data Exchange (ETDEWEB)

    Reis, Mario S [Universidade Federal Fluminense, Brasil; Moreira Dos Santos, Antonio F [ORNL

    2010-07-01

    The new synthesis processes in chemistry open a new world of research, new and surprising materials never before found in nature can now be synthesized and, as a wonderful result, observed a series of physical phenomena never before imagined. Among these are many new materials the molecular magnets, the subject of this book and magnetic properties that are often reflections of the quantum behavior of these materials. Aside from the wonderful experience of exploring something new, the theoretical models that describe the behavior these magnetic materials are, in most cases, soluble analytically, which allows us to know in detail the physical mechanisms governing these materials. Still, the academic interest in parallel this subject, these materials have a number of properties that are promising to be used in technological devices, such as in computers quantum magnetic recording, magnetocaloric effect, spintronics and many other devices. This volume will journey through the world of molecular magnets, from the structural description of these materials to state of the art research.

  15. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  16. Statistical mechanics approach to lock-key supramolecular chemistry interactions.

    Science.gov (United States)

    Odriozola, Gerardo; Lozada-Cassou, Marcelo

    2013-03-08

    In the supramolecular chemistry field, intuitive concepts such as molecular complementarity and molecular recognition are used to explain the mechanism of lock-key associations. However, these concepts lack a precise definition, and consequently this mechanism is not well defined and understood. Here we address the physical basis of this mechanism, based on formal statistical mechanics, through Monte Carlo simulation and compare our results with recent experimental data for charged or uncharged lock-key colloids. We find that, given the size range of the molecules involved in these associations, the entropy contribution, driven by the solvent, rules the interaction, over that of the enthalpy. A universal behavior for the uncharged lock-key association is found. Based on our results, we propose a supramolecular chemistry definition.

  17. Key distribution in PKC through Quantas

    CERN Document Server

    Goel, Aditya

    2010-01-01

    Cryptography literally means "The art & science of secret writing & sending a message between two parties in such a way that its contents cannot be understood by someone other than the intended recipient". and Quantum word is related with "Light". Thus, Quantum Cryptography is a way of descripting any information in the form of quantum particles. There are no classical cryptographic systems which are perfectly secure. In contrast to Classical cryptography which depends upon Mathematics, Quantum Cryptography utilizes the concepts of Quantum Physics which provides us the security against the cleverest marauders of the present age. In the view of increasing need of Network and Information Security, we do require methods to overcome the Molecular Computing technologies (A future technology) and other techniques of the various codebrakers. Both the parts i.e. Quantum Key distribution and Information transference from Sender to Receiver are much efficient and secure. It is based upon BB84 protocol. It can b...

  18. Biocatalysis--key to sustainable industrial chemistry.

    Science.gov (United States)

    Wohlgemuth, Roland

    2010-12-01

    The ongoing trends to process improvements, cost reductions and increasing quality, safety, health and environment requirements of industrial chemical transformations have strengthened the translation of global biocatalysis research work into industrial applications. One focus has been on biocatalytic single-step reactions with one or two substrates, the identification of bottlenecks and molecular as well as engineering approaches to overcome these bottlenecks. Robust industrial procedures have been established along classes of biocatalytic single-step reactions. Multi-step reactions and multi-component reactions (MCRs) enable a bottom-up approach with biocatalytic reactions working together in one compartment and recations hindering each other within different compartments or steps. The understanding of the catalytic functions of known and new enzymes is key for the development of new sustainable chemical transformations.

  19. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  20. Key Revocation System for DNSSEC

    Directory of Open Access Journals (Sweden)

    Gilles Guette

    2008-06-01

    Full Text Available The Doma in Name System (DNS is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions (DNSSEC has been designed to protect the DNS protocol using public key cryptography and digital signatures. In this paper, we show how DNSSEC can be attacked using compromised keys and the consequences of such attacks. Then, we propose a new revocation scheme for DNSSEC based on two new resource records. There is currently no revocation system defined in the DNSSEC standard.

  1. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  2. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  3. Unlocking the Will To Learn.

    Science.gov (United States)

    Johnston, Christine A.

    This book describes a comprehensive strategy for getting to know students learning behaviors and includes everything from theoretical constructs to projects for classroom use. Glosses direct the reader to further information on subjects discussed in the book: cognitive science, brain science, learning styles, multiple intelligences, and…

  4. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  5. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so...

  6. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  7. Key Skills Influencing Student Achievement

    Science.gov (United States)

    Balch, Tonya; Gruenert, Steve

    2009-01-01

    A predictive, non-experimental, cross-sectional design (Johnson, 2001) was used to conduct a study to determine if elementary administrators' key counseling skills and select demographics predicted state-level student performance indicators in their respective schools. A secondary purpose of this study was to develop a valid and reliable on-line…

  8. Ten Keys to the Portal

    Science.gov (United States)

    Schaffhauser, Dian

    2011-01-01

    Successful web portals help users stay informed, in touch, and up to speed. They are also a telling window into the efficiency of one's institution. To develop a cutting-edge portal takes planning, communication, and research. In this article, the author presents and discusses 10 keys to portal success: (1) make critical info visible; (2) make the…

  9. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  10. Overview, conclusions, and key recommendations

    NARCIS (Netherlands)

    Loeber, R.; Farrington, D.P.; Howell, J.C.; Hoeve, M.; Loeber, R.; Farrington, D.P.

    2012-01-01

    Section I of this chapter summarizes the most important points of Chapters 2 to 5 and relevant portions of Chapter 10 (which concerns European issues) by addressing key findings that are relevant for juveniles’ transition of offending from adolescence (up to age 18) into adulthood. Section I focuses

  11. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken...

  12. Molecular Plasmonics

    Science.gov (United States)

    Wilson, Andrew J.; Willets, Katherine A.

    2016-06-01

    In this review, we survey recent advances in the field of molecular plasmonics beyond the traditional sensing modality. Molecular plasmonics is explored in the context of the complex interaction between plasmon resonances and molecules and the ability of molecules to support plasmons self-consistently. First, spectroscopic changes induced by the interaction between molecular and plasmonic resonances are discussed, followed by examples of how tuning molecular properties leads to active molecular plasmonic systems. Next, the role of the position and polarizability of a molecular adsorbate on surface-enhanced Raman scattering signals is examined experimentally and theoretically. Finally, we introduce recent research focused on using molecules as plasmonic materials. Each of these examples is intended to highlight the role of molecules as integral components in coupled molecule-plasmon systems, as well as to show the diversity of applications in molecular plasmonics.

  13. Key drivers of airline loyalty

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-01-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty. PMID:27064618

  14. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  15. Key to Language Learning Success

    OpenAIRE

    2015-01-01

    This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these rol...

  16. Key Questions in Thoracic Surgery

    OpenAIRE

    Subotic, Dragan R.

    2016-01-01

    This 1000-page textbook encompasses much more than the title suggests. In fact, the title “Key questions in thoracic surgery and pulmonology” would be more fitting. The specific format of the book, with precise questions and evidence-based, but equally clear answers covering all relevant fields of pulmonology and thoracic surgery, makes this 40-chapter book a “must read” not only for residents, but also for senior pulmonologists and thoracic surgeons.

  17. Innovation, Key to Lasting Success

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ Oerlikon Textile will be exhibiting at ITMA ASIA 2010 in Shanghai on its 750- -plus stand C 51/C 52 in hall W2 from 22 to 26 June 2010. Highlights of the five brands under the umbrella of the textile machinery manufacturer include the new Autoconer X5 winding machine, a new FDY technology and the Era embroidery machine. Their technological innovations illustrate the slogan under which Oerlikon Textile is appearing at the show: Innovation remains the key to success.

  18. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  19. Molecular imaging in oncology

    Energy Technology Data Exchange (ETDEWEB)

    Schober, Otmar; Riemann, Burkhard (eds.) [Universitaetsklinikum Muenster (Germany). Klinik fuer Nuklearmedizin

    2013-02-01

    Considers in detail all aspects of molecular imaging in oncology, ranging from basic research to clinical applications in the era of evidence-based medicine. Examines technological issues and probe design. Discusses preclinical studies in detail, with particular attention to multimodality imaging. Presents current clinical use of PET/CT, SPECT/CT, and optical imagingWritten by acknowledged experts. The impact of molecular imaging on diagnostics, therapy, and follow-up in oncology is increasing significantly. The process of molecular imaging includes key biotarget identification, design of specific molecular imaging probes, and their preclinical evaluation, e.g., in vivo using small animal studies. A multitude of such innovative molecular imaging probes have already entered clinical diagnostics in oncology. There is no doubt that in future the emphasis will be on multimodality imaging in which morphological, functional, and molecular imaging techniques are combined in a single clinical investigation that will optimize diagnostic processes. This handbook addresses all aspects of molecular imaging in oncology, ranging from basic research to clinical applications in the era of evidence-based medicine. The first section is devoted to technology and probe design, and examines a variety of PET and SPECT tracers as well as multimodality probes. Preclinical studies are then discussed in detail, with particular attention to multimodality imaging. In the third section, diverse clinical applications are presented, and the book closes by looking at future challenges. This handbook will be of value to all who are interested in the revolution in diagnostic oncology that is being brought about by molecular imaging.

  20. Molecular dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Ladd, A.J.C.

    1988-08-01

    The basic methodology of equilibrium molecular dynamics is described. Examples from the literature are used to illustrate how molecular dynamics has been used to resolve theoretical controversies, provide data to test theories, and occasionally to discover new phenomena. The emphasis is on the application of molecular dynamics to an understanding of the microscopic physics underlying the transport properties of simple fluids. 98 refs., 4 figs.

  1. Molecular pharmacognosy

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    This article analyzes the background and significance of molecular pharmacognosy,including the molecular identification of medicinal raw materials,phylogenetic evolution of medicinal plants and animals,evaluation and preservation of germplasm resources for medicinal plants and animals,etiology of endangerment and protection of endangered medicinal plants and animals,biosynthesis and bioregulation of active components in medicinal plants,and characteristics and the molecular bases of top-geoherbs.

  2. Molecular Spintronics

    OpenAIRE

    Shiraishi, Masashi; Ikoma, Tadaaki

    2011-01-01

    Molecular spintronics is recognized to as an attractive new research direction in a field of spintronics, following to metallic spintronics and inorganic semiconductor spintronics, and attracts many people in recent decades. The purpose of this manuscript is to describe the history of molecular spintronics by introducing important achievements and to show the current status of this field. In addition, the authors briefly introduce several theories for implementing studies in molecular spintro...

  3. Key Obama officials leave administration

    Science.gov (United States)

    Showstack, Randy

    2013-01-01

    Secretary of the Interior Ken Salazar is one of the latest members of the Obama administration to announce that he is leaving his position near the start of President Obama's second term in office. Salazar, who has served as interior secretary since January 2009, intends to leave the department by the end of March, the department noted on 16 January. Salazar joins a number of other key officials who are planning to leave the administration. They include Environmental Protection Agency administrator Lisa Jackson, National Oceanic and Atmospheric Administration administrator Jane Lubchenco, and U.S. Geological Survey director Marcia McNutt.

  4. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  5. Key paediatric messages from Amsterdam

    Directory of Open Access Journals (Sweden)

    Jonathan Grigg

    2016-04-01

    Full Text Available The Paediatric Assembly of the European Respiratory Society (ERS maintained its high profile at the 2015 ERS International Congress in Amsterdam. There were symposia on preschool wheeze, respiratory sounds and cystic fibrosis; an educational skills workshop on paediatric respiratory resuscitation; a hot topic session on risk factors and early origins of respiratory diseases; a meet the expert session on paediatric lung function test reference values; and the annual paediatric grand round. In this report the Chairs of the Paediatric Assembly's Groups highlight the key messages from the abstracts presented at the Congress.

  6. Key energy technologies for Europe

    DEFF Research Database (Denmark)

    Jørgensen, B.H.

    2005-01-01

    This report on key energy technologies is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. Senior Scientist BirteHolst Jørgensen, Risø National Laboratory......, is responsible for the report, which is based on literature studies. Post Doc Stefan Krüger Nielsen, Risø National Laboratory, has contributed to parts of the report, including the description of the IEA energyscenarios, the IEA statistics on R&D and the description of the science and technology base of biomass...

  7. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  8. A review of molecular biomarkers for bladder cancer

    African Journals Online (AJOL)

    McRoy

    reached to integrate molecular staging in to the current TNM staging system. Key words: Molecular markers, ..... Clinical and laboratory science had shown that there are two .... statistics registration: registration of cancers diagnosed in 2008. 2.

  9. Authenticated Key Agreement in Group Settings

    Institute of Scientific and Technical Information of China (English)

    LI Ming; WANG Yong; GU Da-wu; BAI Ying-cai

    2006-01-01

    An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings.

  10. Scientists Take a Close-Up of Key Pain-Sensing Molecule

    Science.gov (United States)

    ... piece to unlocking the pain puzzle,” says Linda Porter, Ph.D., a leader of the Pain Consortium ... if you completely close the channel,” explains Dr. Porter, “you also lose the protective sensing of heat. ...

  11. [Key morphofunctional transformations in the evolution of chiropterans (Bats, Chiroptera)].

    Science.gov (United States)

    Kovaleva, I M

    2014-01-01

    Study on the morphology and morphogenesis of wing membranes in Bats has revealed some peculiarities in their structure and development. Understanding the embryogenesis of these animals, as well as attraction of data obtained on their molecular genetics and paleontology, allows one to single out some factors that could have initiated evolutionary modifications in development programs. A scenario of the key morphofunctional transformations in the forelimbs during the evolution of chiropterans is given.

  12. Effects of Bushen Yifei Xiaozheng Decoction on the expression of key mo-lecular genes and proteins in Caspase-12 signaling pathway in IPF rats%补肾益肺消癥方对特发性肺纤维化大鼠Caspase-12信号通路关键分子基因和蛋白表达的影响

    Institute of Scientific and Technical Information of China (English)

    杨颖溪; 柴立民; 吴甜甜; 高伟华; 朱紫亨; 徐昉; 余佳骏; 晏军

    2016-01-01

    Objective To investigate the effects of Bushen Yifei Xiaozheng Decoction ( kidney-tonifying lung-boosting stasis-resolving decoction ) on the expression of key genes and proteins in Casepase-12 signaling pathways in rats with idiopathic pulmonary fibrosis ( IPF ) .Methods IPF was induced with bleomycin in rats except for the normal group .Pirfenidone was used as positive control , while Bushen Yifei Xiaozheng Decoction ( TCM ) was administered during ( TCM preventive group ) and after ( TCM treatment group ) the model established and throughout the whole experiment ( TCM preventive and treat-ment group ) .Pathological change in the rat lungs was observed with Masson staining , meanwhile the ex-pression of molecular genes and proteins involved in Caspase-12 signaling pathways was detected by using Western blot and Real-time PCR.Results Masson staining revealed that the degree of fibrosis in TCM groups improved significantly and alveolar structure changed little . Protein and gene expression of Caspase-12 pathway in the model group was higher than those of normal group (P<0.05).In addition, the protein and gene expression of pirfenidone group and TCM groups were less than the model group ( P<0.05 or P<0.01), especially TCM preventive and treatment group .Conclusion Bushen Yifei Xi-aozheng Decoction could inhibit the process of pulmonary fibrosis via acting on the gene expression of Caspase-12 pathway and releasing the endoplasmic reticulum stress .%目的:探讨补肾益肺消癥方干预特发性肺纤维化大鼠含半胱氨酸的天冬氨酸蛋白水解酶( Caspase )-12信号通路关键分子基因和蛋白表达的作用机制。方法以博莱霉素造大鼠肺纤维化模型。吡非尼酮作为阳性对照药物,补肾益肺消癥方分别于造模中(预防组)、造模后(治疗组)及实验全程(防治组)进行干预。 Masson染色观察大鼠病变肺组织纤维化改变的程度,Western blot、Real-time PCR

  13. Molecular dynamics

    NARCIS (Netherlands)

    Bergstra, J.A.; Bethke, I.

    2002-01-01

    Molecular dynamics is a model for the structure and meaning of object based programming systems. In molecular dynamics the memory state of a system is modeled as a fluid consisting of a collection of molecules. Each molecule is a collection of atoms with bindings between them. A computation is model

  14. Some keys to reread authority.

    Directory of Open Access Journals (Sweden)

    Edgar Straehle

    2015-12-01

    Full Text Available This article vindicates a rereading of the concept of authority and tries to dissociate this concept from the concept of power in order to undo their identification and thereby the oblivion of the specific nature (or the history of authority. Besides, this rereading must not be confused with an apology of authority but with an exploration about this complicated and ambivalent category. The key point of this distinction lies in that authority, unlike power, depends not on itself but on the other person, the person who acknowledges another one as authority. Therefore, authority can be compatible with freedom and can appear as an exteriority of power, which undermines it or even becomes a counterpower. Hence the logical endeavours of power to monopolize and instrumentalize authority.

  15. Quantum Public-Key Cryptosystem

    Science.gov (United States)

    Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian

    2012-03-01

    Quantum one-way functions play a fundamental role in cryptography because of its necessity for the secure encryption schemes taking into account the quantum computer. In this paper our purpose is to establish a theoretical framework for a candidate of the quantum one-way functions and quantum trapdoor functions based on one-parameter unitary groups. The dynamics of parameterized unitary groups ensure the one-wayness and quantum undistinguishability in different levels, and the physical feasibility are derived from the simultaneous approximation of its infinitesimal generators. Moreover, these special functions are used to construct new cryptosystems-the quantum public-key cryptosystems for encrypting both the classical and quantum information.

  16. Key to Language Learning Success

    Directory of Open Access Journals (Sweden)

    Oktavian Mantiri

    2015-01-01

    Full Text Available This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these roles and nurture the best possible ways where language teaching and learning will thrive. This paper also suggested that both stake-holders should be open to holistic approach of language learning and that other factors such as the environment could play an important part in language teaching and learning success.

  17. Key Aspects of Wave Energy

    DEFF Research Database (Denmark)

    Margheritini, Lucia; Nørgaard, Jørgen Harck

    2012-01-01

    Diversification of renewable energy sources is fundamental to ensure sustainability. In this contest, wave energy can provide a substantial contribution as soon as the sector breaks into the market. In order to accelerate shift from a technology to a market focus and reduce technical and non...... be used as a breakwater therefore providing a solid structure for harbor protection; the Wave Star can be used as a base for offshore wind and photovoltaic installation in the middle of the sea, realizing an hybrid renewable energy platform. It is the authors´ believe that taking wave energy devices......-technical risks, it is critical to provide comprehensive and reliable information on the technologies without neglecting attractive advantages. It is possible to underline a different key of lecture of wave energy performance by considering efficiency and power production as well as device versatility...

  18. Applied public-key steganography

    Science.gov (United States)

    Guillon, Pierre; Furon, Teddy; Duhamel, Pierre

    2002-04-01

    We consider the problem of hiding information in a steganographic framework, i.e. embedding a binary message within an apparently innocuous content, in order to establish a suspicion-free digital communication channel. The adversary is passive as no intentional attack is foreseen. The only threat is that she discovers the presence of a hidden communication. The main goal of this article is to find if the Scalar Costa Scheme, a recently published embedding method exploiting side information at the encoder, is suitable for that framework. We justify its use assessing its security level with respect to the Cachin's criterion. We derive a public-key stego-system following the ideas of R. Anderson and P. Petitcolas. This technique is eventually applied to PCM audio contents. Experimental performances are detailed in terms of bit-rate and Kullback-Leibler distance.

  19. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  20. New Weak Keys in RSA

    Institute of Scientific and Technical Information of China (English)

    WANG Baocang; LIU Shuanggen; HU Yupu

    2006-01-01

    The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown that the RSA number n=pq can be easily factored if p and q have the special form of p=as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q).

  1. Key energy technologies for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO{sub 2} capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  2. Key Exoplanets in the Era of JWST

    Science.gov (United States)

    Batalha, Natasha; Mandell, Avi; Lewis, Nikole K.; Pontoppidan, Klaus

    2017-01-01

    In 2018, exoplanet science will enter a new era with the launch of the James Webb Space Telescope (JWST). With JWST's observing power, several studies have sought to characterize how the instruments will perform and what atmospheric spectral features could theoretically be detected using transmission spectroscopy. With just two years left until launch, it is imperative that the exoplanet community begins to digest and integrate these studies into their observing plans and strategies. In order to encourage this and to allow all members of the community access to JWST simulations, we present here an open source tool for creating observation simulations of all observatory-supported time-series spectroscopy modes. We describe our tool, PandExo and use it to calculate the expected signal-to-noise ratio (SNR) for every confirmed planetary system with Jhours are needed to attain a SNR of 5 on key molecular absorption bands of H2O, CH4, and CO. We end by determining the number of planets (hot Jupiters, warm Neptunes, super-Earths, etc.) that are currently attainable with JWST.

  3. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee....

  4. SLAR image interpretation keys for geographic analysis

    Science.gov (United States)

    Coiner, J. C.

    1972-01-01

    A means for side-looking airborne radar (SLAR) imagery to become a more widely used data source in geoscience and agriculture is suggested by providing interpretation keys as an easily implemented interpretation model. Interpretation problems faced by the researcher wishing to employ SLAR are specifically described, and the use of various types of image interpretation keys to overcome these problems is suggested. With examples drawn from agriculture and vegetation mapping, direct and associate dichotomous image interpretation keys are discussed and methods of constructing keys are outlined. Initial testing of the keys, key-based automated decision rules, and the role of the keys in an information system for agriculture are developed.

  5. A novel key management scheme using biometrics

    Science.gov (United States)

    Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai

    2010-04-01

    Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.

  6. Community rehabilitations of patients with schizophrenia in "unlock program"%“解锁工程”精神分裂症患者社区康复效果观察

    Institute of Scientific and Technical Information of China (English)

    邓筱璇; 郑晓聪; 杨惠青; 骆焕荣; 黄群明

    2012-01-01

    目的 探讨“解锁工程”精神分裂症患者社区康复效果.方法 对“解锁工程”122例精神分裂症患者进行5年的社区治疗和康复护理,于出院前1周和社区康复每年采用简明精神病评定量表(brief psychiatric rating scale,BPRS)、大体评定量表(global assessment scale,GAS)和社会功能缺陷筛选量表(social disability screening schedule,SDSS)进行评定.了解患者5年社区治疗和康复护理后精神症状、病情情况、社会功能及服药方式、治疗依从性状况.结果 患者每年BPRS、GAS及SDSS得分与出院前比较,均P<0.001,差异具有统计学意义,均优于出院前;服药方式、治疗依从性5年比较,均P< 0.05,差异具有统计学意义,随着年限的增加,用药方式、治疗依从性逐渐改善.结论 社区康复护理能改善“解锁工程”精神分裂症患者的精神症状,提高其社会功能.%Objective To explore the community rehabilitation effects of unlock schizophrenia patients. Methods The 122 patients with schizophrenia received community-based treatment and rehabilitation for 5 years and were followed up regularly. The psychiatric symptoms, disease conditions, social function, treatment behavior and treatment compliance were investigated one week prior to discharge and annually for the 5 years using BPRS, GAS and SDSS. Results The annual score by BPRS, GAS and SDSS was markedly decreased compared to pre-discharge (P < 0.001). The treatment behavior and the treatment compliance within the five years were both improved year by year (P < 0.05). Conclusion The community rehabilitation can improve the psychotic symptoms of unlock schizophrenia patients as well as the social function.

  7. Molecular geometry

    CERN Document Server

    Rodger, Alison

    1995-01-01

    Molecular Geometry discusses topics relevant to the arrangement of atoms. The book is comprised of seven chapters that tackle several areas of molecular geometry. Chapter 1 reviews the definition and determination of molecular geometry, while Chapter 2 discusses the unified view of stereochemistry and stereochemical changes. Chapter 3 covers the geometry of molecules of second row atoms, and Chapter 4 deals with the main group elements beyond the second row. The book also talks about the complexes of transition metals and f-block elements, and then covers the organometallic compounds and trans

  8. Molecular Haeckel.

    Science.gov (United States)

    Elinson, Richard P; Kezmoh, Lorren

    2010-07-01

    More than a century ago, Ernst Haeckel created embryo drawings to illustrate the morphological similarity of vertebrate early embryos. These drawings have been both widely presented and frequently criticized. At the same time that the idea of morphological similarity was recently attacked, there has been a growing realization of molecular similarities in the development of tissues and organs. We have surveyed genes expressed in vertebrate embryos, and we have used them to construct drawings that we call Molecular Haeckels. The Molecular Haeckels emphasize that, based on gene expression, there is a greater similarity among vertebrate embryos than even Haeckel might have imagined. (c) 2010 Wiley-Liss, Inc.

  9. "Having choices is the key".

    Science.gov (United States)

    Ogunleye, B

    1996-08-01

    When Chief Bisi Ogunleye was appointed Nigeria's Minister of Agriculture, the US-educated daughter of a tribal chief still believed that most Nigerian farmers were men. As she traveled throughout the country fulfilling her role, she met a group of women who wanted to start a palm oil and casaba processing plant but lacked the means to get a start-up loan. Chief Ogunleye's efforts to get officials to issue a loan were ridiculed, so she asked her husband to allow her to donate part of her salary to the women. With the $45 from the chief, the women began business and within 3 months had 6 times the original amount. This money was used to help other 6 other women's groups start businesses. By 1985, these efforts were so successful that the chief resigned her government job and founded the Country Women's Association of Nigeria, which has been successful in helping women because it realizes that the most important key to empowerment is having choices.

  10. Molecular Electronics

    DEFF Research Database (Denmark)

    Jennum, Karsten Stein

    This thesis includes the synthesis and characterisation of organic compounds designed for molecular electronics. The synthesised organic molecules are mainly based on two motifs, the obigo(phenyleneethynylenes) (OPE)s and tetrathiafulvalene (TTF) as shown below. These two scaffolds (OPE and TTF......) are chemically merged together to form cruciform-like structures that are an essential part of the thesis. The cruciform molecules were subjected to molecular conductance measurements to explore their capability towards single-crystal field-effect transistors (Part 1), molecular wires, and single electron......, however, was obtained by a study of a single molecular transistor. The investigated OPE5-TTF compound was captured in a three-terminal experiment, whereby manipulation of the molecule’s electronic spin was possible in different charge states. Thus, we demonstrated how the cruciform molecules could...

  11. Molecular Electronics

    DEFF Research Database (Denmark)

    Jennum, Karsten Stein

    ) are chemically merged together to form cruciform-like structures that are an essential part of the thesis. The cruciform molecules were subjected to molecular conductance measurements to explore their capability towards single-crystal field-effect transistors (Part 1), molecular wires, and single electron......This thesis includes the synthesis and characterisation of organic compounds designed for molecular electronics. The synthesised organic molecules are mainly based on two motifs, the obigo(phenyleneethynylenes) (OPE)s and tetrathiafulvalene (TTF) as shown below. These two scaffolds (OPE and TTF......, however, was obtained by a study of a single molecular transistor. The investigated OPE5-TTF compound was captured in a three-terminal experiment, whereby manipulation of the molecule’s electronic spin was possible in different charge states. Thus, we demonstrated how the cruciform molecules could...

  12. [Molecular imaging].

    Science.gov (United States)

    Turetschek, K; Wunderbaldinger, P

    2002-01-01

    The disclosure of the human genoma, the progress in understanding of diseases on molecular and cellular levels, the discovery of new disease-specific targets, and the development of new medications will revolutionize our understanding of the etiology and the treatment of many disease entities. Radiologists are faced with a paradigm shift from unspecific to specific molecular imaging techniques as well as with enormous speed in the development of new methods and should be enrolled actively in this field of medicine.

  13. KEY TOPICS IN SPORTS MEDICINE

    Directory of Open Access Journals (Sweden)

    Amir Ali Narvani

    2006-12-01

    Full Text Available Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1 Sports injuries, rehabilitation and injury prevention, 2 Exercise physiology, fitness testing and training, 3 Drugs in sport, 4 Exercise and health promotion, 5 Sport and exercise for special and clinical populations, 6 The psychology of performance and injury. PURPOSE The Key Topics format provides extensive, concise information in an accessible, easy-to-follow manner. AUDIENCE The book is targeted the students and specialists in sports medicine and rehabilitation, athletic training, physiotherapy and orthopaedic surgery. The editors are authorities in their respective fields and this handbook depends on their extensive experience and knowledge accumulated over the years. FEATURES The book contains the information for clinical guidance, rapid access to concise details and facts. It is composed of 99 topics which present the information in an order that is considered logical and progressive as in most texts. Chapter headings are: 1. Functional Anatomy, 2. Training Principles / Development of Strength and Power, 3. Biomechanical Principles, 4. Biomechanical Analysis, 5. Physiology of Training, 6. Monitoring of Training Progress, 7. Nutrition, 8. Hot and Cold Climates, 9. Altitude, 10. Sport and Travelling, 11. Principles of Sport Injury Diagnosis, 12. Principles of Sport and Soft Tissue Management, 13. Principles of Physical Therapy and Rehabilitation, 14. Principles of Sport Injury Prevention, 15. Sports Psychology, 16. Team Sports, 17. Psychological Aspects of Injury in Sport, 18. Injury Repair Process, 19. Basic Biomechanics of Tissue Injury, 20. Plain Film Radiography in Sport, 21. Nuclear Medicine, 22. Diagnostic Ultrasound, 23. MRI Scan, 24. Other Imaging, 5. Head Injury, 26. Eye

  14. Key issues in transplant tourism.

    Science.gov (United States)

    Akoh, Jacob A

    2012-02-24

    Access to organ transplantation depends on national circumstances, and is partly determined by the cost of health care, availability of transplant services, the level of technical capacity and the availability of organs. Commercial transplantation is estimated to account for 5%-10% (3500-7000) of kidney transplants performed annually throughout the world. This review is to determine the state and outcome of renal transplantation associated with transplant tourism (TT) and the key challenges with such transplantation. The stakeholders of commercial transplantation include: patients on the waiting lists in developed countries or not on any list in developing countries; dialysis funding bodies; middlemen, hosting transplant centres; organ-exporting countries; and organ vendors. TT and commercial kidney transplants are associated with a high incidence of surgical complications, acute rejection and invasive infection which cause major morbidity and mortality. There are ethical and medical concerns regarding the management of recipients of organs from vendors. The growing demand for transplantation, the perceived failure of altruistic donation in providing enough organs has led to calls for a legalised market in organ procurement or regulated trial in incentives for donation. Developing transplant services worldwide has many benefits - improving results of transplantation as they would be performed legally, increasing the donor pool and making TT unnecessary. Meanwhile there is a need to re-examine intrinsic attitudes to TT bearing in mind the cultural and economic realities of globalisation. Perhaps the World Health Organization in conjunction with The Transplantation Society would set up a working party of stakeholders to study this matter in greater detail and make recommendations.

  15. Introduction strategies raise key questions.

    Science.gov (United States)

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  16. Molecular water oxidation catalysis

    CERN Document Server

    Llobet, Antoni

    2014-01-01

    Photocatalytic water splitting is a promising strategy for capturing energy from the sun by coupling light harvesting and the oxidation of water, in order to create clean hydrogen fuel. Thus a deep knowledge of the water oxidation catalysis field is essential to be able to come up with useful energy conversion devices based on sunlight and water splitting. Molecular Water Oxidation Catalysis: A Key Topic for New Sustainable Energy Conversion Schemes presents a comprehensive and state-of-the-art overview of water oxidation catalysis in homogeneous phase, describing in detail the most importan

  17. Molecular fountain.

    Energy Technology Data Exchange (ETDEWEB)

    Strecker, Kevin E.; Chandler, David W.

    2009-09-01

    A molecular fountain directs slowly moving molecules against gravity to further slow them to translational energies that they can be trapped and studied. If the molecules are initially slow enough they will return some time later to the position from which they were launched. Because this round trip time can be on the order of a second a single molecule can be observed for times sufficient to perform Hz level spectroscopy. The goal of this LDRD proposal was to construct a novel Molecular Fountain apparatus capable of producing dilute samples of molecules at near zero temperatures in well-defined user-selectable, quantum states. The slowly moving molecules used in this research are produced by the previously developed Kinematic Cooling technique, which uses a crossed atomic and molecular beam apparatus to generate single rotational level molecular samples moving slowly in the laboratory reference frame. The Kinematic Cooling technique produces cold molecules from a supersonic molecular beam via single collisions with a supersonic atomic beam. A single collision of an atom with a molecule occurring at the correct energy and relative velocity can cause a small fraction of the molecules to move very slowly vertically against gravity in the laboratory. These slowly moving molecules are captured by an electrostatic hexapole guiding field that both orients and focuses the molecules. The molecules are focused into the ionization region of a time-of-flight mass spectrometer and are ionized by laser radiation. The new molecular fountain apparatus was built utilizing a new design for molecular beam apparatus that has allowed us to miniaturize the apparatus. This new design minimizes the volumes and surface area of the machine allowing smaller pumps to maintain the necessary background pressures needed for these experiments.

  18. History of the molecular biology of cytomegaloviruses.

    Science.gov (United States)

    Stinski, Mark F

    2014-01-01

    The history of the molecular biology of cytomegaloviruses from the purification of the virus and the viral DNA to the cloning and expression of the viral genes is reviewed. A key genetic element of cytomegalovirus (the CMV promoter) contributed to our understanding of eukaryotic cell molecular biology and to the development of lifesaving therapeutic proteins. The study of the molecular biology of cytomegaloviruses also contributed to the development of antivirals to control the viral infection.

  19. Electronic Nicotine Delivery Systems Key Facts Infographic

    Data.gov (United States)

    U.S. Department of Health & Human Services — Explore the Electronic Nicotine Delivery Systems Key Facts Infographic which outlines key facts related to electronic nicotine delivery systems (ENDS), including...

  20. Using rational numbers to key nested sets

    CERN Document Server

    Hazel, Dan

    2008-01-01

    This report details the generation and use of tree node ordering keys in a single relational database table. The keys for each node are calculated from the keys of its parent, in such a way that the sort order places every node in the tree before all of its descendants and after all siblings having a lower index. The calculation from parent keys to child keys is simple, and reversible in the sense that the keys of every ancestor of a node can be calculated from that node's keys without having to consult the database. Proofs of the above properties of the key encoding process and of its correspondence to a finite continued fraction form are provided.

  1. Tingzikou key water control project started construction

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Tingzikou key water control project on Jialing River, one of 18 newly started key projects in 2009 for China's western part development program, formally started construction at the end of November last year.

  2. Attaching Chuck Keys to Machine Tools

    Science.gov (United States)

    Richardson, V.

    1984-01-01

    Chuck keys attached to portable machine tools by retracting lanyards. Lanyard held taut by recoil caddy attached to tool base. Chuck key available for use when needed and safely secured during operation of tool.

  3. Quantum key distribution network for multiple applications

    Science.gov (United States)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  4. Nonorthogonal Decoy-State Quantum Key Distribution

    Institute of Scientific and Technical Information of China (English)

    LI Jing-Bo; FANG Xi-Ming

    2006-01-01

    @@ In practical quantum key distribution (QKD), weak coherent states as the photon source have a limit in the secure key rate and transmission distance because of the existence of multi-photon pulses and heavy loss in transmission line.

  5. Oral Health in the US: Key Facts

    Science.gov (United States)

    ... Policy Oral Health in the U.S.: Key Facts Oral Health in the U.S.: Key Facts Jun 01, 2012 ... Email Print This fact sheet provides data on oral health care coverage and access for children, nonelderly adults ...

  6. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  7. "Key Concepts in ELT": Taking Stock

    Science.gov (United States)

    Hall, Graham

    2012-01-01

    This article identifies patterns and trends within "Key Concepts in ELT", both since the inception of the feature in ELT Journal in 1993 and during the 17 years of the current editorship. After outlining the aims of the series, the article identifies key themes that have emerged over time, exploring the links between "Key Concepts" pieces and the…

  8. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  9. Keys to the genera of Annonaceae

    NARCIS (Netherlands)

    Couvreur, T.L.P.; Maas, P.J.M.; Meinke, S.; Johnson, D.M.; Kessler, P.J.A.

    2012-01-01

    Identification keys are provided for all genera currently recognized in Annonaceae. Separate keys are presented for the Neotropics (34 genera), Africa-Madagascar (40 genera) and Asia-Australasia (42 genera). These keys are based on a combination of vegetative and fertile characters. (c) 2012 The Lin

  10. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  11. Molecular mechanisms underlying the Arabidopsis circadian clock.

    Science.gov (United States)

    Nakamichi, Norihito

    2011-10-01

    A wide range of biological processes exhibit circadian rhythm, enabling plants to adapt to the environmental day-night cycle. This rhythm is generated by the so-called 'circadian clock'. Although a number of genetic approaches have identified >25 clock-associated genes involved in the Arabidopsis clock mechanism, the molecular functions of a large part of these genes are not known. Recent comprehensive studies have revealed the molecular functions of several key clock-associated proteins. This progress has provided mechanistic insights into how key clock-associated proteins are integrated, and may help in understanding the essence of the clock's molecular mechanisms.

  12. Molecular physics

    CERN Document Server

    Demtröder, Wolfgang

    2008-01-01

    The richly illustrated book comprehensively explains the important principles of diatomic and polyatomic molecules and their spectra in two separate, distinct parts. The first part concentrates on the theoretical aspects of molecular physics, such as the vibration, rotation, electronic states, potential curves, and spectra of molecules. The different methods of approximation for the calculation of electronic wave functions and their energy are also covered. The introduction of basics terms used in group theory and their meaning in molecular physics enables an elegant description of polyatomic

  13. Molecular pathways

    DEFF Research Database (Denmark)

    Cox, Thomas R; Erler, Janine Terra

    2014-01-01

    that 45% of deaths in the developed world are linked to fibrotic disease. Fibrosis and cancer are known to be inextricably linked; however, we are only just beginning to understand the common and overlapping molecular pathways between the two. Here, we discuss what is known about the intersection...... of fibrosis and cancer, with a focus on cancer metastasis, and highlight some of the exciting new potential clinical targets that are emerging from analysis of the molecular pathways associated with these two devastating diseases. Clin Cancer Res; 20(14); 3637-43. ©2014 AACR....

  14. Molecular modeling

    Directory of Open Access Journals (Sweden)

    Aarti Sharma

    2009-01-01

    Full Text Available The use of computational chemistry in the development of novel pharmaceuticals is becoming an increasingly important tool. In the past, drugs were simply screened for effectiveness. The recent advances in computing power and the exponential growth of the knowledge of protein structures have made it possible for organic compounds to be tailored to decrease the harmful side effects and increase the potency. This article provides a detailed description of the techniques employed in molecular modeling. Molecular modeling is a rapidly developing discipline, and has been supported by the dramatic improvements in computer hardware and software in recent years.

  15. Weak-Keys in Public Key Cryptosystems Based on Discrete Logarithms

    Institute of Scientific and Technical Information of China (English)

    TAI Suiyan; LUO Ping; PENG Xiaoning; WANG Daoshun

    2005-01-01

    The discrete logarithm method is the foundation of many public key algorithms. However, one type of key, defined as a weak-key, reduces the security of public key cryptosystems based on the discrete logarithm method. The weak-key occurs if the public key is a factor or multiple of the primitive element, in which case the user's private key is not needed but can be obtained based on the character of the public key. An algorithm is presented that can easily test whether there is a weak-key in the cryptosystem. An example is given to show that an attack can be completed for the Elgamal digital signature if a weak-key exists, therefore validating the danger of weak-keys. Methods are given to prevent the generation of these weak-keys.

  16. Unlocking Data for Statistical Analyses and Data Mining: Generic Case Extraction of Clinical Items from i2b2 and tranSMART.

    Science.gov (United States)

    Firnkorn, Daniel; Merker, Sebastian; Ganzinger, Matthias; Muley, Thomas; Knaup, Petra

    2016-01-01

    In medical science, modern IT concepts are increasingly important to gather new findings out of complex diseases. Data Warehouses (DWH) as central data repository systems play a key role by providing standardized, high-quality and secure medical data for effective analyses. However, DWHs in medicine must fulfil various requirements concerning data privacy and the ability to describe the complexity of (rare) disease phenomena. Here, i2b2 and tranSMART are free alternatives representing DWH solutions especially developed for medical informatics purposes. But different functionalities are not yet provided in a sufficient way. In fact, data import and export is still a major problem because of the diversity of schemas, parameter definitions and data quality which are described variously in each single clinic. Further, statistical analyses inside i2b2 and tranSMART are possible, but restricted to the implemented functions. Thus, data export is needed to provide a data basis which can be directly included within statistics software like SPSS and SAS or data mining tools like Weka and RapidMiner. The standard export tools of i2b2 and tranSMART are more or less creating a database dump of key-value pairs which cannot be used immediately by the mentioned tools. They need an instance-based or a case-based representation of each patient. To overcome this lack, we developed a concept called Generic Case Extractor (GCE) which pivots the key-value pairs of each clinical fact into a row-oriented format for each patient sufficient to enable analyses in a broader context. Therefore, complex pivotisation routines where necessary to ensure temporal consistency especially in terms of different data sets and the occurrence of identical but repeated parameters like follow-up data. GCE is embedded inside a comprehensive software platform for systems medicine.

  17. Microwave Photonics Parallel Quantum Key Distribution

    CERN Document Server

    Mora, Jose; Amaya, Waldimar; Martinez, Alfonso; Munoz, Victor Garcia-; Calvo, David; Capmany, Jose

    2011-01-01

    The incorporation of multiplexing techniques used in Microwave Photonics to Quantum Key Distribution (QKD) systems bring important advantages enabling the simultaneous and parallel delivery of multiple keys between a central station and different end-users in the context of multipoint access and metropolitan networks, or by providing higher key distribution rates in point to point links by suitably linking the parallel distributed keys. It also allows the coexistence of classical information and quantum key distribution channels over a single optical fibre infrastructure. Here we show, for the first time to our knowledge, the successful operation of a two domain (subcarrier and wavelength division) multiplexed strong reference BB84 quantum key distribution system. A four independent channel QKD system featuring 10 kb/s/channel over an 11 km link with Quantum Bit Error Rate (QBER) < 2 % is reported. These results open the way for multi-quantum key distribution over optical fiber networks.

  18. Molecular gastronomy

    Science.gov (United States)

    This, Hervé

    2005-01-01

    For centuries, cooks have been applying recipes without looking for the mechanisms of the culinary transformations. A scientific discipline that explores these changes from raw ingredients to eating the final dish, is developing into its own field, termed molecular gastronomy. Here, one of the founders of the discipline discusses its aims and importance.

  19. Molecular farming

    NARCIS (Netherlands)

    Merck, K.B.; Vereijken, J.M.

    2006-01-01

    Molecular Farming is a new and emerging technology that promises relatively cheap and flexible production of large quantities of pharmaceuticals in genetically modified plants. Many stakeholders are involved in the production of pharmaceuticals in plants, which complicates the discussion on the poss

  20. Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings

    Institute of Scientific and Technical Information of China (English)

    SHAO Zu-hua

    2005-01-01

    An efficient authenticated key agreement protocol is proposed, which makes use of bilinear pairings and selfcertified public keys. Its security is based on the security assumptions of the bilinear Diffie-Hellman problem and the computational Diffie-Hellman problem. Users can choose their private keys independently. The public keys and identities of users can be verified implicitly when the session key being generating in a logically single step. A trusted Key Generation Center is no longer required as in the ID-based authenticated key agreement protocols. Compared with existing authenticated key agreement protocols from pairings, the new proposed protocol is more efficient and secure.

  1. Fibrinogen as a key regulator of inflammation in disease.

    Science.gov (United States)

    Davalos, Dimitrios; Akassoglou, Katerina

    2012-01-01

    The interaction of coagulation factors with the perivascular environment affects the development of disease in ways that extend beyond their traditional roles in the acute hemostatic cascade. Key molecular players of the coagulation cascade like tissue factor, thrombin, and fibrinogen are epidemiologically and mechanistically linked with diseases with an inflammatory component. Moreover, the identification of novel molecular mechanisms linking coagulation and inflammation has highlighted factors of the coagulation cascade as new targets for therapeutic intervention in a wide range of inflammatory human diseases. In particular, a proinflammatory role for fibrinogen has been reported in vascular wall disease, stroke, spinal cord injury, brain trauma, multiple sclerosis, Alzheimer's disease, rheumatoid arthritis, bacterial infection, colitis, lung and kidney fibrosis, Duchenne muscular dystrophy, and several types of cancer. Genetic and pharmacologic studies have unraveled pivotal roles for fibrinogen in determining the extent of local or systemic inflammation. As cellular and molecular mechanisms for fibrinogen functions in tissues are identified, the role of fibrinogen is evolving from a marker of vascular rapture to a multi-faceted signaling molecule with a wide spectrum of functions that can tip the balance between hemostasis and thrombosis, coagulation and fibrosis, protection from infection and extensive inflammation, and eventually life and death. This review will discuss some of the main molecular links between coagulation and inflammation and will focus on the role of fibrinogen in inflammatory disease highlighting its unique structural properties, cellular targets, and signal transduction pathways that make it a potent proinflammatory mediator and a potential therapeutic target.

  2. Efficient key pathway mining: combining networks and OMICS data.

    Science.gov (United States)

    Alcaraz, Nicolas; Friedrich, Tobias; Kötzing, Timo; Krohmer, Anton; Müller, Joachim; Pauling, Josch; Baumbach, Jan

    2012-07-01

    Systems biology has emerged over the last decade. Driven by the advances in sophisticated measurement technology the research community generated huge molecular biology data sets. These comprise rather static data on the interplay of biological entities, for instance protein-protein interaction network data, as well as quite dynamic data collected for studying the behavior of individual cells or tissues in accordance with changing environmental conditions, such as DNA microarrays or RNA sequencing. Here we bring the two different data types together in order to gain higher level knowledge. We introduce a significantly improved version of the KeyPathwayMiner software framework. Given a biological network modelled as a graph and a set of expression studies, KeyPathwayMiner efficiently finds and visualizes connected sub-networks where most components are expressed in most cases. It finds all maximal connected sub-networks where all nodes but k exceptions are expressed in all experimental studies but at most l exceptions. We demonstrate the power of the new approach by comparing it to similar approaches with gene expression data previously used to study Huntington's disease. In addition, we demonstrate KeyPathwayMiner's flexibility and applicability to non-array data by analyzing genome-scale DNA methylation profiles from colorectal tumor cancer patients. KeyPathwayMiner release 2 is available as a Cytoscape plugin and online at http://keypathwayminer.mpi-inf.mpg.de.

  3. Copper as a key regulator of cell signalling pathways.

    Science.gov (United States)

    Grubman, Alexandra; White, Anthony R

    2014-05-22

    Copper is an essential element in many biological processes. The critical functions associated with copper have resulted from evolutionary harnessing of its potent redox activity. This same property also places copper in a unique role as a key modulator of cell signal transduction pathways. These pathways are the complex sequence of molecular interactions that drive all cellular mechanisms and are often associated with the interplay of key enzymes including kinases and phosphatases but also including intracellular changes in pools of smaller molecules. A growing body of evidence is beginning to delineate the how, when and where of copper-mediated control over cell signal transduction. This has been driven by research demonstrating critical changes to copper homeostasis in many disorders including cancer and neurodegeneration and therapeutic potential through control of disease-associated cell signalling changes by modulation of copper-protein interactions. This timely review brings together for the first time the diverse actions of copper as a key regulator of cell signalling pathways and discusses the potential strategies for controlling disease-associated signalling processes using copper modulators. It is hoped that this review will provide a valuable insight into copper as a key signal regulator and stimulate further research to promote our understanding of copper in disease and therapy.

  4. Molecularly Imprinted Biodegradable Nanoparticles

    Science.gov (United States)

    Gagliardi, Mariacristina; Bertero, Alice; Bifone, Angelo

    2017-01-01

    Biodegradable polymer nanoparticles are promising carriers for targeted drug delivery in nanomedicine applications. Molecu- lar imprinting is a potential strategy to target polymer nanoparticles through binding of endogenous ligands that may promote recognition and active transport into specific cells and tissues. However, the lock-and-key mechanism of molecular imprinting requires relatively rigid cross-linked structures, unlike those of many biodegradable polymers. To date, no fully biodegradable molecularly imprinted particles have been reported in the literature. This paper reports the synthesis of a novel molecularly- imprinted nanocarrier, based on poly(lactide-co-glycolide) (PLGA) and acrylic acid, that combines biodegradability and molec- ular recognition properties. A novel three-arm biodegradable cross-linker was synthesized by ring-opening polymerization of glycolide and lactide initiated by glycerol. The resulting macromer was functionalized by introduction of end-functions through reaction with acryloyl chloride. Macromer and acrylic acid were used for the synthesis of narrowly-dispersed nanoparticles by radical polymerization in diluted conditions in the presence of biotin as template molecule. The binding capacity of the imprinted nanoparticles towards biotin and biotinylated bovine serum albumin was twentyfold that of non-imprinted nanoparti- cles. Degradation rates and functional performances were assessed in in vitro tests and cell cultures, demonstrating effective biotin-mediated cell internalization.

  5. Molecularly Imprinted Biodegradable Nanoparticles

    Science.gov (United States)

    Gagliardi, Mariacristina; Bertero, Alice; Bifone, Angelo

    2017-01-01

    Biodegradable polymer nanoparticles are promising carriers for targeted drug delivery in nanomedicine applications. Molecu- lar imprinting is a potential strategy to target polymer nanoparticles through binding of endogenous ligands that may promote recognition and active transport into specific cells and tissues. However, the lock-and-key mechanism of molecular imprinting requires relatively rigid cross-linked structures, unlike those of many biodegradable polymers. To date, no fully biodegradable molecularly imprinted particles have been reported in the literature. This paper reports the synthesis of a novel molecularly- imprinted nanocarrier, based on poly(lactide-co-glycolide) (PLGA) and acrylic acid, that combines biodegradability and molec- ular recognition properties. A novel three-arm biodegradable cross-linker was synthesized by ring-opening polymerization of glycolide and lactide initiated by glycerol. The resulting macromer was functionalized by introduction of end-functions through reaction with acryloyl chloride. Macromer and acrylic acid were used for the synthesis of narrowly-dispersed nanoparticles by radical polymerization in diluted conditions in the presence of biotin as template molecule. The binding capacity of the imprinted nanoparticles towards biotin and biotinylated bovine serum albumin was twentyfold that of non-imprinted nanoparti- cles. Degradation rates and functional performances were assessed in in vitro tests and cell cultures, demonstrating effective biotin-mediated cell internalization. PMID:28071745

  6. Molecular basis of alcoholism.

    Science.gov (United States)

    Most, Dana; Ferguson, Laura; Harris, R Adron

    2014-01-01

    Acute alcohol intoxication causes cellular changes in the brain that last for hours, while chronic alcohol use induces widespread neuroadaptations in the nervous system that can last a lifetime. Chronic alcohol use and the progression into dependence involve the remodeling of synapses caused by changes in gene expression produced by alcohol. The progression of alcohol use, abuse, and dependence can be divided into stages, which include intoxication, withdrawal, and craving. Each stage is associated with specific changes in gene expression, cellular function, brain circuits, and ultimately behavior. What are the molecular mechanisms underlying the transition from recreational use (acute) to dependence (chronic)? What cellular adaptations result in drug memory retention, leading to the persistence of addictive behaviors, even after prolonged drug abstinence? Research into the neurobiology of alcoholism aims to answer these questions. This chapter will describe the molecular adaptations caused by alcohol use and dependence, and will outline key neurochemical participants in alcoholism at the molecular level, which are also potential targets for therapy.

  7. Molecular Fountain

    Science.gov (United States)

    Cheng, Cunfeng; van der Poel, Aernout P. P.; Jansen, Paul; Quintero-Pérez, Marina; Wall, Thomas E.; Ubachs, Wim; Bethlem, Hendrick L.

    2016-12-01

    The resolution of any spectroscopic or interferometric experiment is ultimately limited by the total time a particle is interrogated. Here we demonstrate the first molecular fountain, a development which permits hitherto unattainably long interrogation times with molecules. In our experiments, ammonia molecules are decelerated and cooled using electric fields, launched upwards with a velocity between 1.4 and 1.9 m/s and observed as they fall back under gravity. A combination of quadrupole lenses and bunching elements is used to shape the beam such that it has a large position spread and a small velocity spread (corresponding to a transverse temperature of free fall, while being strongly focused at the detection region. The molecules are in free fall for up to 266 ms, making it possible, in principle, to perform sub-Hz measurements in molecular systems and paving the way for stringent tests of fundamental physics theories.

  8. Molecular cytogenetics.

    Science.gov (United States)

    Carpenter, N J

    2001-09-01

    In the past decade, clinical cytogenetics has undergone remarkable advancement as molecular biology techniques have been applied to conventional chromosome analysis. The limitations of conventional banding analysis in the accurate diagnosis and interpretation of certain chromosome abnormalities have largely been overcome by these new technologies, which include fluorescence in situ hybridization (FISH), comparative genomic hybridization (CGH), and multicolor FISH (M-FISH, SKY, and Rx-FISH). Clinical applications include diagnosis of microdeletion and microduplication syndromes, detection of subtelomeric rearrangements in idiopathic mental retardation, identification of marker and derivative chromosomes, prenatal diagnosis of trisomy syndromes, and gene rearrangements and gene amplification in tumors. Molecular cytogenetic methods have expanded the possibilities for precise genetic diagnoses, which are extremely important for clinical management of patients and appropriate counseling of their families.

  9. Molecular Modelling

    Directory of Open Access Journals (Sweden)

    Aarti Sharma

    2009-12-01

    Full Text Available

    The use of computational chemistry in the development of novel pharmaceuticals is becoming an increasingly important
    tool. In the past, drugs were simply screened for effectiveness. The recent advances in computing power and
    the exponential growth of the knowledge of protein structures have made it possible for organic compounds to tailored to
    decrease harmful side effects and increase the potency. This article provides a detailed description of the techniques
    employed in molecular modeling. Molecular modelling is a rapidly developing discipline, and has been supported from
    the dramatic improvements in computer hardware and software in recent years.

  10. Numerical approach for unstructured quantum key distribution

    Science.gov (United States)

    Coles, Patrick J.; Metodiev, Eric M.; Lütkenhaus, Norbert

    2016-05-01

    Quantum key distribution (QKD) allows for communication with security guaranteed by quantum theory. The main theoretical problem in QKD is to calculate the secret key rate for a given protocol. Analytical formulas are known for protocols with symmetries, since symmetry simplifies the analysis. However, experimental imperfections break symmetries, hence the effect of imperfections on key rates is difficult to estimate. Furthermore, it is an interesting question whether (intentionally) asymmetric protocols could outperform symmetric ones. Here we develop a robust numerical approach for calculating the key rate for arbitrary discrete-variable QKD protocols. Ultimately this will allow researchers to study `unstructured' protocols, that is, those that lack symmetry. Our approach relies on transforming the key rate calculation to the dual optimization problem, which markedly reduces the number of parameters and hence the calculation time. We illustrate our method by investigating some unstructured protocols for which the key rate was previously unknown.

  11. Molecular Rotors

    Science.gov (United States)

    2006-10-31

    Molecular Dipolar Rotors on Insulating Surfaces," Salamanca , Spain. Trends in Nanotechnology Conference. September 5-9, 2003 [86] Laura I. Clarke, Mary Beth...Horansky at the Trends in Nanotechnology Conference, Salamanca , Spain (September 5-9, 2003). [145] Michl, J. “Unusual Molecules: Artificial Surface...temperature and frequency for difluorophenylene rotor crystal. Figure JP6. Monte Carlo results for the local potential asymmetry at

  12. RFID Key Establishment Against Active Adversaries

    CERN Document Server

    Bringer, Julien; Cohen, Gérard; Kindarji, Bruno

    2010-01-01

    We present a method to strengthen a very low cost solution for key agreement with a RFID device. Starting from a work which exploits the inherent noise on the communication link to establish a key by public discussion, we show how to protect this agreement against active adversaries. For that purpose, we unravel integrity $(I)$-codes suggested by Cagalj et al. No preliminary key distribution is required.

  13. An Identity- Based Key- Exchange Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ya-juan; ZHU Yue-fei; HUANG Qiu-sheng

    2005-01-01

    An identity-based key-exchange protocol using a bilinear map is proposed and it is proved SK-secure(session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diffie-Hellmen) assumption is correct. Then we apply the signature-based authenticator to our protocol and obtain an identity-Based key-exchange protocol that is SK-secure in the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct.

  14. Quantum Key Distribution Protocol with User Authentication

    CERN Document Server

    Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

    2005-01-01

    We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

  15. Two Methods for Extending Quantum Key Warehouse

    Institute of Scientific and Technical Information of China (English)

    WU Min; LIAO Chang-jun; LIU Song-hao

    2006-01-01

    Because the rates of quantum key distribution systems are too low,the interleaving technique and interpolation technique are used to extend the capacity of the quantum key warehouse to increase the quantum key rates of quantum secure communication systems. the simulation technique can extend random sequences and that their randomness are invariable. The correlative theory and technique of digital singal processing is an effective method of extending the quantum dey warehouse.

  16. Improved Authenticated Multi-Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hua; YUAN Zheng; WEN Qiaoyan

    2006-01-01

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.

  17. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  18. New Security Results on Encrypted Key Exchange

    OpenAIRE

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2003-01-01

    Schemes for encrypted key exchange are designed to provide two entities communicating over a public network, and sharing a (short) password only, with a session key to be used to achieve data integrity and/or message confidentiality. An example of a very efficient and "elegant" scheme for encrypted key exchange considered for standardization by the IEEE P1363 Standard working group is AuthA. This scheme was conjectured secure when the symmetric-encryption primitive is instantiated via e...

  19. Molecular scale

    Directory of Open Access Journals (Sweden)

    Christopher H. Childers

    2016-03-01

    Full Text Available This manuscript demonstrates the molecular scale cure rate dependence of di-functional epoxide based thermoset polymers cured with amines. A series of cure heating ramp rates were used to determine the influence of ramp rate on the glass transition temperature (Tg and sub-Tg transitions and the average free volume hole size in these systems. The networks were comprised of 3,3′-diaminodiphenyl sulfone (33DDS and diglycidyl ether of bisphenol F (DGEBF and were cured at ramp rates ranging from 0.5 to 20 °C/min. Differential scanning calorimetry (DSC and NIR spectroscopy were used to explore the cure ramp rate dependence of the polymer network growth, whereas broadband dielectric spectroscopy (BDS and free volume hole size measurements were used to interrogate networks’ molecular level structural variations upon curing at variable heating ramp rates. It was found that although the Tg of the polymer matrices was similar, the NIR and DSC measurements revealed a strong correlation for how these networks grow in relation to the cure heating ramp rate. The free volume analysis and BDS results for the cured samples suggest differences in the molecular architecture of the matrix polymers due to cure heating rate dependence.

  20. 76 FR 68314 - Special Local Regulations; Key West World Championship, Atlantic Ocean; Key West, FL

    Science.gov (United States)

    2011-11-04

    ... SECURITY Coast Guard 33 CFR Part 100 RIN 1625-AA08 Special Local Regulations; Key West World Championship, Atlantic Ocean; Key West, FL AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast... Key West, Florida during the Key West World Championship, a series of high-speed boat races. The...

  1. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice of Appointment of Receiver Notice... sole Receiver for Key West Bank, Key West, Florida, (OTS No. 14929) on March 26, 2010. Dated: March...

  2. Security analysis of public key watermarking schemes

    Science.gov (United States)

    Craver, Scott A.; Katzenbeisser, Stefan

    2001-12-01

    Traditional watermarking systems require the complete disclosure of the watermarking key in the watermark verification process. In most systems an attacker is able to remove the watermark completely once the key is known, thus subverting the intention of copyright protection. To cope with this problem, public-key watermarking schemes were proposed that allow asymmetric watermark detection. Whereas a public key is used to insert watermarks in digital objects, the marks can be verified with a private key. Knowledge of this private key does not allow piracy. We describe two public-key watermarking schemes which are similar in spirit to zero-knowledge proofs. The key idea of one system is to verify a watermark in a blinded version of the document, where the scrambling is determined by the private key. A probabilistic protocol is constructed that allows public watermark detection with probability of 1/2; by iteration, the verifier can get any degree of certainty that the watermark is present. The second system is based on watermark attacks, using controlled counterfeiting to conceal real watermark data safely amid data useless to an attacker.

  3. AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations.

  4. An Efficient Group Key Management Using Code for Key Calculation for Simultaneous Join/Leave: CKCS

    OpenAIRE

    Melisa Hajyvahabzadeh; Elina Eidkhani; S. Anahita Mortazavi; Alireza Nemaney Pour

    2012-01-01

    This paper presents an efficient group key management protocol, CKCS (Code for Key Calculation in Simultaneous join/leave) for simultaneous join/leave in secure multicast. This protocol is based on logical key hierarchy. In this protocol, when new members join the group simultaneously, server sends only thegroup key for those new members. Then, current members and new members calculate the necessary keys by node codes and one-way hash function. A node code is a random number which is assigned...

  5. Unlocking the Karyological and Cytogenetic Diversity of Iris from Lebanon: Oncocyclus Section Shows a Distinctive Profile and Relative Stasis during Its Continental Radiation

    Science.gov (United States)

    Abdel Samad, Nour; Bou Dagher-Kharrat, Magda; Hidalgo, Oriane; El Zein, Rana; Douaihy, Bouchra; Siljak-Yakovlev, Sonja

    2016-01-01

    Despite being an important target of conservation concern and horticultural interest, Lebanese irises yet have a confusing taxonomic history and species’ delimitation is often considered problematic, more especially among royal irises (Iris section Oncocyclus). Indeed, these irises of exceptionally large and spectacular flowers have radiated across Caucasus and eastern Mediterranean giving rise to a number of strict endemic taxa, many of them being considered under threat. Whilst efforts have mostly focused on clarifying the evolutionary relationships in the group based on morphological and molecular data, karyological and cytogenetic characters have been comparatively overlooked. In this study, we established for the first time the physical mapping of 35S rDNA loci and heterochromatin, and obtained karyo-morphological data for ten Lebanese Iris species belonging to four sections (Iris, Limniris, Oncocyclus and Scorpiris). Our results evidenced distinctive genomic profiles for each one of the sections, where Oncocyclus irises, while having the lowest chromosome numbers, exhibit both the highest number of 35S loci and CMA3+ sites. The continental radiation of royal irises has been accompanied by a relative karyological and cytogenetic stasis, even though some changes were observed regarding karyotype formula and asymmetry indexes. In addition to that, our results enabled taxonomic differentiation between I. germanica and I. mesopotamica–two taxa currently considered as synonyms–and highlighted the need for further studies on populations of I. persica and I. wallasiae in the Eastern Mediterranean Region. PMID:27525415

  6. Free-space quantum key distribution

    CERN Document Server

    Buttler, W T; Kwiat, P G; Luther, G G; Morgan, G L; Nordholt, J E; Peterson, C G; Simmons, C M

    1998-01-01

    A working free-space quantum key distribution (QKD) system has been developed and tested over a 205-m indoor optical path at Los Alamos National Laboratory under fluorescent lighting conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly.

  7. Locks & keys service moves to building 55

    CERN Document Server

    2012-01-01

    Please note that as of July 12 Locks & keys service will be at building 55 second floor. The opening hours are as follows: 08:30 am to 12:30 pm - 1:30 pm to 5:30 pm. The procedures and rules relating to applications for key and cylinder have not changed. GI-IS Group

  8. How to Share a Key (Invited paper)

    DEFF Research Database (Denmark)

    Fitzi, Matthias; Nielsen, Jesper Buus; Wolf, Stefan

    The problem of asynchronous perfectly secure communication via one-time pads (OTP) has been recently introduced by Di Crescenzo and Kiayias. There, several players share the same OTP to be used in parallel but it is not known in advance which players will consume how many bits of the pad. Based...... players to share the same k keys of length ` bits. The goal is to assign a key sequence to each player such that, for as many keys as possible and independently of which player uses how many of them, it is guaranteed that all used keys are independent. Such an assignment is called loss-free if k keys can...... always be consumed independently. Note that, in contrast to the previous model, the players are ignorant of each other’s key consumptions. We first observe a simple loss-free solution for the case that the key is of certain (small) minimal length `. Furthermore, for the case of key length ` = 1 (the most...

  9. The Keys to the White House

    Science.gov (United States)

    Lichtman, Allan J.

    2012-01-01

    The Keys to the White House is a historically-based system for predicting the result of the popular vote in American presidential elections. The Keys system tracks the big picture of how well the party holding the White House has governed and does not shift with events of the campaign. This model gives specificity to the idea that it is…

  10. The LOFAR Transients Key Science Project

    NARCIS (Netherlands)

    Stappers, B.; Fender, R.; Wijers, R.

    2009-01-01

    The Transients Key Science Project (TKP) is one of six Key Science Projects of the next generation radio telescope LOFAR. Its aim is the study of transient and variable low-frequency radio sources with an extremely broad science case ranging from relativistic jet sources to pulsars, exoplanets,

  11. Optimizing Key Updates in Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Sensor networks offer the advantages of simple and low–resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the key points in security, which rest...

  12. Bioenergy has a key role to play!

    DEFF Research Database (Denmark)

    Holm-Nielsen, Jens Bo

    2010-01-01

    Key note speach - Opening seremony of the 6.th International Bioenergy Conference organized by NASU - Kiev, Ukraine; www.biomass.kiev.ua;......Key note speach - Opening seremony of the 6.th International Bioenergy Conference organized by NASU - Kiev, Ukraine; www.biomass.kiev.ua;...

  13. The Updated Verdict of the Keys

    Science.gov (United States)

    Lichtman, Allan J.

    2008-01-01

    The Keys are a historically based prediction system that the author developed in collaboration with Russian scientist Volodia Keilis-Borok, an authority on the mathematics of prediction models. The Keys retrospectively account for the winners of the popular vote of every presidential election from 1860 through 1980 and prospectively forecast the…

  14. Public-Key Encryption with Delegated Search

    NARCIS (Netherlands)

    Ibraimi, Luan; Nikova, Svetla; Hartel, Pieter; Jonker, Willem

    2011-01-01

    In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message. Bob's company, Carol, cannot scan his email for mali

  15. Bioenergy has a key role to play!

    DEFF Research Database (Denmark)

    Holm-Nielsen, Jens Bo

    2010-01-01

    Key note speach - Opening seremony of the 6.th International Bioenergy Conference organized by NASU - Kiev, Ukraine; www.biomass.kiev.ua;......Key note speach - Opening seremony of the 6.th International Bioenergy Conference organized by NASU - Kiev, Ukraine; www.biomass.kiev.ua;...

  16. Key Stakeholders' Perceptions of Effective School Leadership

    Science.gov (United States)

    Odhiambo, George; Hii, Amy

    2012-01-01

    There has been limited research on how teachers, parents and students perceive effective school leadership in practice. The purpose of this article is to present some of the findings derived from a study of key stakeholders' perceptions of effective school leadership. Key stakeholders were identified as teachers, students and parents. Data were…

  17. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  18. k-Connectivity of Random Key Graphs

    CERN Document Server

    Zhao, Jun; Gligor, Virgil

    2015-01-01

    Random key graphs represent topologies of secure wireless sensor networks that apply the seminal Eschenauer-Gligor random key predistribution scheme to secure communication between sensors. These graphs have received much attention and also been used in diverse application areas beyond secure sensor networks; e.g., cryptanalysis, social networks, and recommender systems. Formally, a random key graph with $n$ nodes is constructed by assigning each node $X_n$ keys selected uniformly at random from a pool of $Y_n$ keys and then putting an undirected edge between any two nodes sharing at least one key. Considerable progress has been made in the literature to analyze connectivity and $k$-connectivity of random key graphs, where $k$-connectivity of a graph ensures connectivity even after the removal of $k$ nodes or $k$ edges. Yet, it still remains an open question for $k$-connectivity in random key graphs under $X_n \\geq 2$ and $X_n = o(\\sqrt{\\ln n})$ (the case of $X_n=1$ is trivial). In this paper, we answer the a...

  19. Voedingswetenschapper overleden : in memoriam Ancel Keys

    NARCIS (Netherlands)

    Kromhout, D.; Katan, M.B.

    2005-01-01

    Op 20 november 2004 stierf in Minneapolis Ancel Keys, een van de grootste onderzoekers op het gebied van voeding en hart- en vaatziekten van de 20e eeuw. Keys is bekend geworden door zijn voedingsexperimenten naar de relatie tussen vetzuren en serumcholesterol en door de Zeven Landen Studie. Hij hee

  20. Voedingswetenschapper overleden : in memoriam Ancel Keys

    OpenAIRE

    Kromhout, D; Katan, M.B.

    2005-01-01

    Op 20 november 2004 stierf in Minneapolis Ancel Keys, een van de grootste onderzoekers op het gebied van voeding en hart- en vaatziekten van de 20e eeuw. Keys is bekend geworden door zijn voedingsexperimenten naar de relatie tussen vetzuren en serumcholesterol en door de Zeven Landen Studie. Hij heeft daarnaast baanbrekend fysiologisch onderzoek verricht

  1. A Model of Hierarchical Key Assignment Scheme

    Institute of Scientific and Technical Information of China (English)

    ZHANG Zhigang; ZHAO Jing; XU Maozhi

    2006-01-01

    A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme will be defined in this paper. Also, our scheme model will meet this property.

  2. Molecular Clouds: Observation to Experiment

    Energy Technology Data Exchange (ETDEWEB)

    Kane, J O; Ryutov, D D; Mizuta, A; Remington, B A; Pound, M W

    2004-05-06

    Our ongoing investigation of how 'Pillars' and other structure form in molecular clouds irradiated by ultraviolet (UV) stars has revealed that the Rayleigh-Taylor instability is strongly suppressed by recombination in the photoevaporated outflow, that clumps and filaments may be key, that the evolution of structure is well-modeled by compressible hydrodynamics, and that directionality of the UV radiation may have significant effects. We discuss a generic, flexible set of laboratory experiments that can address these issues.

  3. Authenticating Tripartite Key Agreement Protocol with Pairings

    Institute of Scientific and Technical Information of China (English)

    Sheng-Li Liu; Fang-Guo Zhang; Ke-Fei Chen

    2004-01-01

    In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.

  4. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  5. Molecular plasmonics

    CERN Document Server

    Fritzsche, Wolfgang

    2014-01-01

    Adopting a novel approach, this book provides a unique ""molecular perspective"" on plasmonics, concisely presenting the fundamentals and applications in a way suitable for beginners entering this hot field as well as for experienced researchers and practitioners. It begins by introducing readers to the optical effects that occur at the nanoscale and particularly their modification in the presence of biomolecules, followed by a concise yet thorough overview of the different methods for the actual fabrication of nanooptical materials. Further chapters address the relevant nanooptics, as well as

  6. Molecular nanomagnets

    CERN Document Server

    Gatteschi, Dante; Villain, Jacques

    2006-01-01

    Nanomagnetism is a rapidly expanding area of research which appears to be able to provide novel applications. Magnetic molecules are at the very bottom of the possible size of nanomagnets and they provide a unique opportunity to observe the coexistence of classical and quantum properties. The discovery in the early 90's that a cluster comprising twelve manganese ions shows hysteresis of molecular origin, and later proved evidence of quantum effects, opened a new research area whichis still flourishing through the collaboration of chemists and physicists. This book is the first attempt to cover

  7. MULTI-LEVEL KEY DISTRIBUTION ALGORITHM FOR SECRET KEY RECOVERY SYSTEM

    Directory of Open Access Journals (Sweden)

    TANAPAT MAHAVEERAWAT

    2015-02-01

    Full Text Available Most of Multi Agent Key Recovery Systems are proposed from the assumption that Key Recovery Agents in the system have same availability of security service levelagreement and trust. Which mean, secret key will be shared to each Key Recovery Agent in equal secret’s portion. Practically, each Key Recovery Agent may have their own limitation in terms of securityservice level agreement according to economic cost, complexity and risks. This paper proposedMulti Level Key Distribution Algorithm,which the secret key can be managed into portionsharing and assignto each Key Recovery Agent (KRA according to user’s trust. Withproposed algorithm, the experimental result had shown the advantage in secret sharing size and the system had improved initssecurity from the advantage of multilevel secret key distribution capability.

  8. Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution

    Directory of Open Access Journals (Sweden)

    Abudhahir Buhari

    2012-10-01

    Full Text Available We propose a multi-party quantum key distribution protocol which enables all the receivers can converttheir respective private shared key into common secret key without use of entanglement. The maincomponent of our protocol is a simple post quantum scheme for achieving the higher secret key rate.Efficiency of the extracted key rate is almost 100%. We assume that sender established the pre-sharedprivate secret keys and a common secret number with the receivers. Our proposed scheme sends n stringsof number to n receivers in the public channel to convert their respective shared secret key into commonsecret key in the presence of Eve. We also analyze the complexity of attack by the adversary to guess thesecret key

  9. Molecular spintronics.

    Science.gov (United States)

    Sanvito, Stefano

    2011-06-01

    The electron spin made its debut in the device world only two decades ago but today our ability of detecting the spin state of a moving electron underpins the entire magnetic data storage industry. This technological revolution has been driven by a constant improvement in our understanding on how spins can be injected, manipulated and detected in the solid state, a field which is collectively named Spintronics. Recently a number of pioneering experiments and theoretical works suggest that organic materials can offer similar and perhaps superior performances in making spin-devices than the more conventional inorganic metals and semiconductors. Furthermore they can pave the way for radically new device concepts. This is Molecular Spintronics, a blossoming research area aimed at exploring how the unique properties of the organic world can marry the requirements of spin-devices. Importantly, after a first phase, where most of the research was focussed on exporting the concepts of inorganic spintronics to organic materials, the field has moved to a more mature age, where the exploitation of the unique properties of molecules has begun to emerge. Molecular spintronics now collects a diverse and interdisciplinary community ranging from device physicists to synthetic chemists to surface scientists. In this critical review, I will survey this fascinating, rapidly evolving, field with a particular eye on new directions and opportunities. The main differences and challenges with respect to standard spintronics will be discussed and so will be the potential cross-fertilization with other fields (177 references).

  10. Public key cryptosystem and a key exchange protocol using tools of non-abelian group

    Directory of Open Access Journals (Sweden)

    H. K. Pathak,

    2010-07-01

    Full Text Available Public Key Cryptosystems assure privacy as well as integrity of the transactions between two parties. The sizes of the keys play an important role. The larger the key the harder is to crack a block ofencrypted data. We propose a new public key cryptosystem and a Key Exchange Protocol based on the generalization of discrete logarithm problem using Non-abelian group of block upper triangular matrices of higher order. The proposed cryptosystem is efficient in producing keys of large sizes without the need of large primes. The security of both the systems relies on the difficulty of discrete logarithms over finite fields.

  11. Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution

    Science.gov (United States)

    Bao, Haize; Bao, Wansu; Wang, Yang; Zhou, Chun; Chen, Ruike

    2016-05-01

    Compared with two-level quantum key distribution (QKD), high-dimensional QKD enables two distant parties to share a secret key at a higher rate. We provide a finite-key security analysis for the recently proposed practical high-dimensional decoy-state QKD protocol based on time-energy entanglement. We employ two methods to estimate the statistical fluctuation of the postselection probability and give a tighter bound on the secure-key capacity. By numerical evaluation, we show the finite-key effect on the secure-key capacity in different conditions. Moreover, our approach could be used to optimize parameters in practical implementations of high-dimensional QKD.

  12. Characterizing Autism Spectrum Disorders by Key Biochemical Pathways

    Directory of Open Access Journals (Sweden)

    Megha eSubramanian

    2015-09-01

    Full Text Available The genetic and phenotypic heterogeneity of autism spectrum disorders (ASD presents a substantial challenge for diagnosis, classification, research, and treatment. Investigations into the underlying molecular etiology of ASD have often yielded mixed and at times opposing findings. Defining the molecular and biochemical underpinnings of heterogeneity in ASD is crucial to our understanding of the pathophysiological development of the disorder, and has the potential to assist in diagnosis and the rational design of clinical trials. In this review, we propose that genetically diverse forms of ASD may be usefully parsed into entities resulting from converse patterns of growth regulation at the molecular level, which lead to the correlates of general synaptic and neural overgrowth or undergrowth. Abnormal brain growth during development is a characteristic feature that has been observed both in children with autism and in mouse models of autism. We review evidence from syndromic and non-syndromic ASD to suggest that entities currently classified as autism may fundamentally differ by underlying pro- or anti-growth abnormalities in key biochemical pathways, giving rise to either excessive or reduced synaptic connectivity in affected brain regions. We posit that this classification strategy has the potential not only to aid research efforts, but also to ultimately facilitate early diagnosis and direct appropriate therapeutic interventions.

  13. Characterizing autism spectrum disorders by key biochemical pathways.

    Science.gov (United States)

    Subramanian, Megha; Timmerman, Christina K; Schwartz, Joshua L; Pham, Daniel L; Meffert, Mollie K

    2015-01-01

    The genetic and phenotypic heterogeneity of autism spectrum disorders (ASD) presents a substantial challenge for diagnosis, classification, research, and treatment. Investigations into the underlying molecular etiology of ASD have often yielded mixed and at times opposing findings. Defining the molecular and biochemical underpinnings of heterogeneity in ASD is crucial to our understanding of the pathophysiological development of the disorder, and has the potential to assist in diagnosis and the rational design of clinical trials. In this review, we propose that genetically diverse forms of ASD may be usefully parsed into entities resulting from converse patterns of growth regulation at the molecular level, which lead to the correlates of general synaptic and neural overgrowth or undergrowth. Abnormal brain growth during development is a characteristic feature that has been observed both in children with autism and in mouse models of autism. We review evidence from syndromic and non-syndromic ASD to suggest that entities currently classified as autism may fundamentally differ by underlying pro- or anti-growth abnormalities in key biochemical pathways, giving rise to either excessive or reduced synaptic connectivity in affected brain regions. We posit that this classification strategy has the potential not only to aid research efforts, but also to ultimately facilitate early diagnosis and direct appropriate therapeutic interventions.

  14. Geology and hydrogeology of the Florida Keys

    Science.gov (United States)

    Halley, Robert B.; Vacher, H. L.; Shinn,

    1997-01-01

    This chapter discusses the geology and hydrogeology of the Florida Keys, and focuses on the islands formed of Pleistocene limestone. These islands, which are crossed when driving from Miami to Key West, are typically regarded as "the Florida Keys." The outstanding and fragile character of ecosystems on and around the Florida Keys has prompted State and Federal efforts to protect and preserve the remaining public portions of the region. The Florida Keys were largely ignored during the sixteenth, seventeenth, and eighteenth centuries, although the waters just offshore provided a major shipping thoroughfare to and from the New World. The Florida Keys are now recognized as one of the great recreational and environmental resources of the United States. The islands are outposts of a laid-back, tropical resort culture that has as its foundation warmth and clear water. A significant part of the attraction is fishing, diving, and boating around the area's coral reefs, which the islands protect. But the reefs were not always so highly valued. The Florida Keys that have protected the reefs for millennia, may now be the source of the agents that may accomplish what Agassiz thought was beyond man's power a century ago.

  15. Quantum asymmetric cryptography with symmetric keys

    Science.gov (United States)

    Gao, Fei; Wen, Qiaoyan; Qin, Sujuan; Zhu, Fuchen

    2009-12-01

    Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme, which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore, the state-estimation attack to a prior QPKC scheme is demonstrated.

  16. Quantum asymmetric cryptography with symmetric keys

    OpenAIRE

    Gao, Fei; Wen, Qiao-Yan; Qin, Su-Juan; Zhu, Fu-Chen

    2008-01-01

    Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme, which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore, the state-estimation attack to a prior QPKC scheme is demonstr...

  17. Quantum walk public-key cryptographic system

    Science.gov (United States)

    Vlachou, C.; Rodrigues, J.; Mateus, P.; Paunković, N.; Souto, A.

    2015-12-01

    Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public-key is given by a quantum state generated by performing a quantum walk. We show that the protocol is secure and analyze the complexity of public key generation and encryption/decryption procedures.

  18. Quantum asymmetric cryptography with symmetric keys

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Based on quantum encryption,we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme,which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore,the state-estimation attack to a prior QPKC scheme is demonstrated.

  19. Quantum asymmetric cryptography with symmetric keys

    Institute of Scientific and Technical Information of China (English)

    GAO Fei; WEN QiaoYan; QIN SuJuan; ZHU FuChen

    2009-01-01

    Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme, which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore, the state-estimation attack to a prior QPKC scheme is demonstrated.

  20. An Efficient Key Agreement Framework to MANET

    Institute of Scientific and Technical Information of China (English)

    WANG Shun-man; TAO Ran; WANG Yue

    2006-01-01

    Protocols for key management are compared and evaluated from the point of view on mobile ad hoc networks (MANET). The issues of fault-tolerance and efficiency of key distribution protocols for group communications in MANET are addressed. Most key distribution protocols existing today are primarily designed for wire-line networks. These protocols either fail to work as intended or cannot work at all when they are applied to the demanding environment of MANET. Parameters and performance of different protocols are analyzed, and then a flat is given out, on which new protocols or existing ones are designed and modified, so that they can be robust, scalable and efficient in MANET.

  1. Quantum key distribution using three basis states

    Indian Academy of Sciences (India)

    Subhash Kak

    2000-05-01

    This note presents a method of public key distribution using quantum communication of photons that simultaneously provides a high probability that the bits have not been tampered. It is a variant of the quantum method of Bennett and Brassard (BB84) where the transmission states have been decreased from 4 to 3 and the detector states have been increased from 2 to 3. Under certain assumptions regarding method of attack, it provides superior performance (in terms of the number of usable key bits) for < 18, where is the number of key bits used to verify the integrity of the process in the BB84-protocol.

  2. Unlocking community capabilities for improving maternal and newborn health: participatory action research to improve birth preparedness, health facility access, and newborn care in rural Uganda

    Directory of Open Access Journals (Sweden)

    Elizabeth Ekirapa-Kiracho

    2016-11-01

    Full Text Available Abstract Background Community capacities and resources must be harnessed to complement supply side initiatives addressing high maternal and neonatal mortality rates in Uganda. This paper reflects on gains, challenges and lessons learnt from working with communities to improve maternal and newborn health in rural Uganda. Methods A participatory action research project was supported from 2012 to 2015 in three eastern districts. This project involved working with households, saving groups, sub county and district leaders, transporters and village health teams in diagnosing causes of maternal and neonatal mortality and morbidity, developing action plans to address these issues, taking action and learning from action in a cyclical manner. This paper draws from project experience and documentation, as well as thematic analysis of 20 interviews with community and district stakeholders and 12 focus group discussions with women who had recently delivered and men whose wives had recently delivered. Results Women and men reported increased awareness about birth preparedness, improved newborn care practices and more male involvement in maternal and newborn health. However, additional direct communication strategies were required to reach more men beyond the minority who attended community dialogues and home visits. Saving groups and other saving modalities were strengthened, with money saved used to meet transport costs, purchase other items needed for birth and other routine household needs. However saving groups required significant support to improve income generation, management and trust among members. Linkages between savings groups and transport providers improved women’s access to health facilities at reduced cost. Although village health teams were a key resource for providing information, their efforts were constrained by low levels of education, inadequate financial compensation and transportation challenges. Ensuring that the village health

  3. Proposing New Wilderness Areas: Okefenokee, Pelican Islands, Island Bay, Cedar Keys, Passage Key, and Wichita Mountains

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — President Transmittal on the proposal of wilderness additions that include Okefenokee, Pelican Islands, Island Bay, Cedar Keys, Passage Key, and Wichita Mountains.

  4. MycoKey 2.1 [dvd

    DEFF Research Database (Denmark)

    Læssøe, Thomas; Petersen, Jens Henrik

    MycoKey 2.1 indeholder synoptiske digitale nøgler, beskrivelser og noteapparater til 850 svampeslægter,der forekommer i Nordeuropa - alle frugtlegemdannende basidiesvampe og alle skivesvampe med 3600 fotografier og 15000 linkede referencer...

  5. Clinical Trials: Key to Medical Progress

    Science.gov (United States)

    Skip Navigation Bar Home Current Issue Past Issues Clinical Trials: Key to Medical Progress Past Issues / Summer 2008 ... this page please turn Javascript on. Photo iStock Clinical trials are research studies that test how well new ...

  6. PDS4 Training: Key Concepts and Vocabulary

    Science.gov (United States)

    Gordon, M. K.; Guinness, E. A.; Neakrase, L. D. V.; Padams, J.; Raugh, A. C.

    2017-06-01

    Those planning to attend the PDS4 training session are strongly encouraged to review this poster prior to the training session. This poster briefly describes new vocabulary and a number of key concepts introduced with PDS4.

  7. Interactive simulations for quantum key distribution

    CERN Document Server

    Kohnle, Antje

    2016-01-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualization Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different quantum key distribution protocols. The simulations use either...

  8. Reparable Key Distribution Protocols for Internet Environments

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    It has claimed that any practical way to achieve perfect reparability for key distribution protocol (KDP) could only be futile. Fortunately, this paper presents reparable KDPs for internet environments with the use of the concept of timestamps.

  9. Benthic Habitats of the Florida Keys

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The benthic habitats of the Florida Keys were mapped from a series of 450 aerial photographs. Ecologists outlined the boundaries of specific habitat types by...

  10. Key Technologies for Optical Packet Switching

    Institute of Scientific and Technical Information of China (English)

    Akira; Okada

    2003-01-01

    The paper describes our recent progress on key technologies and components for realizing optical packet switching, including an out-of-band optical label switching technique, an optical packet synchronizer and a burst-mode optical receiver.

  11. Key Technologies for Optical Packet Switching

    Institute of Scientific and Technical Information of China (English)

    Akira Okada

    2003-01-01

    The paper describes our recent progress on key technologies and components for realizing optical packet switching,including an out-of-band optical label switching technique, an optical packet synchronizer and a burst-mode optical receiver.

  12. Keys to Successful EPIQ Business Demonstrator Implementation

    NARCIS (Netherlands)

    Shoikova, Elena; Denishev, Vladislav

    2009-01-01

    Shoikova, E., & Denishev, V. (2009). Keys to Successful EPIQ Business Demonstrator Implementation. Paper presented at the 'Open workshop of TENCompetence - Rethinking Learning and Employment at a Time of Economic Uncertainty-event'. November, 19, 2009, Manchester, United Kingdom: TENCompetence. [unp

  13. A Key to the Anophelines of Iran

    Directory of Open Access Journals (Sweden)

    Eugene R. Shahgudian

    1960-01-01

    Full Text Available Keys for identification of adult females and fourth instar larvae of Anopheline Mosquitoes of Iran with brief review of important literature on the Iranian Anopheline Fauna are given in this paper

  14. Keys to Successful EPIQ Business Demonstrator Implementation

    NARCIS (Netherlands)

    Shoikova, Elena; Denishev, Vladislav

    2009-01-01

    Shoikova, E., & Denishev, V. (2009). Keys to Successful EPIQ Business Demonstrator Implementation. Paper presented at the 'Open workshop of TENCompetence - Rethinking Learning and Employment at a Time of Economic Uncertainty-event'. November, 19, 2009, Manchester, United Kingdom: TENCompetence. [unp

  15. New Cholesterol Fighting Meds Target Key Gene

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_165942.html New Cholesterol Fighting Meds Target Key Gene Two trials show ... New gene-based therapies appear to significantly decrease cholesterol levels in people, and could even cut down ...

  16. Key Issues in Business English Curriculum Design

    Institute of Scientific and Technical Information of China (English)

    计越波

    2009-01-01

    This article aims to explore the key factors involved in business English curriculum design and the ways of analyzing the needs of teachers and students,course design as well as the teaching strategies.

  17. A String-Based Public Key Cryptosystem

    CERN Document Server

    Andrecut, M

    2014-01-01

    Traditional public key cryptography is based on number theory, and suffers from problems such as dealing with very large numbers and large prime numbers, making key creation cumbersome. Here, we propose a new public key cryptosystem based on strings only, which avoids the difficulties of the traditional number theory approach. The security mechanism for generating public and secret keys is ensured by a recursive encoding mechanism embedded in a quasi-commutative-random function, resulted from the composition of a quasi-commutative function with a pseudo-random function. Due to the inherent construction algorithm of the the proposed cryptosystem, the resulted mathematical inversion problem is likely to be harder than the classical discrete logarithm or integer factorization problems. Furthermore, the proposed cryptosystem is immune against the known quantum algorithm attacks.

  18. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  19. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if speci

  20. 78 FR 79061 - Noise Exposure Map Notice; Key West International Airport, Key West, FL

    Science.gov (United States)

    2013-12-27

    ... Federal Aviation Administration Noise Exposure Map Notice; Key West International Airport, Key West, FL... Administration (FAA) announces its determination that the Noise Exposure Maps submitted by Monroe County for the Key West International Airport under the provisions of the Aviation Safety and Noise Abatement Act...

  1. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if

  2. On Atomistic Models for Molecular Oxygen

    DEFF Research Database (Denmark)

    Javanainen, Matti; Vattulainen, Ilpo; Monticelli, Luca

    2017-01-01

    Molecular oxygen (O2) is key to all life on earth, as it is constantly cycled via photosynthesis and cellular respiration. Substantial scientific effort has been devoted to understanding every part of this cycle. Classical molecular dynamics (MD) simulations have been used to study some of the key...... processes involved in cellular respiration: O2 permeation through alveolar monolayers and cellular membranes, its binding to hemoglobin during transport in the bloodstream, as well as its transport along optimal pathways toward its reduction sites in proteins. Moreover, MD simulations can help interpret...

  3. Quantum walks public key cryptographic system

    OpenAIRE

    Vlachou, C; Rodrigues, J.; Mateus, P.; Paunković, N.; Souto, A.

    2016-01-01

    Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public key is given by a quantum state generated by performing a quantum walk. We show that th...

  4. SAXICOLE BRYOPHYTES FROM VÂLSAN KEYS

    OpenAIRE

    Codruţa Mihaela Dobrescu; Liliana Cristina Soare

    2015-01-01

    The paper presents a review of the saxicole species in the Vâlsan Keys and considerations regarding the bryophytic saxicole cenoses from the protected area. To analyze the diversity of the saxicole bryophytes, we considered the number of species, as well as the phytogeografical element, the growth form and the “life strategy” of each species. From the systematic perspective, Vâlsan Keys are featured by a high specific diversity of the saxicole bryophytes.

  5. IDENTIFYING KEY CONTRIBUTIONS TO INFORMATION SCIENCE,

    Science.gov (United States)

    Several alternative approaches were examined to determine how one might identify some of the key (written) contributions to ’ information science ’. The...references. The unclear selective patterns in current bibliographies in the information science field also present problems. It is suggested that in...identifying key contributions we are far from common agreement on the conceptual, methodological or practical contributions to the information science field

  6. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  7. SAXICOLE BRYOPHYTES FROM VÂLSAN KEYS

    Directory of Open Access Journals (Sweden)

    Codruţa Mihaela Dobrescu

    2015-07-01

    Full Text Available The paper presents a review of the saxicole species in the Vâlsan Keys and considerations regarding the bryophytic saxicole cenoses from the protected area. To analyze the diversity of the saxicole bryophytes, we considered the number of species, as well as the phytogeografical element, the growth form and the “life strategy” of each species. From the systematic perspective, Vâlsan Keys are featured by a high specific diversity of the saxicole bryophytes.

  8. Failure of Kak quantum key distribution protocol

    Indian Academy of Sciences (India)

    Ching-Nung Yang; Su-Hsuan Chu; Bing-Ling Lu

    2005-01-01

    Kak's quantum key distribution (QKD) protocol provides not only the distribution but also the integrity of secret key simultaneously in quantum channel. Consequently the additional exchange of information, used to check whether an eavesdropper exists, is unnecessary. In this comment, we will point out the failure of Kak's protocol and show that Kak's protocol does not have the joint distribution and integration that the author declares in [1].

  9. A road map for molecular ecology.

    Science.gov (United States)

    Andrew, Rose L; Bernatchez, Louis; Bonin, Aurélie; Buerkle, C Alex; Carstens, Bryan C; Emerson, Brent C; Garant, Dany; Giraud, Tatiana; Kane, Nolan C; Rogers, Sean M; Slate, Jon; Smith, Harry; Sork, Victoria L; Stone, Graham N; Vines, Timothy H; Waits, Lisette; Widmer, Alex; Rieseberg, Loren H

    2013-05-01

    The discipline of molecular ecology has undergone enormous changes since the journal bearing its name was launched approximately two decades ago. The field has seen great strides in analytical methods development, made groundbreaking discoveries and experienced a revolution in genotyping technology. Here, we provide brief perspectives on the main subdisciplines of molecular ecology, describe key questions and goals, discuss common challenges, predict future research directions and suggest research priorities for the next 20 years.

  10. Molecular Mechanisms Underlying the Arabidopsis Circadian Clock

    OpenAIRE

    Nakamichi, Norihito

    2011-01-01

    A wide range of biological processes exhibit circadian rhythm, enabling plants to adapt to the environmental day–night cycle. This rhythm is generated by the so-called ‘circadian clock’. Although a number of genetic approaches have identified >25 clock-associated genes involved in the Arabidopsis clock mechanism, the molecular functions of a large part of these genes are not known. Recent comprehensive studies have revealed the molecular functions of several key clock-associated proteins. Thi...

  11. Molecular catalysts structure and functional design

    CERN Document Server

    Gade, Lutz H

    2014-01-01

    Highlighting the key aspects and latest advances in the rapidly developing field of molecular catalysis, this book covers new strategies to investigate reaction mechanisms, the enhancement of the catalysts' selectivity and efficiency, as well as the rational design of well-defined molecular catalysts. The interdisciplinary author team with an excellent reputation within the community discusses experimental and theoretical studies, along with examples of improved catalysts, and their application in organic synthesis, biocatalysis, and supported organometallic catalysis. As a result, readers wil

  12. Real-space observation of spin-split molecular orbitals of adsorbed single-molecule magnets

    National Research Council Canada - National Science Library

    Schwöbel, Jörg; Fu, Yingshuang; Brede, Jens; Dilullo, Andrew; Hoffmann, Germar; Klyatskaya, Svetlana; Ruben, Mario; Wiesendanger, Roland

    2012-01-01

    A key challenge in the field of molecular spintronics, and for the design of single-molecule magnet-based devices in particular, is the understanding and control of the molecular coupling at the electrode interfaces...

  13. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  14. Key-Phenomenon and Religious Meaning

    Directory of Open Access Journals (Sweden)

    Lomuscio Vincenzo

    2017-09-01

    Full Text Available In this paper I develop a phenomenology of religious experience through the notion of keyphenomenon. My analysis moves from a general phenomenology of situation, in which we have to relate different phenomena according to a sense. What does “according to a sense” mean? My suggestion is that we should look for a relationship among these data when we find a key-phenomenon (among a series of phenomena that would enlighten all the others. This key-phenomenon would show a non-phenomenal meaning which would make all the others understandable. Each other datum, therefore, becomes the witness of invisible meaning through a key-witness. The key-phenomenon we choose determines the role (i.e., the truth of each datum within its situation. This phenomenological relationship belongs to both the sense of day-life situations, and that one of possible religious situations. If the religious interpretation of a situation depends on our choice of key-phenomenon, or key-witness, we have to define what kind of keyphenomenon constitutes a religious intuition.

  15. Atmospheric Quantum Key Distribution in Daylight

    Science.gov (United States)

    Buttler, William; Hughes, Richard; Morgan, George; Nordholt, Jane; Peterson, Charles

    2001-05-01

    In quantum key distribution (QKD) single-photon transmissions generate the shared, secret random number sequences, known as cryptographic keys, that are used to encrypt and decrypt secret communications. Because the security of QKD is based on principles of quantum physics an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed an experimental QKD system that uses the four-state “BB84” protocol with non-orthogonal photon polarization states and lowest-order adaptive optics to generate shared key material over multi-kilometer atmospheric, line-of-sight paths. We will present results of a daylight demonstration of this system. Key material is built up using the transmission of a photon-pulse per bit of an initial secret random sequence. We will describe the design and operation of the system, present an analysis of the system's security, efficiency and error rate, and describe the prospects for longer-distance applications of free-space QKD.

  16. Comparitive analysis on the symptoms, social function and family financial burden in 43 locked patients with severe mental illness before and after unlocked treatment%43例被关锁重性精神疾病患者解锁治疗前后对照分析

    Institute of Scientific and Technical Information of China (English)

    张勇; 杨淑恩; 田梅; 栗克清

    2011-01-01

    Objective To evaluate changes in symptoms, social function and family financial after unlock treatment of severe mental illness patient. Methods Forty- three cases were included. They were pre-treated in lock-off wards due to the severity of their mental illnesses (schizophrenia and bipolar disorder) then treated unlocked for six months after recruitment. The clinical effect of lock and unclock treatment were evaluated with positive and negative syndrome scale (PANSS) or the Bech-Rafaelsen Mania Volume Table (BRMS). Patients' social function was assessed using Social Disability Scale (SDSS). “Table of patient information to unlock” and “the economic indicators of household survey”were used to compare the patient's family financial status. Results PANSS total scores, BRMS total scores, SDSS scale scores, family economic indicators differed in before unlocking from unlock treatment for 6 months. The differences were significant (P < 0.01). Conclusions Unlock therapy significantly improves the symptoms and social function of patients with severe mental illness, reduces the financial burden of patient families, and improves the quality of life of patients and their families.%目的 比较被关锁的重性精神疾病患者解锁前后的症状、社会功能及其家庭经济负担的变化.方法 对43例被关锁的重性精神疾病患者(精神分裂症和双相障碍)于解锁前、解锁后6个月分别采用阳性与阴性症状量表(PANSS)或Bech-Rafaelsen躁狂量表(BRMS)评定临床效果,采用社会功能缺陷量表(SDSS)评定社会功能,采用<解锁患者信息采集表>和<解锁患者家庭经济学指标调查表>进行患者家庭经济学指标比较.结果 解锁前、解锁治疗6个月时PANSS总分、BRMS总分、SDSS总分、家庭经济学指标评定结果比较,差异有显著性(P<0.01).结论 解锁治疗显著改善了被关锁重性精神疾病患者的精神症状和社会功能,减轻了患者家庭的经济

  17. Secret Key Distillation for Continuous Variable Quantum Key Distribution against Gaussian Classical Eve

    Institute of Scientific and Technical Information of China (English)

    ZHAO Yi-Bo; HAN Zheng-Fu; CHEN Jin-Jian; GU You-Zhen; GUO Guang-Can

    2008-01-01

    The continuous variable quantum key distribution is expected to provide high secret key rate without single photon source and detector, while the lack of the effective key distillation method makes it unpractical under the high loss condition. Here we present a single-bit-reverse-reconciliation protocol against Gaussian classical Eve,which can distill the secret key through practical imperfect error correction with high efficiency. The simulation results show that this protocol can distill secret keys even when the transmission fibre is longer than 150 km,which may make the continuous variable scheme to outvie the single photon one.

  18. Quantum Key Distribution Using Decoy State Protocol

    Directory of Open Access Journals (Sweden)

    Sellami Ali

    2009-01-01

    Full Text Available Problem statement: Quantum key distribution provides unconditional security guaranteed by the fundamental laws of quantum physics. Unfortunately, for real-life experimental set-ups, which mainly based on faint laser pulses, the occasional production of multi-photons and channel loss make it possible for sophisticated eavesdroppers to launch various subtle eavesdropping attacks including the Photon Number Splitting (PNS attack. The decoy state protocols recently proposed to beat PNS attack and to improve dramatically distance and secure key generation rate of Quantum Key Distribution (QKD. Approach: Objective of this study was experimental implementation of weak decoy + vacuum states QKD for increasing the performance of QKD system. To show conceptually how simple it was to apply the weak decoy + vacuum state idea to a commercial QKD system, we chosen ID-3000 commercial quantum key distribution system manufactured by id quantique. To implement the weak decoy + vacuum state protocol, we had to add some new optical and electronics components to id quantique and to attenuate each signal to the intensity of either signal state or weak decoy or vacuum state randomly. Results: In our implementation, the attenuation will be done by placing a VOA (variable optical attenuator in Alice’s side. Specifically, our QKD system required the polarizations of 2 pulses from the same signal to be orthogonal. Therefore the VOA must be polarization independent so as to attenuate the two pulses equally. The VOA utilized in experiment to attenuate signals dynamically was Intensity Modulator (IM. We had implemented weak + vacuum protocol on a modified commercial QKD system over a 25 km of telecom fibers with an unconditionally secure key rate of 6.2931x10-4 per pulse. Conclusion: By making simple modifications to a commercial quantum key distribution system, we could achieve much better performance with substantially higher key generation rate and longer distance than

  19. Molecular imprinting: perspectives and applications.

    Science.gov (United States)

    Chen, Lingxin; Wang, Xiaoyan; Lu, Wenhui; Wu, Xiaqing; Li, Jinhua

    2016-04-21

    Molecular imprinting technology (MIT), often described as a method of making a molecular lock to match a molecular key, is a technique for the creation of molecularly imprinted polymers (MIPs) with tailor-made binding sites complementary to the template molecules in shape, size and functional groups. Owing to their unique features of structure predictability, recognition specificity and application universality, MIPs have found a wide range of applications in various fields. Herein, we propose to comprehensively review the recent advances in molecular imprinting including versatile perspectives and applications, concerning novel preparation technologies and strategies of MIT, and highlight the applications of MIPs. The fundamentals of MIPs involving essential elements, preparation procedures and characterization methods are briefly outlined. Smart MIT for MIPs is especially highlighted including ingenious MIT (surface imprinting, nanoimprinting, etc.), special strategies of MIT (dummy imprinting, segment imprinting, etc.) and stimuli-responsive MIT (single/dual/multi-responsive technology). By virtue of smart MIT, new formatted MIPs gain popularity for versatile applications, including sample pretreatment/chromatographic separation (solid phase extraction, monolithic column chromatography, etc.) and chemical/biological sensing (electrochemical sensing, fluorescence sensing, etc.). Finally, we propose the remaining challenges and future perspectives to accelerate the development of MIT, and to utilize it for further developing versatile MIPs with a wide range of applications (650 references).

  20. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    Science.gov (United States)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  1. 长牡蛎细胞周期调控关键基因cyclin B3 的克隆及其在性腺发育中的作用%Molecular cloning and characterization of the key regulator of cell cycle cyclin B3 in Pacific Oyster (Crassostrea gigas), and its role in gonad development

    Institute of Scientific and Technical Information of China (English)

    王桐; 李莉; 阙华勇; 张国范

    2011-01-01

    首次在长牡蛎(Crassostrea gigas)中克隆得到细胞周期蛋白B3(cyclin B3)的cDNA 全长序列和基因组结构序列。cyclin B3 基因cDNA 全长2383 bp, 其中编码区长度为1293 bp, 编码一条含430 个氨基酸的多肽链, 氨基酸序列比对和结构域分析均表明其为其他物种cyclin B3 的同源蛋白, 预测的蛋白大小为47.8 kD。cyclin B3 基因含有10 个外显子和9 个内含子, 外显子和内含子的数目和大小与其物种的进化地位相符。Real Time PCR 分析表明, 该基因表达有较强的组织特异性, cyclin B3 mRNA 在性腺中的含量最高, 而在外套膜中的含量最少, 前者是后者的92 倍左右; 对处于不同发育阶段性腺中cyclin B3 基因表达分析结果显示, 性腺中cyclin B3 mRNA 含量随性腺发育程度的提高而提高, 这与其在细胞分裂和减数分裂中的作用相符, 同时也有助于满足早期胚胎发育时期旺盛的细胞分裂对cyclin B3 蛋白需求。%The full length cDNA sequence of cyclin B3 was cloned from Pacific oyster (Crassostrea gigas) for the first time. Cyclin B3 cDNA was 2383 bp in length, containing a 1293bp CDS that encoded a peptide of 430 amino acids with a calculated molecular weight of 47.8 kD. Multiple alignment and converted domain analysis showed that this peptide was a homolog of cyclin B3. The gDNA sequence of cyclin B3 contained 10 exons and 9 introns, which was consistent with the position in evolution of C. gigas. Expression of cyclin B3 gene was found in all tissues, but also showed a very strong tissue-specific feature; the amount of cyclin B3 in gonad was the highest among tissues, 100 times of mantle, the lowest expression tissue. The mRNA amount of cyclin B3 in gonad increased with the maturation of gonad. The expression implied the important role of cyclin B3 in mitosis, meiosis and early development of embryo.

  2. B13+: Photodriven Molecular Wankel Engine

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Jin; Sergeeva, Alina P.; Sparta, Manuel; Alexandrova, Anastassia N.

    2012-07-09

    Synthetic molecular motors that are capable of delivering controlled movement upon energy input are one of the key building blocks in nanomachinery. The major energy sources of molecular motors are from chemical reactions, photon beams, or electric current, which are converted into mechanical forces through the excitation of the electronic states of the molecule. The energy scale of the electronic excitation is normally two orders of magnitude larger than the molecular vibrational frequencies. To reduce the heat dissipation and increase the energy utilization efficiency, a motor running purely on the electronic ground-state (GS) potential energy surfaces is highly desirable.

  3. Isolation of key retinoid signalling and metabolic modules in invertebrates

    Directory of Open Access Journals (Sweden)

    Ana André

    2014-05-01

    Full Text Available Retinoids are a class of molecules related to vitamin A (Retinol that are required for regulation of critical chordate ndocrine-mediated process, such as embryonic development, reproduction, and vision. To maintain such physiological process, chordates have a complex mechanism to regulate the spatial and temporal distribution of retinoids that includes metabolic and signalling modules. Initially, retinoid modules were seen as a chordate novelty. However, emerging biochemical and genomic evidences have challenged this view, clearly pointing to a more basal ancestry than previously thought. However, for the majority of non-chordate invertebrate lineages a clearly characterization of the main enzymatic/molecular players is still missing. Despite limited, the available evidence supports the presence of biologically active retinoid pathways in invertebrates. In order to enhance our insights on retinoid biology, evolution, and its putative disruption by environmental chemicals, the isolation and functional characterization of key retinoid metabolic players in marine invertebrates has been carried out.

  4. An ignition key for atomic-scale engines.

    Science.gov (United States)

    Dundas, Daniel; Cunningham, Brian; Buchanan, Claire; Terasawa, Asako; Paxton, Anthony T; Todorov, Tchavdar N

    2012-10-10

    A current-carrying resonant nanoscale device, simulated by non-adiabatic molecular dynamics, exhibits sharp activation of non-conservative current-induced forces with bias. The result, above the critical bias, is generalized rotational atomic motion with a large gain in kinetic energy. The activation exploits sharp features in the electronic structure, and constitutes, in effect, an ignition key for atomic-scale motors. A controlling factor for the effect is the non-equilibrium dynamical response matrix for small-amplitude atomic motion under current. This matrix can be found from the steady-state electronic structure by a simpler static calculation, providing a way to detect the likely appearance, or otherwise, of non-conservative dynamics, in advance of real-time modelling.

  5. An Effective Contributory Re-Keying Approach to Compute Conference Key

    Directory of Open Access Journals (Sweden)

    D. Thilagavathy

    2011-01-01

    Full Text Available Problem statement: With the explosive growth of and internet and web applications many emerging group-oriented distributed applications such as tele/video-conferencing, multiplayer games are based on group communication model that need security services such as privacy and data integrity Hence a secure distributed group key agreement is required to establish and authenticate a common group key for secure and private communication. There is a need for security services to provide group-oriented communication privacy and data integrity. It is important that members of the group can establish a common secret key for encrypting group communication. A key tree approach has been proposed by many authors to distribute group key in such a way that the re keying cost scales with the logarithm of the group size for a join or leave request. The efficiency of this key tree approach critically depends on whether the key tree remains balanced over time as members join or leaves Approach: Instead of performing individual re-keying operations, an interval-based approach of re keying is adopted in the proposed scheme. Results: In the proposed scheme Queue-merge algorithm is used for re keying which substantially reduces the computation cost and communication cost. The comparison shows that queue merge algorithm performs better than Batch algorithm in terms of minimizing the key tree and presumes better node density thereby reducing the computation cost. Conclusion: Performance comparison also shows reduced number of renewed nodes for various re keying interval which reduces the communication cost.

  6. Temporal Analysis of Windows MRU Registry Keys

    Science.gov (United States)

    Zhu, Yuandong; Gladyshev, Pavel; James, Joshua

    The Microsoft Windows registry is an important resource in digital forensic investigations. It contains information about operating system configuration, installed software and user activity. Several researchers have focused on the forensic analysis of the Windows registry, but a robust method for associating past events with registry data values extracted from Windows restore points is not yet available. This paper proposes a novel algorithm for analyzing the most recently used (MRU) keys found in consecutive snapshots of the Windows registry. The algorithm compares two snapshots of the same MRU key and identifies data values within the key that have been updated in the period between the two snapshots. User activities associated with the newly updated data values can be assumed to have occurred during the period between the two snapshots.

  7. Experimental quantum key distribution with source flaws

    Science.gov (United States)

    Xu, Feihu; Wei, Kejin; Sajeed, Shihan; Kaiser, Sarah; Sun, Shihai; Tang, Zhiyuan; Qian, Li; Makarov, Vadim; Lo, Hoi-Kwong

    2015-09-01

    Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.

  8. Bayesian hypothesis testing for key comparisons

    Science.gov (United States)

    Wübbeler, Gerd; Bodnar, Olha; Elster, Clemens

    2016-08-01

    Unilateral degrees of equivalence are the key result in the analysis of key comparison data and they are used to approve, or disapprove, calibration and measurement capabilities of the participating laboratories. To this end, it is checked whether a degree of equivalence differs significantly from zero. Proceeding in such a way can be viewed as carrying out a classical hypothesis test. We develop a Bayesian counterpart to this approach which has the advantage that it can include prior assessment of the corresponding Consultative Committee about the calibration and measurement capabilities of the participating laboratories. Simple expressions are derived and their implementation is provided in terms of MATLAB® and R programs. The novel procedure is illustrated by its application to two recent key comparisons CCL-K1 and CCM.FF-K4.1.2011.

  9. Multiple-Access Quantum Key Distribution Networks

    CERN Document Server

    Razavi, Mohsen

    2011-01-01

    This paper addresses multi-user quantum key distribution networks, in which any two users can mutually exchange a secret key without trusting any other nodes. The same network also supports conventional classical communications by assigning two different wavelength bands to quantum and classical signals. Time and code division multiple access (CDMA) techniques, within a passive star network, are considered. In the case of CDMA, it turns out that the optimal performance is achieved at a unity code weight. A listen-before-send protocol is then proposed to improve secret key generation rates in this case. Finally, a hybrid setup with wavelength routers and passive optical networks, which can support a large number of users, is considered and analyzed.

  10. An absolute measure for a key currency

    Science.gov (United States)

    Oya, Shunsuke; Aihara, Kazuyuki; Hirata, Yoshito

    It is generally considered that the US dollar and the euro are the key currencies in the world and in Europe, respectively. However, there is no absolute general measure for a key currency. Here, we investigate the 24-hour periodicity of foreign exchange markets using a recurrence plot, and define an absolute measure for a key currency based on the strength of the periodicity. Moreover, we analyze the time evolution of this measure. The results show that the credibility of the US dollar has not decreased significantly since the Lehman shock, when the Lehman Brothers bankrupted and influenced the economic markets, and has increased even relatively better than that of the euro and that of the Japanese yen.

  11. Multi-Seed Key Distribution Scheme Test

    Institute of Scientific and Technical Information of China (English)

    XIE Yumin; SHI Feng; MING Yang; Muhammad Kamran; YANG Xiaoxu

    2006-01-01

    The key problem of securing multicast is to generate, distribute and update Session Encryption Key(SEK). Polynomial expansion with multi-seed(MPE) scheme is an approach which is based on Polynomial expansion(PE) scheme and overcomes PE's shortage. Its operation is demonstrated by using multi-seed, the group member is partitioned to many subgroups. While updating the SEK, computation is needed only in one of subgroups, the other of them will use the computation history to update their SEK. The key problems to design a MPE scheme application includes to find a feasible one way function as well as to generate a Strict Prime Number(SPN). Those technologies with multi-seed and computation history concepts make MPE as a good choice in practical applications. A prototype test system is designed and solutions of all above mentioned problems are included in this proposed paper.

  12. MOBILE PAYMENTMETHODBASED ON PUBLIC-KEY CRYPTOGRAPHY

    Directory of Open Access Journals (Sweden)

    Adnan A. Hnaif

    2015-03-01

    Full Text Available Mobile payment is defined as mobile money, which is considered as an attractive alternative for cash, cheque, or credit. In this paper we propose a new secure mobile paymentmethod. This method is summarized in three processes: firstly, the authentication process, which involves the authentication phases for the applied customers. Secondly, the member recognition process which tests and ensures the customer membership by the market server. Finally, payment processwhich will be done by ciphering the customer information using public-key encryption cryptosystem (RSA, to be submitted over an insecure network to the market server. Actually, this mobile payment methodis more efficient than otherpayment methods since the customer can pay from his/her own mobilephone without any extra cost and effort. The RSA public-key encryption system ensures the security of the proposed method. However, to prevent a brute force attack, the choice of the key size becomes crucial.

  13. A Novel Method for Generating Encryption Keys

    Directory of Open Access Journals (Sweden)

    Dascalescu Ana Cristina

    2009-12-01

    Full Text Available The development of the informational society, which has led to an impressive growth of the information volume circulating in the computer networks, has accelerated the evolution and especially the use of modern cryptography instruments. Today, the commercial products use standard cryptographic libraries that implement certified and tested cryptographic algorithms. Instead, the fragility ofencryption algorithms is given by compositional operations like key handling or key generation. In this sense, the article proposes an innovative method to generate pseudorandom numbers which can be used for the construction of secure stream encryption keys. The proposed method is based on the mathematical complements based on the algebra of the finite fields and uses a particularized structure of the linear feedback shift registers.

  14. Reference frame independent quantum key distribution

    CERN Document Server

    Laing, Anthony; Rarity, John G; O'Brien, Jeremy L

    2010-01-01

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three dimensional qutrit case.

  15. ARQ-Based Secret Key Sharing

    CERN Document Server

    Ghany, Mohamed Abdel; Gamal, Hesham El

    2008-01-01

    This paper develops a novel framework for sharing secret keys using existing Automatic Repeat reQuest (ARQ) protocols. Our approach exploits the multi-path nature of the wireless environment to hide the key from passive eavesdroppers. The proposed framework does not assume the availability of any prior channel state information (CSI) and exploits only the one bit ACK/NACK feedback from the legitimate receiver. Compared with earlier approaches, the main innovation lies in the distribution of key bits among multiple ARQ frames. Interestingly, this idea allows for achieving a positive secrecy rate even when the eavesdropper experiences more favorable channel conditions, on average, than the legitimate receiver. In the sequel, we characterize the information theoretic limits of the proposed schemes, develop low complexity explicit implementations, and conclude with numerical results that validate our theoretical claims.

  16. Quantum attacks on public-key cryptosystems

    CERN Document Server

    Yan, Song Y

    2013-01-01

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all?known quantum comput

  17. Key Predistribution Schemes for Distributed Sensor Networks

    CERN Document Server

    Bose, Mausumi; Mukerjee, Rahul

    2011-01-01

    Key predistribution schemes for distributed sensor networks have received significant attention in the recent literature. In this paper we propose a new construction method for these schemes based on combinations of duals of standard block designs. Our method is a broad spectrum one which works for any intersection threshold. By varying the initial designs, we can generate various schemes and this makes the method quite flexible. We also obtain explicit algebraic expressions for the metrics for local connectivity and resiliency. These schemes are quite efficient with regard to connectivity and resiliency and at the same time they allow a straightforward shared-key discovery.

  18. Applying Evolutionary Algorithm to Public Key Cryptosystems

    Institute of Scientific and Technical Information of China (English)

    Tu Hang; Li Li; Wu Tao-jun; Li Yuan- xiang

    2003-01-01

    A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under different conditions. Taking into account the factors of time, space and security integrated, this scheme possessed strong practicability. The paper also proposed a model of multi degree parallel evolutionary algorithrn to evaluate synthetically the efficiency and security of the public key cryptography. The model con tributes to designing public key cryptography system too.

  19. Unsymmetrical Quantum Key Distribution Using Tripartite Entanglement

    Institute of Scientific and Technical Information of China (English)

    XIONG Jin; ZHANG Zhe-Shen; ZHOU Nan-Run; PENG Jin-Ye; ZENG Gui-Hua

    2007-01-01

    An unsymmetrical quantum key distribution protocol is proposed,in which Greenberger-Horne-Zeilinger (GHZ) triplet states are used to obtain the secret key.Except the lost qubits due to the unperfectness of the physical devices,the unsymmetrical characteristic makes all transmitted qubits useful.This leads to an excellent efficiency,which reaches 100% in an ideal case.The security is studied from the aspect of information theory.By using the correlation of the GHZ tripartite entanglement state,eavesdropping can be easily checked out,which indicates that the presented protocol is more secure.

  20. Key nuclear reaction experiments discoveries and consequences

    CERN Document Server

    Paetz gen. Schieck, Hans

    2015-01-01

    In this book the author charts the developments in nuclear physics since its inception around a century ago by reviewing the key experiments that helped drive and shape our understanding of the field, especially in the context of the wider developments in physics in the early 20th Century. In addition to providing a path through the field and the crucial events it looks at how these experiments not only answered key questions at the time but presented new challenges to the contemporary perception of the nuclear and sub-atomic worlds and how they helped develop our present understanding of nuclear physics.

  1. Encryption key distribution via chaos synchronization.

    Science.gov (United States)

    Keuninckx, Lars; Soriano, Miguel C; Fischer, Ingo; Mirasso, Claudio R; Nguimdo, Romain M; Van der Sande, Guy

    2017-02-24

    We present a novel encryption scheme, wherein an encryption key is generated by two distant complex nonlinear units, forced into synchronization by a chaotic driver. The concept is sufficiently generic to be implemented on either photonic, optoelectronic or electronic platforms. The method for generating the key bitstream from the chaotic signals is reconfigurable. Although derived from a deterministic process, the obtained bit series fulfill the randomness conditions as defined by the National Institute of Standards test suite. We demonstrate the feasibility of our concept on an electronic delay oscillator circuit and test the robustness against attacks using a state-of-the-art system identification method.

  2. Secure Key Management Protocol in WIMAX

    Directory of Open Access Journals (Sweden)

    Noudjoud Kahya

    2012-12-01

    Full Text Available The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16, is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS to Subscriber Station (SS. In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. Wefound that PKMv2 is vulnerable to replay, DoS, Man-in-the middle attacks. At last we have proposed asecure protocol (SPKM to prevent the authorization protocol from such attacks.

  3. Encryption key distribution via chaos synchronization

    Science.gov (United States)

    Keuninckx, Lars; Soriano, Miguel C.; Fischer, Ingo; Mirasso, Claudio R.; Nguimdo, Romain M.; Van der Sande, Guy

    2017-01-01

    We present a novel encryption scheme, wherein an encryption key is generated by two distant complex nonlinear units, forced into synchronization by a chaotic driver. The concept is sufficiently generic to be implemented on either photonic, optoelectronic or electronic platforms. The method for generating the key bitstream from the chaotic signals is reconfigurable. Although derived from a deterministic process, the obtained bit series fulfill the randomness conditions as defined by the National Institute of Standards test suite. We demonstrate the feasibility of our concept on an electronic delay oscillator circuit and test the robustness against attacks using a state-of-the-art system identification method. PMID:28233876

  4. REVIVAL PLANS, Ten Key Sectors Benefit?

    Institute of Scientific and Technical Information of China (English)

    Yantai CHEN; Hongbo CAI; Yang XU

    2009-01-01

    @@ To revive China's industrial establishment during the biggest Great Depression in the world after World War Ⅱ,China's Central government has launched the "Revival Plans of Ten Key Sectors"plus the 4 trillion stimulus package in the early 2009.Formulated by the National Development and Planning Commission(NDRC).these revival plans aimed at reinvigorating"ten key sectors",to be specified.the iron and steel.automotive,shipbuilding,petrochemical,textile,light,nonferrous metals,equipment manufacturing,electronics and information technology,and logistics industrial sectors.

  5. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    Science.gov (United States)

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  6. Cadmium carcinogenesis – some key points

    OpenAIRE

    2011-01-01

    The article presents briefly the main mechanisms of cadmium carcinogenesis and the most important sites of cancer (lung, breast, prostate, testes, kidney) induced by cadmium. In spite of some evidence showing carcinogenic potential of cadmium, further research is still required to elucidate the relative contributions of various molecular mechanisms involved in cadmium carcinogenesis

  7. Cadmium carcinogenesis – some key points

    Directory of Open Access Journals (Sweden)

    Loreta Strumylaite

    2011-09-01

    Full Text Available The article presents briefly the main mechanisms of cadmium carcinogenesis and the most important sites of cancer (lung, breast, prostate, testes, kidney induced by cadmium. In spite of some evidence showing carcinogenic potential of cadmium, further research is still required to elucidate the relative contributions of various molecular mechanisms involved in cadmium carcinogenesis

  8. CO2 studies remain key to understanding a future world.

    Science.gov (United States)

    Becklin, Katie M; Walker, S Michael; Way, Danielle A; Ward, Joy K

    2017-04-01

    Contents 34 I. 34 II. 36 III. 37 IV. 37 V. 38 38 References 38 SUMMARY: Characterizing plant responses to past, present and future changes in atmospheric carbon dioxide concentration ([CO2 ]) is critical for understanding and predicting the consequences of global change over evolutionary and ecological timescales. Previous CO2 studies have provided great insights into the effects of rising [CO2 ] on leaf-level gas exchange, carbohydrate dynamics and plant growth. However, scaling CO2 effects across biological levels, especially in field settings, has proved challenging. Moreover, many questions remain about the fundamental molecular mechanisms driving plant responses to [CO2 ] and other global change factors. Here we discuss three examples of topics in which significant questions in CO2 research remain unresolved: (1) mechanisms of CO2 effects on plant developmental transitions; (2) implications of rising [CO2 ] for integrated plant-water dynamics and drought tolerance; and (3) CO2 effects on symbiotic interactions and eco-evolutionary feedbacks. Addressing these and other key questions in CO2 research will require collaborations across scientific disciplines and new approaches that link molecular mechanisms to complex physiological and ecological interactions across spatiotemporal scales.

  9. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  10. Radiology Aide. Instructor Key [and] Student Manual.

    Science.gov (United States)

    Hartwein, Jon; Dunham, John

    This manual can be used independently by students in secondary health occupations programs or by persons receiving on-the-job training in a radiology department. The manual includes an instructor's key that provides answers to the activity sheets and unit evaluations. The manual consists of the following five units: (1) orientation to radiology;…

  11. Quantum cryptography beyond quantum key distribution

    NARCIS (Netherlands)

    A. Broadbent (Anne); C. Schaffner (Christian)

    2016-01-01

    textabstractQuantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness

  12. Quantum cryptography beyond quantum key distribution

    NARCIS (Netherlands)

    Broadbent, A.; Schaffner, C.

    2016-01-01

    Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation,

  13. TRANSITIONAL JUSTICE AND DEMOCRATIC CHANGE: KEY CONCEPTS

    Directory of Open Access Journals (Sweden)

    ELENA ANDREEVSKA

    2013-05-01

    Full Text Available This Article proposes a genealogy of transitional justice and focuses on transitional justice as one of the key steps in peace building that needs to be taken to secure a stable democratic futureTransitional justice is a response to systematic or widespread violations of human rights. It seeks recognition for victims and promotion of possibilities for peace, reconciliation and democracy. The paper focuses on key concepts of transitional justice before addressing its traditional components: justice, reparation, truth and institutional reform. This Article meeting point on the transitional process in a society which has experienced a violent conflict and needs adequate mechanisms to deal with the legacies of the past in order to prevent future violence and cover the way for reconciliation and democratic consolidation. It provides key stakeholders with an overview of transitional justice and its different components, while examining key challenges faced by those working in this area. The present paper concludes with some remarks that challenge the traditional concept of transitional justice and its processes in order to initiate important debate on where future work in this field is needed.

  14. The LOFAR Magnetism Key Science Project

    NARCIS (Netherlands)

    Anderson, James; Beck, Rainer; Bell, Michael; de Bruyn, Ger; Chyzy, Krzysztof; Eislöffel, Jochen; Enßlin, Torsten; Fletcher, Andrew; Haverkorn, Marijke; Heald, George; Horneffer, Andreas; Noutsos, Aris; Reich, Wolfgang; Scaife, Anna; the LOFAR collaboration, [No Value

    2012-01-01

    Measuring radio waves at low frequencies offers a new window to study cosmic magnetism, and LOFAR is the ideal radio telescope to open this window widely. The LOFAR Magnetism Key Science Project (MKSP) draws together expertise from multiple fields of magnetism science and intends to use LOFAR to tac

  15. Collection Selection with Highly Discriminative Keys

    NARCIS (Netherlands)

    Bockting, S.; Hiemstra, D.

    2009-01-01

    The centralized web search paradigm introduces several problems, such as large data traffic requirements for crawling, index freshness problems and problems to index everything. In this study, we look at collection selection using highly discriminative keys and query-driven indexing as part of a dis

  16. Secure Hybrid Encryption from Weakened Key Encapsulation

    NARCIS (Netherlands)

    D. Hofheinz (Dennis); E. Kiltz (Eike); A. Menezes

    2007-01-01

    textabstractWe put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmetric encryption. Constrained chosen-ciphertext security is a new security notion for KEMs that we propose. It

  17. State Key Laboratory of Applied Organic Chemistry

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    @@The State Key Laboratory of Applied Organic Chemistry (SKLAOC) was founded in 1987 with the approval of the State Planning Commission. Professor Liu Zhongli is the director of the Laboratory and Professor Zhang Lihe, an academician of the Chinese Academy of Sciences, is the chairman of its academic committee. There are 30 faculty members, among them 21 are professors, working in the Laboratory.

  18. Key Data on Education in Europe 2012

    Science.gov (United States)

    Ranguelov, Stanislav; De Coster, Isabelle; Norani, Sogol; Paolini, Giulia

    2012-01-01

    Key Data on Education in Europe 2012 is a Eurydice flagship publication tracing the main developments of European education systems over the last decade. The report combines statistical data with qualitative information to describe the organisation, management and functioning of 37 European education systems from pre-primary to higher education.…

  19. Key Data on Education in Europe 2009

    Science.gov (United States)

    Ranguelov, Stanislav; de Coster, Isabelle; Forsthuber, Bernadette; Noorani, Sogol; Ruffio, Philippe

    2009-01-01

    This seventh edition of "Key Data on Education in Europe" retains its main special feature which is the combination of statistical data and qualitative information to describe the organisation and functioning of education systems in Europe. The present 2009 edition maintains the subject-based structure defined by the previous one but uses new…

  20. Two-Layer Quantum Key Distribution

    CERN Document Server

    Ramos, Rubens Viana

    2012-01-01

    Recently a new quantum key distribution protocol using coherent and thermal states was proposed. In this work this kind of two-layer QKD protocol is formalized and its security against the most common attacks, including external control and Trojan horse attacks, is discussed.

  1. Five Keys for Teaching Mental Math

    Science.gov (United States)

    Olsen, James R.

    2015-01-01

    After studying the Common Core State Standards for Mathematics (CCSSM) and brain-based learning research, James Olsen believes mental math instruction in secondary school mathematics (grades 7-12) and in teacher education programs needs increased attention. The purpose of this article is to share some keys for teaching mental math. Olsen also…

  2. Radiology Aide. Instructor Key [and] Student Manual.

    Science.gov (United States)

    Hartwein, Jon; Dunham, John

    This manual can be used independently by students in secondary health occupations programs or by persons receiving on-the-job training in a radiology department. The manual includes an instructor's key that provides answers to the activity sheets and unit evaluations. The manual consists of the following five units: (1) orientation to radiology;…

  3. TRANSITIONAL JUSTICE AND DEMOCRATIC CHANGE: KEY CONCEPTS

    Directory of Open Access Journals (Sweden)

    Elena ANDREEVSKA

    2013-06-01

    Full Text Available This Article proposes a genealogy of transitional justice and focuses on transitional justice as one of the key steps in peace building that needs to be taken to secure a stable democratic future. Transitional justice is a response to systematic or widespread violations of human rights. It seeks recognition for victims and promotion of possibilities for peace, reconciliation and democracy. The paper focuses on key concepts of transitional justice before addressing its traditional components: justice, reparation, truth and institutional reform. This Article meeting point on the transitional process in a society which has experienced a violent conflict and needs adequate mechanisms to deal with the legacies of the past in order to prevent future violence and cover the way for reconciliation and democratic consolidation. It provides key stakeholders with an overview of transitional justice and its different components, while examining key challenges faced by those working in this area. The present paper concludes with some remarks that challenge the traditional concept of transitional justice and its processes in order to initiate important debate on where future work in this field is needed.

  4. Team building: key to executive success.

    Science.gov (United States)

    Jacobsen-Webb, M L

    1985-02-01

    The key to executive success is management of the information overload provided by today's high technology era. Team building, through identification of behavioral styles, helps to enhance self-esteem, utilize inherent skills of individuals, and maximize decision making. The style of the team leader who shares leadership promotes communication patterns that lead to participatory management and harmony within institutions.

  5. COMMENSURABLE ENCRYPTION USING USER- DEFINE KEY TECHNIQUE

    Directory of Open Access Journals (Sweden)

    ripal dilipbhai ranpara

    2012-11-01

    Full Text Available Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world’s biggest public network, the Internet. Many Internet applications such as e-mail, databases, and browsers store a tremendous amount of personal and financial information, but frequently the data is left unprotected. Traditional network security is frequently less effective at preventing hackers from accessing this data. For instance, once-private databases are now completely exposed on the Internet. It turns out that getting to the database that holds millions of credit card numbers—the transmission—is secure through the use of cryptography, but the database itself isn’t, fueling the rise of credit card information theft. A paradigm shift is now under way for cryptography. The only way to make data secure in any application that runs over the Internet is to use secret (also known as private key cryptography. The current security methods focus on securing Internet applications using public keys techniques that are no longer effective.so according to my knowledge no one has addressed on COMMENSURABLE USER-DEFINE KEY TECHNIQUE that is used to encrypt the data as per the user-define key

  6. Youth Physical Fitness: Ten Key Concepts

    Science.gov (United States)

    Corbin, Charles B.; Welk, Gregory J.; Richardson, Cheryl; Vowell, Catherine; Lambdin, Dolly; Wikgren, Scott

    2014-01-01

    The promotion of physical fitness has been a key objective of physical education for more than a century. During this period, physical education has evolved to accommodate changing views on fitness and health. The purpose of this article is to discuss issues with fitness assessment and fitness education central to the new Presidential Youth…

  7. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  8. Five Keys for Teaching Mental Math

    Science.gov (United States)

    Olsen, James R.

    2015-01-01

    After studying the Common Core State Standards for Mathematics (CCSSM) and brain-based learning research, James Olsen believes mental math instruction in secondary school mathematics (grades 7-12) and in teacher education programs needs increased attention. The purpose of this article is to share some keys for teaching mental math. Olsen also…

  9. Election 2000: The Keys Point to Gore.

    Science.gov (United States)

    Lichtman, Allan J.

    2000-01-01

    Asserts that Vice President Al Gore will be elected in 2000 based on the performance of the Clinton administration. Utilizes the key to the White House, 13 true-or-false diagnostic questions stated as propositions. If five or less are false then the party in power wins. (CMK)

  10. Key Performance Indicators for Primary Schools.

    Science.gov (United States)

    Strand, Steve

    Focusing mostly on their application for primary schools, this document describes the educational key performance indicators (KPI) employed by the Wendsworth, England, Local Educational Authority (LEA). Indicators are divided into 3 areas, educational context, resource development, and outcomes. Contextual indicators include pupil mobility, home…

  11. Authenticity, Autonomy and Altruism: Keys for Transformation

    Science.gov (United States)

    Clarken, Rodney

    2011-01-01

    The value of authentic knowing, autonomous behavior and altruistic motivation is presented. Authenticity, autonomy and altruism are primary human capacities and keys for individual and collective transformation. Realizing the full development of these three basic potentialities can serve as goals and standards for well-being. Authenticity,…

  12. Synthesis of the key intermediate of ramelteon

    Institute of Scientific and Technical Information of China (English)

    Shan Bao Yu; Hao Min Liu; Yu Luo; Wei Lu

    2011-01-01

    Asymmetric conjugated addition of allylcopper reagents derived from an allyl Grignard reagent and CuBr·Me2S to chiral α,β-unsaturated N-acyl oxazolidinones has been achieved. The synthetic procedure was applied to the preparation of the key intermediate of the novel nonbenzodiazepine hypnotic drug, ramelteon.

  13. Keys to Survival: Highlights in Resilience Research.

    Science.gov (United States)

    Burger, Joseph V.

    1994-01-01

    Presents key themes from expanding literature on resilience, drawing from both psychological research and narratives of survivors. Focuses on Kauai study, landmark 30-year longitudinal study on resilience in 698 infants. Also examines survivors of child abuse, distinguishes between unhealthy and healthy resilience, discusses issues of separation…

  14. Test Theory Without an Answer Key.

    Science.gov (United States)

    Batchelder, William H.; Romney, A. Kimball

    1988-01-01

    A general model is presented for homogeneous, dichotomous items when the answer key is unknown. The model is related to the two-class latent structure model with the roles of respondents and items interchanged. Iterative maximum likelihood estimates of parameters and Monte Carlo assessment of estimation methods are described. (TJH)

  15. Teaching Tools for Diagnostics: The Behavior Key.

    Science.gov (United States)

    Ellsworth, J'Anne D.

    This paper presents a set of charts that may help a teacher develop a theory about what is working well in the classroom and where problems exist. Each chart is divided into two categories repeatedly. In effect, the chart serves as a dichotomous key. At each point where two choices diverge, the teacher should move to the more likely answer. The…

  16. Public key cryptography from weaker assumptions

    DEFF Research Database (Denmark)

    Zottarel, Angela

    This dissertation is focused on the construction of public key cryptographic primitives and on the relative security analysis in a meaningful theoretic model. This work takes two orthogonal directions. In the first part, we study cryptographic constructions preserving their security properties also...

  17. Quantum cryptography beyond quantum key distribution

    NARCIS (Netherlands)

    Broadbent, A.; Schaffner, C.

    2016-01-01

    Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation, secu

  18. Key Instructional Design Elements for Distance Education.

    Science.gov (United States)

    Zheng, Lihua; Smaldino, Sharon

    2003-01-01

    Suggests that distance education instructors need to understand and apply important instructional design elements in order to successfully fulfill their role as instructional designers. Reviews the most recent literature pertaining to designing instruction in distance education. Identifies some key instructional design elements for teaching at a…

  19. KEY CHARACTERISTICS OF DIFFERENT MANAGEMENT STYLES

    OpenAIRE

    AGADZHANYAN A.S.

    2015-01-01

    The article reveals main management styles practiсed by managers all over the world. The author considers key characteristics of management styles, conditions of their using. The paper analyzes cultural differences in management styles in the West and in the East.

  20. Youth Physical Fitness: Ten Key Concepts

    Science.gov (United States)

    Corbin, Charles B.; Welk, Gregory J.; Richardson, Cheryl; Vowell, Catherine; Lambdin, Dolly; Wikgren, Scott

    2014-01-01

    The promotion of physical fitness has been a key objective of physical education for more than a century. During this period, physical education has evolved to accommodate changing views on fitness and health. The purpose of this article is to discuss issues with fitness assessment and fitness education central to the new Presidential Youth…