WorldWideScience

Sample records for network usain preservation

  1. Is my network module preserved and reproducible?

    Directory of Open Access Journals (Sweden)

    Peter Langfelder

    2011-01-01

    Full Text Available In many applications, one is interested in determining which of the properties of a network module change across conditions. For example, to validate the existence of a module, it is desirable to show that it is reproducible (or preserved in an independent test network. Here we study several types of network preservation statistics that do not require a module assignment in the test network. We distinguish network preservation statistics by the type of the underlying network. Some preservation statistics are defined for a general network (defined by an adjacency matrix while others are only defined for a correlation network (constructed on the basis of pairwise correlations between numeric variables. Our applications show that the correlation structure facilitates the definition of particularly powerful module preservation statistics. We illustrate that evaluating module preservation is in general different from evaluating cluster preservation. We find that it is advantageous to aggregate multiple preservation statistics into summary preservation statistics. We illustrate the use of these methods in six gene co-expression network applications including 1 preservation of cholesterol biosynthesis pathway in mouse tissues, 2 comparison of human and chimpanzee brain networks, 3 preservation of selected KEGG pathways between human and chimpanzee brain networks, 4 sex differences in human cortical networks, 5 sex differences in mouse liver networks. While we find no evidence for sex specific modules in human cortical networks, we find that several human cortical modules are less preserved in chimpanzees. In particular, apoptosis genes are differentially co-expressed between humans and chimpanzees. Our simulation studies and applications show that module preservation statistics are useful for studying differences between the modular structure of networks. Data, R software and accompanying tutorials can be downloaded from the following webpage: http://www.genetics.ucla.edu/labs/horvath/CoexpressionNetwork/ModulePreservation.

  2. On the performance of Usain Bolt in the 100 m sprint

    Science.gov (United States)

    Hernández Gómez, J. J.; Marquina, V.; Gómez, R. W.

    2013-09-01

    Many university texts on mechanics consider the effect of air drag force, using the slowing down of a parachute as an example. Very few discuss what happens when the drag force is proportional to both u and u2. In this paper we deal with a real problem to illustrate the effect of both terms on the speed of a runner: a theoretical model of the world-record 100 m sprint of Usain Bolt during the 2009 World Championships in Berlin is developed, assuming a drag force proportional to u and to u2. The resulting equation of motion is solved and fitted to the experimental data obtained from the International Association of Athletics Federations, which recorded Bolt's position with a laser velocity guard device. It is worth noting that our model works only for short sprints.

  3. Chronopolis Digital Preservation Network

    Directory of Open Access Journals (Sweden)

    David Minor

    2010-07-01

    Full Text Available The Chronopolis Digital Preservation Initiative, one of the Library of Congress’ latest efforts to collect and preserve at-risk digital information, has completed its first year of service as a multi-member partnership to meet the archival needs of a wide range of domains.Chronopolis is a digital preservation data grid framework developed by the San Diego Supercomputer Center (SDSC at UC San Diego, the UC San Diego Libraries (UCSDL, and their partners at the National Center for Atmospheric Research (NCAR in Colorado and the University of Maryland's Institute for Advanced Computer Studies (UMIACS.Chronopolis addresses a critical problem by providing a comprehensive model for the cyberinfrastructure of collection management, in which preserved intellectual capital is easily accessible, and research results, education material, and new knowledge can be incorporated smoothly over the long term. Integrating digital library, data grid, and persistent archive technologies, Chronopolis has created trusted environments that span academic institutions and research projects, with the goal of long-term digital preservation.A key goal of the Chronopolis project is to provide cross-domain collection sharing for long-term preservation. Using existing high-speed educational and research networks and mass-scale storage infrastructure investments, the partnership is leveraging the data storage capabilities at SDSC, NCAR, and UMIACS to provide a preservation data grid that emphasizes heterogeneous and highly redundant data storage systems.In this paper we will explore the major themes within Chronopolis, including:a The philosophy and theory behind a nationally federated data grid for preservation. b The core tools and technologies used in Chronopolis. c The metadata schema that is being developed within Chronopolis for all of the data elements. d Lessons learned from the first year of the project.e Next steps in digital preservation using Chronopolis: how we

  4. Preserved Network Metrics across Translated Texts

    Science.gov (United States)

    Cabatbat, Josephine Jill T.; Monsanto, Jica P.; Tapang, Giovanni A.

    2014-09-01

    Co-occurrence language networks based on Bible translations and the Universal Declaration of Human Rights (UDHR) translations in different languages were constructed and compared with random text networks. Among the considered network metrics, the network size, N, the normalized betweenness centrality (BC), and the average k-nearest neighbors, knn, were found to be the most preserved across translations. Moreover, similar frequency distributions of co-occurring network motifs were observed for translated texts networks.

  5. Preservation of knowledge through networking with retirees

    International Nuclear Information System (INIS)

    Barroso, A.C.O.; Reis-Junior, J.S.B.; Monteiro, C.A.; Seary, A

    2009-01-01

    Loss of emphasis or phasing down of nuclear programs has reduced substantially the hiring of new employees as a result nuclear organizations, in most countries, are experiencing reduction in the workforce and the average age of their technical professionals are around mid fifties. Knowledge management activities with emphasis on knowledge preservation have become a crucial issue for such organizations. This work studied a spontaneous knowledge preservation mechanism at IPEN that could be leveraged and may be replicated in other organizations. Crossing examining publications and human resources data base, with some alias detecting algorithm a large collaboration network involving retirees and current workers of IPEN was unveiled. Using simple indicators and advance techniques of social network analysis the following studies were performed: assessment of the network performance; characterization of its key global properties and detailed structure; characterization and assessment of the role of its key actors; analysis of groups and subgroups patterns; and longitudinal (time evolution) of the network and assessment of its robustness. Rich insights came from this study concerning the value of this mechanism for IPEN and also about the essence of the common interest that constitutes the 'glue' for such mechanism. While more detailed network analysis will still go on for a couple of months, a new phase has already been started with a formulated conceptual model, consisting of four latent variables and thirty six observable ones, to 'explain' at the actor level, in this particular setting what matters when engaging in collaboration. Upon finishing this new phase network data and actors' survey data will be cross correlate to provide a more fully understanding of this amazing mechanism. (author)

  6. Preservation of knowledge through networking with retirees

    Energy Technology Data Exchange (ETDEWEB)

    Barroso, A.C.O.; Reis-Junior, J.S.B.; Monteiro, C.A. [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil)], e-mail: barroso@ipen.br, e-mail: jose.sergio.junior@googlemail.com, e-mail: monteiro@ipen.br; Seary, A [Simon Fraser University School of Comunication, Burnaby, BC (Canada)], e-mail: seary@sfu.ca

    2009-07-01

    Loss of emphasis or phasing down of nuclear programs has reduced substantially the hiring of new employees as a result nuclear organizations, in most countries, are experiencing reduction in the workforce and the average age of their technical professionals are around mid fifties. Knowledge management activities with emphasis on knowledge preservation have become a crucial issue for such organizations. This work studied a spontaneous knowledge preservation mechanism at IPEN that could be leveraged and may be replicated in other organizations. Crossing examining publications and human resources data base, with some alias detecting algorithm a large collaboration network involving retirees and current workers of IPEN was unveiled. Using simple indicators and advance techniques of social network analysis the following studies were performed: assessment of the network performance; characterization of its key global properties and detailed structure; characterization and assessment of the role of its key actors; analysis of groups and subgroups patterns; and longitudinal (time evolution) of the network and assessment of its robustness. Rich insights came from this study concerning the value of this mechanism for IPEN and also about the essence of the common interest that constitutes the 'glue' for such mechanism. While more detailed network analysis will still go on for a couple of months, a new phase has already been started with a formulated conceptual model, consisting of four latent variables and thirty six observable ones, to 'explain' at the actor level, in this particular setting what matters when engaging in collaboration. Upon finishing this new phase network data and actors' survey data will be cross correlate to provide a more fully understanding of this amazing mechanism. (author)

  7. Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Rabindra Bista

    2010-05-01

    Full Text Available Many wireless sensor network (WSN applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.

  8. Privacy-preserving data aggregation protocols for wireless sensor networks: a survey.

    Science.gov (United States)

    Bista, Rabindra; Chang, Jae-Woo

    2010-01-01

    Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.

  9. How Much Control is Enough for Network Connectivity Preservation and Collision Avoidance?

    Science.gov (United States)

    Chen, Zhiyong; Fan, Ming-Can; Zhang, Hai-Tao

    2015-08-01

    For a multiagent system in free space, the agents are required to generate sufficiently large cohesive force for network connectivity preservation and sufficiently large repulsive force for collision avoidance. This paper gives an energy function based approach for estimating the control force in a general setting. In particular, the force estimated for network connectivity preservation and collision avoidance is separated from the force for other collective behavior of the agents. Moreover, the estimation approach is applied in three typical collective control scenarios including swarming, flocking, and flocking without velocity measurement.

  10. Privacy‐Preserving Friend Matching Protocol approach for Pre‐match in Social Networks

    DEFF Research Database (Denmark)

    Ople, Shubhangi S.; Deshmukh, Aaradhana A.; Mihovska, Albena Dimitrova

    2016-01-01

    Social services make the most use of the user profile matching to help the users to discover friends with similar social attributes (e.g. interests, location, age). However, there are many privacy concerns that prevent to enable this functionality. Privacy preserving encryption is not suitable...... for use in social networks due to its data sharing problems and information leakage. In this paper, we propose a novel framework for privacy–preserving profile matching. We implement both the client and server portion of the secure match and evaluate its performance network dataset. The results show...

  11. Collusion-aware privacy-preserving range query in tiered wireless sensor networks.

    Science.gov (United States)

    Zhang, Xiaoying; Dong, Lei; Peng, Hui; Chen, Hong; Zhao, Suyun; Li, Cuiping

    2014-12-11

    Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromisedmaster nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals.

  12. Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoying Zhang

    2014-12-01

    Full Text Available Wireless sensor networks (WSNs are indispensable building blocks for the Internet of Things (IoT. With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromisedmaster nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals.

  13. A Scalable Permutation Approach Reveals Replication and Preservation Patterns of Network Modules in Large Datasets.

    Science.gov (United States)

    Ritchie, Scott C; Watts, Stephen; Fearnley, Liam G; Holt, Kathryn E; Abraham, Gad; Inouye, Michael

    2016-07-01

    Network modules-topologically distinct groups of edges and nodes-that are preserved across datasets can reveal common features of organisms, tissues, cell types, and molecules. Many statistics to identify such modules have been developed, but testing their significance requires heuristics. Here, we demonstrate that current methods for assessing module preservation are systematically biased and produce skewed p values. We introduce NetRep, a rapid and computationally efficient method that uses a permutation approach to score module preservation without assuming data are normally distributed. NetRep produces unbiased p values and can distinguish between true and false positives during multiple hypothesis testing. We use NetRep to quantify preservation of gene coexpression modules across murine brain, liver, adipose, and muscle tissues. Complex patterns of multi-tissue preservation were revealed, including a liver-derived housekeeping module that displayed adipose- and muscle-specific association with body weight. Finally, we demonstrate the broader applicability of NetRep by quantifying preservation of bacterial networks in gut microbiota between men and women. Copyright © 2016 The Author(s). Published by Elsevier Inc. All rights reserved.

  14. A Privacy Preservation Model for Health-Related Social Networking Sites

    Science.gov (United States)

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS. PMID:26155953

  15. A Privacy Preservation Model for Health-Related Social Networking Sites.

    Science.gov (United States)

    Li, Jingquan

    2015-07-08

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS.

  16. Privacy-preserving data aggregation in two-tiered wireless sensor networks with mobile nodes.

    Science.gov (United States)

    Yao, Yonglei; Liu, Jingfa; Xiong, Neal N

    2014-11-10

    Privacy-preserving data aggregation in wireless sensor networks (WSNs) with mobile nodes is a challenging problem, as an accurate aggregation result should be derived in a privacy-preserving manner, under the condition that nodes are mobile and have no pre-specified keys for cryptographic operations. In this paper, we focus on the SUM aggregation function and propose two privacy-preserving data aggregation protocols for two-tiered sensor networks with mobile nodes: Privacy-preserving Data Aggregation against non-colluded Aggregator and Sink (PDAAS) and Privacy-preserving Data Aggregation against Colluded Aggregator and Sink (PDACAS). Both protocols guarantee that the sink can derive the SUM of all raw sensor data but each sensor's raw data is kept confidential. In PDAAS, two keyed values are used, one shared with the sink and the other shared with the aggregator. PDAAS can protect the privacy of sensed data against external eavesdroppers, compromised sensor nodes, the aggregator or the sink, but fails if the aggregator and the sink collude. In PDACAS, multiple keyed values are used in data perturbation, which are not shared with the aggregator or the sink. PDACAS can protect the privacy of sensor nodes even the aggregator and the sink collude, at the cost of a little more overhead than PDAAS. Thorough analysis and experiments are conducted, which confirm the efficacy and efficiency of both schemes.

  17. Ranking of critical species to preserve the functionality of mutualistic networks using the k-core decomposition.

    Science.gov (United States)

    García-Algarra, Javier; Pastor, Juan Manuel; Iriondo, José María; Galeano, Javier

    2017-01-01

    Network analysis has become a relevant approach to analyze cascading species extinctions resulting from perturbations on mutualistic interactions as a result of environmental change. In this context, it is essential to be able to point out key species, whose stability would prevent cascading extinctions, and the consequent loss of ecosystem function. In this study, we aim to explain how the k -core decomposition sheds light on the understanding the robustness of bipartite mutualistic networks. We defined three k -magnitudes based on the k -core decomposition: k -radius, k -degree, and k -risk. The first one, k -radius, quantifies the distance from a node to the innermost shell of the partner guild, while k -degree provides a measure of centrality in the k -shell based decomposition. k -risk is a way to measure the vulnerability of a network to the loss of a particular species. Using these magnitudes we analyzed 89 mutualistic networks involving plant pollinators or seed dispersers. Two static extinction procedures were implemented in which k -degree and k -risk were compared against other commonly used ranking indexes, as for example MusRank, explained in detail in Material and Methods. When extinctions take place in both guilds, k -risk is the best ranking index if the goal is to identify the key species to preserve the giant component. When species are removed only in the primary class and cascading extinctions are measured in the secondary class, the most effective ranking index to identify the key species to preserve the giant component is k -degree. However, MusRank index was more effective when the goal is to identify the key species to preserve the greatest species richness in the second class. The k -core decomposition offers a new topological view of the structure of mutualistic networks. The new k -radius, k -degree and k -risk magnitudes take advantage of its properties and provide new insight into the structure of mutualistic networks. The k -risk and k

  18. Ranking of critical species to preserve the functionality of mutualistic networks using the k-core decomposition

    Directory of Open Access Journals (Sweden)

    Javier García-Algarra

    2017-05-01

    Full Text Available Background Network analysis has become a relevant approach to analyze cascading species extinctions resulting from perturbations on mutualistic interactions as a result of environmental change. In this context, it is essential to be able to point out key species, whose stability would prevent cascading extinctions, and the consequent loss of ecosystem function. In this study, we aim to explain how the k-core decomposition sheds light on the understanding the robustness of bipartite mutualistic networks. Methods We defined three k-magnitudes based on the k-core decomposition: k-radius, k-degree, and k-risk. The first one, k-radius, quantifies the distance from a node to the innermost shell of the partner guild, while k-degree provides a measure of centrality in the k-shell based decomposition. k-risk is a way to measure the vulnerability of a network to the loss of a particular species. Using these magnitudes we analyzed 89 mutualistic networks involving plant pollinators or seed dispersers. Two static extinction procedures were implemented in which k-degree and k-risk were compared against other commonly used ranking indexes, as for example MusRank, explained in detail in Material and Methods. Results When extinctions take place in both guilds, k-risk is the best ranking index if the goal is to identify the key species to preserve the giant component. When species are removed only in the primary class and cascading extinctions are measured in the secondary class, the most effective ranking index to identify the key species to preserve the giant component is k-degree. However, MusRank index was more effective when the goal is to identify the key species to preserve the greatest species richness in the second class. Discussion The k-core decomposition offers a new topological view of the structure of mutualistic networks. The new k-radius, k-degree and k-risk magnitudes take advantage of its properties and provide new insight into the structure of

  19. Altering neuronal excitability to preserve network connectivity in a computational model of Alzheimer's disease.

    Directory of Open Access Journals (Sweden)

    Willem de Haan

    2017-09-01

    Full Text Available Neuronal hyperactivity and hyperexcitability of the cerebral cortex and hippocampal region is an increasingly observed phenomenon in preclinical Alzheimer's disease (AD. In later stages, oscillatory slowing and loss of functional connectivity are ubiquitous. Recent evidence suggests that neuronal dynamics have a prominent role in AD pathophysiology, making it a potentially interesting therapeutic target. However, although neuronal activity can be manipulated by various (non-pharmacological means, intervening in a highly integrated system that depends on complex dynamics can produce counterintuitive and adverse effects. Computational dynamic network modeling may serve as a virtual test ground for developing effective interventions. To explore this approach, a previously introduced large-scale neural mass network with human brain topology was used to simulate the temporal evolution of AD-like, activity-dependent network degeneration. In addition, six defense strategies that either enhanced or diminished neuronal excitability were tested against the degeneration process, targeting excitatory and inhibitory neurons combined or separately. Outcome measures described oscillatory, connectivity and topological features of the damaged networks. Over time, the various interventions produced diverse large-scale network effects. Contrary to our hypothesis, the most successful strategy was a selective stimulation of all excitatory neurons in the network; it substantially prolonged the preservation of network integrity. The results of this study imply that functional network damage due to pathological neuronal activity can be opposed by targeted adjustment of neuronal excitability levels. The present approach may help to explore therapeutic effects aimed at preserving or restoring neuronal network integrity and contribute to better-informed intervention choices in future clinical trials in AD.

  20. A Novel Nonlinear Multitarget k-Degree Coverage Preservation Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zeyu Sun

    2016-01-01

    Full Text Available Due to the existence of a large number of redundant data in the process of covering multiple targets, the effective coverage of monitored region decreases, causing the network to consume more energy. To solve this problem, this paper proposes a multitarget k-degree coverage preservation protocol. Firstly, the affiliation between the sensor nodes and target nodes is established in the network model; meanwhile the method used to calculate the coverage expectation value of the monitored region is put forward; secondly, in the aspect of the network energy conversion, use scheduling mechanisms on the sensor nodes to balance the network energy and achieve different network coverage quality with energy conversion between different nodes. Finally, simulation results show that NMCP can improve the network lifetime by effectively reducing the number of active nodes to meet certain coverage requirements.

  1. Success of Anomia Treatment in Aphasia Is Associated With Preserved Architecture of Global and Left Temporal Lobe Structural Networks.

    Science.gov (United States)

    Bonilha, Leonardo; Gleichgerrcht, Ezequiel; Nesland, Travis; Rorden, Chris; Fridriksson, Julius

    2016-03-01

    Targeted speech therapy can lead to substantial naming improvement in some subjects with anomia following dominant-hemisphere stroke. We investigated whether treatment-induced improvement in naming is associated with poststroke preservation of structural neural network architecture. Twenty-four patients with poststroke chronic aphasia underwent 30 hours of speech therapy over a 2-week period and were assessed at baseline and after therapy. Whole brain maps of neural architecture were constructed from pretreatment diffusion tensor magnetic resonance imaging to derive measures of global brain network architecture (network small-worldness) and regional network influence (nodal betweenness centrality). Their relationship with naming recovery was evaluated with multiple linear regressions. Treatment-induced improvement in correct naming was associated with poststroke preservation of global network small worldness and of betweenness centrality in temporal lobe cortical regions. Together with baseline aphasia severity, these measures explained 78% of the variability in treatment response. Preservation of global and left temporal structural connectivity broadly explains the variability in treatment-related naming improvement in aphasia. These findings corroborate and expand on previous classical lesion-symptom mapping studies by elucidating some of the mechanisms by which brain damage may relate to treated aphasia recovery. Favorable naming outcomes may result from the intact connections between spared cortical areas that are functionally responsive to treatment. © The Author(s) 2015.

  2. Fertility preservation in women--a practical guide to preservation techniques and therapeutic strategies in breast cancer, Hodgkin's lymphoma and borderline ovarian tumours by the fertility preservation network FertiPROTEKT.

    Science.gov (United States)

    von Wolff, Michael; Montag, Markus; Dittrich, Ralf; Denschlag, Dominik; Nawroth, Frank; Lawrenz, Barbara

    2011-08-01

    Fertility preservation methods are playing an increasing role in women up to the age of 40 years because of rising survival rates in those affected by cancer. However, balanced practical recommendations concerning all relevant fertility preservation, to support doctors in counselling and treating patients, are still rare. These recommendations were prepared by the network FertiPROTEKT ( http://www.fertiprotect.eu ), a collaboration of around 70 centres in Germany, Switzerland and Austria. The recommendations were developed by specialists in reproductive medicine, reproductive biology and oncology, which gave a comprehensive overview of all named techniques as well as their benefits and risks. Furthermore, practice-orientated recommendations for the individual use of fertility preservation methods for various indications such as breast cancer, Hodgkin's lymphoma and borderline ovarian tumours are given. Various options such as ovarian stimulation and cryopreservation of unfertilised or fertilised oocytes, cryopreservation and transplantation of ovarian tissue, GnRH-agonist administration and transposition of the ovaries can be offered. All the techniques can be performed alone or in combination within a maximum of 2 weeks with low risk and different success rates. Fertility preservation in women has become an option with realistic chances to become pregnant after cytotoxic therapies. The information provided allows a well balanced and realistic counselling and treatment.

  3. Fertility-preservation counselling and treatment for medical reasons: data from a multinational network of over 5000 women.

    Science.gov (United States)

    von Wolff, Michael; Dittrich, Ralf; Liebenthron, Jana; Nawroth, Frank; Schüring, Andreas N; Bruckner, Thomas; Germeyer, Ariane

    2015-11-01

    Fertility-preservation techniques for medical reasons are increasingly offered in national networks. Knowledge of the characteristics of counselled patients and techniques used are essential. The FertiPROTEKT network registry was analysed between 2007 and 2013, and included up to 85 university and non-university centres in Germany, Austria and Switzerland; 5159 women were counselled and 4060 women underwent fertility preservation. In 2013, fertility-preservation counselling for medical reasons increased significantly among nullipara and women aged between 21 and 35 years (n = 1043; P years predominantly opted for GnRH agonists and ovarian tissue cryopreservation; women aged between 20 and 40 years underwent a variety of techniques; and women over 40 years opted for GnRH agonists. The average number of aspirated oocytes per stimulation cycle decreased as age increased (years: 12.9; 31-35 years: 12.3; 36-46: 9.0; > 41 years: 5.7). For ovarian tissue cryopreservation, removal and cryopreservation of fewer than one ovary was preferred and carried out in 97% of cases in 2013. Copyright © 2015 Reproductive Healthcare Ltd. Published by Elsevier Ltd. All rights reserved.

  4. Preserved functional connectivity in the default mode and salience networks is associated with youthful memory in superaging

    OpenAIRE

    Barrett, Lisa; Zhang, Jiahe; Andreano, Joseph; Dickerson, Bradford; Touroutoglou, Alexandra

    2018-01-01

    'Superagers' are older adults who, despite their advanced age, maintain youthful memory. Previous morphometry studies revealed multiple default mode network (DMN) and salience network (SN) regions whose cortical thickness is preserved in superagers and correlates with memory performance. In this study, we examined the intrinsic functional connectivity within DMN and SN in 41 young (24.5 ± 3.6 years old) and 40 elderly adults (66.9 ± 5.5 years old). As in prior studies, superaging was defined ...

  5. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    Directory of Open Access Journals (Sweden)

    Weirong Cui

    Full Text Available Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched, and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  6. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    Science.gov (United States)

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  7. Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes

    OpenAIRE

    Ferrag, Mohamed Amine; Maglaras, Leandros; Argyriou, Antonios; Kosmanos, Dimitrios; Janicke, Helge

    2017-01-01

    This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks against privacy, attacks against integrity, attacks against availability, and attacks against authenticat...

  8. Anonymous authentication and location privacy preserving schemes for LTE-A networks

    Directory of Open Access Journals (Sweden)

    Zaher Jabr Haddad

    2017-11-01

    Full Text Available Long Term Evaluation Advanced (LTE-A is the third generation partnership project for cellular network that allows subscribers to roam into networks (i.e., the Internet and wireless connections using spacial purpose base-stations, such as wireless access points and home node B. In such LTE-A based networks, neither base-stations, nor the Internet and wireless connections are trusted because base-stations are operated by un-trusted subscribers. Attackers may exploit these vulnerabilities to violate the privacy of the LTE-A subscribers. On the other hand, the tradeoff between privacy and authentication is another challenge in such networks. Therefore, in this paper, we propose two anonymous authentication schemes based on one-time pseudonymes and Schnorr Zero Knowledge Protocols. Instead of the international mobile subscriber identity, these schemes enable the user equipment, base-stations and mobility management entity to mutually authenticate each others and update the location of the user equipment without evolving the home subscriber server. The security analysis demonstrate that the proposed schemes thwart security and privacy attacks, such as malicious, international mobile subscriber identity catching, and tracking attacks. Additionally, our proposed schemes preserve the location privacy of user equipment since no entity except the mobility management entity and Gate-Way Mobile Location Center can link between the pseudonymes and the international mobile subscriber identity. Also attackers have no knowledge about international mobile subscriber identity. Hence, the proposed schemes achieve backward/forward secrecy. Furthermore, the performance evaluation shows that the proposed handover schemes impose a small overhead on the mobile nodes and it has smaller computation and communication overheads than those in other schemes.

  9. Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2017-01-01

    Full Text Available With cloud computing being integrated with wireless body area networks, the digital ecosystem called cloud-assisted WBAN was proposed. In cloud-assisted medical systems, the integrity of the stored data is important. Recently, based on certificateless public key cryptography, He et al. proposed a certificateless public auditing scheme for cloud-assisted WBANs. But He et al.’s scheme is not a scheme with privacy preserving. After many checks on some of the same data blocks, the auditor can derive these data blocks. In this paper, we propose a certificateless public auditing scheme with privacy preserving for cloud-assisted WBANs. In the proof phase of the proposed scheme, the proof information is protected from being directly exposed to the auditor. So, the curious auditor could not derive the data blocks. We also prove that the proposed scheme is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard, and we give a comparison of the proposed scheme with He et al.’s scheme in terms of security and computation cost.

  10. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks

    OpenAIRE

    Shi, Binbin; Wei, Wei; Wang, Yihuai; Shu, Wanneng

    2016-01-01

    In high-density sensor networks, scheduling some sensor nodes to be in the sleep mode while other sensor nodes remain active for monitoring or forwarding packets is an effective control scheme to conserve energy. In this paper, a Coverage-Preserving Control Scheduling Scheme (CPCSS) based on a cloud model and redundancy degree in sensor networks is proposed. Firstly, the normal cloud model is adopted for calculating the similarity degree between the sensor nodes in terms of their historical d...

  11. Preservation of stability and synchronization in nonlinear systems

    International Nuclear Information System (INIS)

    Fernandez-Anaya, G.; Flores-Godoy, J.J.; Femat, R.; Alvarez-Ramirez, J.J.

    2007-01-01

    Preservation of stability in the presence of structural and/or parametric changes is an important issue in the study of dynamical systems. A specific case is the synchronization of chaos in complex networks where synchronization should be preserved in spite of changes in the network parameters and connectivity. In this work, a methodology to establish conditions for preservation of stability in a class of dynamical system is given in terms of Lyapunov methods. The idea is to construct a group of dynamical transformations under which stability is retained along certain manifolds. Some synchronization examples illustrate the results

  12. Preservation of stability and synchronization in nonlinear systems

    Energy Technology Data Exchange (ETDEWEB)

    Fernandez-Anaya, G. [Departamento de Fisica y Matematicas, Universidad Iberoamericana, Prol. Paseo de la Reforma 880, Lomas de Santa Fe, Mexico, D.F. 01210 (Mexico)], E-mail: guillermo.fernandez@uia.mx; Flores-Godoy, J.J. [Departamento de Fisica y Matematicas, Universidad Iberoamericana, Prol. Paseo de la Reforma 880, Lomas de Santa Fe, Mexico, D.F. 01210 (Mexico)], E-mail: job.flores@uia.mx; Femat, R. [Division de Matematicas Aplicadas y Sistemas Computacionales, IPICyT, Camino a la Presa San Jose 2055, Col. Lomas 4a. seccion, San Luis Potosi, San Luis Potosi 78216 (Mexico)], E-mail: rfemat@ipicyt.edu.mx; Alvarez-Ramirez, J.J. [Ingenieria de Procesos e Hidraulica, Universidad Autonoma Metropolitana-Iztapalapa, Av. San Rafael Atlixco 186, Col. Vicentina, Mexico, D.F. 09340 (Mexico)], E-mail: jjar@xanum.uam.mx

    2007-11-12

    Preservation of stability in the presence of structural and/or parametric changes is an important issue in the study of dynamical systems. A specific case is the synchronization of chaos in complex networks where synchronization should be preserved in spite of changes in the network parameters and connectivity. In this work, a methodology to establish conditions for preservation of stability in a class of dynamical system is given in terms of Lyapunov methods. The idea is to construct a group of dynamical transformations under which stability is retained along certain manifolds. Some synchronization examples illustrate the results.

  13. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.

    Science.gov (United States)

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-12-08

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.

  14. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

    Science.gov (United States)

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-01-01

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem. PMID:29292792

  15. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yousheng Zhou

    2017-12-01

    Full Text Available Vehicle sensor networks (VSNs are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem.

  16. Whole-brain structural topology in adult attention-deficit/hyperactivity disorder: Preserved global - disturbed local network organization.

    Science.gov (United States)

    Sidlauskaite, Justina; Caeyenberghs, Karen; Sonuga-Barke, Edmund; Roeyers, Herbert; Wiersema, Jan R

    2015-01-01

    Prior studies demonstrate altered organization of functional brain networks in attention-deficit/hyperactivity disorder (ADHD). However, the structural underpinnings of these functional disturbances are poorly understood. In the current study, we applied a graph-theoretic approach to whole-brain diffusion magnetic resonance imaging data to investigate the organization of structural brain networks in adults with ADHD and unaffected controls using deterministic fiber tractography. Groups did not differ in terms of global network metrics - small-worldness, global efficiency and clustering coefficient. However, there were widespread ADHD-related effects at the nodal level in relation to local efficiency and clustering. The affected nodes included superior occipital, supramarginal, superior temporal, inferior parietal, angular and inferior frontal gyri, as well as putamen, thalamus and posterior cerebellum. Lower local efficiency of left superior temporal and supramarginal gyri was associated with higher ADHD symptom scores. Also greater local clustering of right putamen and lower local clustering of left supramarginal gyrus correlated with ADHD symptom severity. Overall, the findings indicate preserved global but altered local network organization in adult ADHD implicating regions underpinning putative ADHD-related neuropsychological deficits.

  17. UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks

    Directory of Open Access Journals (Sweden)

    Jin Cao

    2018-01-01

    Full Text Available Machine Type Communication (MTC, as one of the most important wireless communication technologies in the future wireless communication, has become the new business growth point of mobile communication network. It is a key point to achieve seamless handovers within Evolved-Universal Terrestrial Radio Access Network (E-UTRAN for massive MTC (mMTC devices in order to support mobility in the Long Term Evolution-Advanced (LTE-A networks. When mMTC devices simultaneously roam from a base station to a new base station, the current handover mechanisms suggested by the Third-Generation Partnership Project (3GPP require several handover signaling interactions, which could cause the signaling load over the access network and the core network. Besides, several distinct handover procedures are proposed for different mobility scenarios, which will increase the system complexity. In this paper, we propose a simple and secure uniform group-based handover authentication scheme for mMTC devices based on the multisignature and aggregate message authentication code (AMAC techniques, which is to fit in with all of the mobility scenarios in the LTE-A networks. Compared with the current 3GPP standards, our scheme can achieve a simple authentication process with robust security protection including privacy preservation and thus avoid signaling congestion. The correctness of the proposed group handover authentication protocol is formally proved in the Canetti-Krawczyk (CK model and verified based on the AVISPA and SPAN.

  18. A Novel, Privacy Preserving, Architecture for Online Social Networks

    Directory of Open Access Journals (Sweden)

    Zhe Wang

    2015-12-01

    Full Text Available The centralized nature of conventional OSNs poses serious risks to the privacy and security of information exchanged between their members. These risks prompted several attempts to create decentralized OSNs, or DOSNs. The basic idea underlying these attempts, is that each member of a social network keeps its data under its own control, instead of surrendering it to a central host, providing access to it to other members according to its own access-control policy. Unfortunately all existing versions of DOSNs have a very serious limitation. Namely, they are unable to subject the membership of a DOSN, and the interaction between its members, to any global policy—which is essential for many social communities. Moreover, the DOSN architecture is unable to support useful capabilities such as narrowcasting and profile based search. This paper describes a novel architecture of decentralized OSNs—called DOSC, for “online social community”. DOSC adopts the decentralization idea underlying DOSNs, but it is able to subject the membership of a DOSC-community, and the interaction between its members, to a wide range of policies, including privacy-preserving narrowcasting and profile-sensitive search.

  19. CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles

    KAUST Repository

    Li, Lun

    2018-01-23

    The vehicular announcement network is one of the most promising utilities in the communications of smart vehicles and in the smart transportation systems. In general, there are two major issues in building an effective vehicular announcement network. First, it is difficult to forward reliable announcements without revealing users\\' identities. Second, users usually lack the motivation to forward announcements. In this paper, we endeavor to resolve these two issues through proposing an effective announcement network called CreditCoin, a novel privacy-preserving incentive announcement network based on Blockchain via an efficient anonymous vehicular announcement aggregation protocol. On the one hand, CreditCoin allows nondeterministic different signers (i.e., users) to generate the signatures and to send announcements anonymously in the nonfully trusted environment. On the other hand, with Blockchain, CreditCoin motivates users with incentives to share traffic information. In addition, transactions and account information in CreditCoin are tamper-resistant. CreditCoin also achieves conditional privacy since Trace manager in CreditCoin traces malicious users\\' identities in anonymous announcements with related transactions. CreditCoin thus is able to motivate users to forward announcements anonymously and reliably. Extensive experimental results show that CreditCoin is efficient and practical in simulations of smart transportation.

  20. Privacy-preserving Network Functionality Outsourcing

    OpenAIRE

    Shi, Junjie; Zhang, Yuan; Zhong, Sheng

    2015-01-01

    Since the advent of software defined networks ({SDN}), there have been many attempts to outsource the complex and costly local network functionality, i.e. the middlebox, to the cloud in the same way as outsourcing computation and storage. The privacy issues, however, may thwart the enterprises' willingness to adopt this innovation since the underlying configurations of these middleboxes may leak crucial and confidential information which can be utilized by attackers. To address this new probl...

  1. Scalable privacy-preserving big data aggregation mechanism

    Directory of Open Access Journals (Sweden)

    Dapeng Wu

    2016-08-01

    Full Text Available As the massive sensor data generated by large-scale Wireless Sensor Networks (WSNs recently become an indispensable part of ‘Big Data’, the collection, storage, transmission and analysis of the big sensor data attract considerable attention from researchers. Targeting the privacy requirements of large-scale WSNs and focusing on the energy-efficient collection of big sensor data, a Scalable Privacy-preserving Big Data Aggregation (Sca-PBDA method is proposed in this paper. Firstly, according to the pre-established gradient topology structure, sensor nodes in the network are divided into clusters. Secondly, sensor data is modified by each node according to the privacy-preserving configuration message received from the sink. Subsequently, intra- and inter-cluster data aggregation is employed during the big sensor data reporting phase to reduce energy consumption. Lastly, aggregated results are recovered by the sink to complete the privacy-preserving big data aggregation. Simulation results validate the efficacy and scalability of Sca-PBDA and show that the big sensor data generated by large-scale WSNs is efficiently aggregated to reduce network resource consumption and the sensor data privacy is effectively protected to meet the ever-growing application requirements.

  2. Whole-brain structural topology in adult attention-deficit/hyperactivity disorder: Preserved global – disturbed local network organization

    Directory of Open Access Journals (Sweden)

    Justina Sidlauskaite

    2015-01-01

    Full Text Available Prior studies demonstrate altered organization of functional brain networks in attention-deficit/hyperactivity disorder (ADHD. However, the structural underpinnings of these functional disturbances are poorly understood. In the current study, we applied a graph-theoretic approach to whole-brain diffusion magnetic resonance imaging data to investigate the organization of structural brain networks in adults with ADHD and unaffected controls using deterministic fiber tractography. Groups did not differ in terms of global network metrics — small-worldness, global efficiency and clustering coefficient. However, there were widespread ADHD-related effects at the nodal level in relation to local efficiency and clustering. The affected nodes included superior occipital, supramarginal, superior temporal, inferior parietal, angular and inferior frontal gyri, as well as putamen, thalamus and posterior cerebellum. Lower local efficiency of left superior temporal and supramarginal gyri was associated with higher ADHD symptom scores. Also greater local clustering of right putamen and lower local clustering of left supramarginal gyrus correlated with ADHD symptom severity. Overall, the findings indicate preserved global but altered local network organization in adult ADHD implicating regions underpinning putative ADHD-related neuropsychological deficits.

  3. 2007 Preserve America Presidential Awards

    Science.gov (United States)

    aviation history museum that emphasizes people and culture as well as technology and events. With a the Private Preservation category, the two winners are: The History Channel, Save Our History Save Our History were Abbe Raven, president and CEO, A&E Television Networks; and Nancy Dubuc

  4. Size reduction of complex networks preserving modularity

    Energy Technology Data Exchange (ETDEWEB)

    Arenas, A.; Duch, J.; Fernandez, A.; Gomez, S.

    2008-12-24

    The ubiquity of modular structure in real-world complex networks is being the focus of attention in many trials to understand the interplay between network topology and functionality. The best approaches to the identification of modular structure are based on the optimization of a quality function known as modularity. However this optimization is a hard task provided that the computational complexity of the problem is in the NP-hard class. Here we propose an exact method for reducing the size of weighted (directed and undirected) complex networks while maintaining invariant its modularity. This size reduction allows the heuristic algorithms that optimize modularity for a better exploration of the modularity landscape. We compare the modularity obtained in several real complex-networks by using the Extremal Optimization algorithm, before and after the size reduction, showing the improvement obtained. We speculate that the proposed analytical size reduction could be extended to an exact coarse graining of the network in the scope of real-space renormalization.

  5. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks.

    Science.gov (United States)

    Shi, Binbin; Wei, Wei; Wang, Yihuai; Shu, Wanneng

    2016-10-14

    In high-density sensor networks, scheduling some sensor nodes to be in the sleep mode while other sensor nodes remain active for monitoring or forwarding packets is an effective control scheme to conserve energy. In this paper, a Coverage-Preserving Control Scheduling Scheme (CPCSS) based on a cloud model and redundancy degree in sensor networks is proposed. Firstly, the normal cloud model is adopted for calculating the similarity degree between the sensor nodes in terms of their historical data, and then all nodes in each grid of the target area can be classified into several categories. Secondly, the redundancy degree of a node is calculated according to its sensing area being covered by the neighboring sensors. Finally, a centralized approximation algorithm based on the partition of the target area is designed to obtain the approximate minimum set of nodes, which can retain the sufficient coverage of the target region and ensure the connectivity of the network at the same time. The simulation results show that the proposed CPCSS can balance the energy consumption and optimize the coverage performance of the sensor network.

  6. Pavement Preservation for Elected Officials: The Inside Story of Pavement Deterioration

    OpenAIRE

    Olson, Jim

    2012-01-01

    This session is intended to provide elected officials and practitioners with an introduction to the concept of pavement preservation and its applicability within public agencies. Topics include definitions, budget planning, pavement life, road networks, alternative strategies, pavement distresses, guidelines and preservation treatments.

  7. Epidemic spreading on complex networks with community structures

    NARCIS (Netherlands)

    Stegehuis, C.; van der Hofstad, R.W.; van Leeuwaarden, J.S.H.

    2016-01-01

    Many real-world networks display a community structure. We study two random graph models that create a network with similar community structure as a given network. One model preserves the exact community structure of the original network, while the other model only preserves the set of communities

  8. Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yi Sun

    2014-01-01

    Full Text Available With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients’ health information and doctors’ diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions.

  9. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks

    Science.gov (United States)

    Shi, Binbin; Wei, Wei; Wang, Yihuai; Shu, Wanneng

    2016-01-01

    In high-density sensor networks, scheduling some sensor nodes to be in the sleep mode while other sensor nodes remain active for monitoring or forwarding packets is an effective control scheme to conserve energy. In this paper, a Coverage-Preserving Control Scheduling Scheme (CPCSS) based on a cloud model and redundancy degree in sensor networks is proposed. Firstly, the normal cloud model is adopted for calculating the similarity degree between the sensor nodes in terms of their historical data, and then all nodes in each grid of the target area can be classified into several categories. Secondly, the redundancy degree of a node is calculated according to its sensing area being covered by the neighboring sensors. Finally, a centralized approximation algorithm based on the partition of the target area is designed to obtain the approximate minimum set of nodes, which can retain the sufficient coverage of the target region and ensure the connectivity of the network at the same time. The simulation results show that the proposed CPCSS can balance the energy consumption and optimize the coverage performance of the sensor network. PMID:27754405

  10. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Binbin Shi

    2016-10-01

    Full Text Available In high-density sensor networks, scheduling some sensor nodes to be in the sleep mode while other sensor nodes remain active for monitoring or forwarding packets is an effective control scheme to conserve energy. In this paper, a Coverage-Preserving Control Scheduling Scheme (CPCSS based on a cloud model and redundancy degree in sensor networks is proposed. Firstly, the normal cloud model is adopted for calculating the similarity degree between the sensor nodes in terms of their historical data, and then all nodes in each grid of the target area can be classified into several categories. Secondly, the redundancy degree of a node is calculated according to its sensing area being covered by the neighboring sensors. Finally, a centralized approximation algorithm based on the partition of the target area is designed to obtain the approximate minimum set of nodes, which can retain the sufficient coverage of the target region and ensure the connectivity of the network at the same time. The simulation results show that the proposed CPCSS can balance the energy consumption and optimize the coverage performance of the sensor network.

  11. Beyond Preservation: New Directions for Technological Innovation through Intangible Cultural Heritage

    Science.gov (United States)

    Robbins, Christopher

    2010-01-01

    While many digitization projects are currently underway, to help preserve Indigenous traditions, few explore the full potential of the development of digital media and networked technology through Indigenous cultures. This paper outlines the three phases necessary for a robust digital preservation, promotion and growth project: 1) Straightforward…

  12. Network cohesion

    OpenAIRE

    Cavalcanti, Tiago Vanderlei; Giannitsarou, Chrysi; Johnson, CR

    2017-01-01

    We define a measure of network cohesion and show how it arises naturally in a broad class of dynamic models of endogenous perpetual growth with network externalities. Via a standard growth model, we show why network cohesion is crucial for conditional convergence and explain that as cohesion increases, convergence is faster. We prove properties of network cohesion and define a network aggregator that preserves network cohesion.

  13. Evolution of natural agents: preservation, advance, and emergence of functional information

    OpenAIRE

    Sharov, Alexei A.

    2016-01-01

    Biological evolution is often viewed narrowly as a change of morphology or allele frequency in a sequence of generations. Here I pursue an alternative informational concept of evolution, as preservation, advance, and emergence of functional information in natural agents. Functional information is a network of signs (e.g., memory, transient messengers, and external signs) that are used by agents to preserve and regulate their functions. Functional information is preserved in evolution via comp...

  14. Towards Smart Storage for Repository Preservation Services

    Directory of Open Access Journals (Sweden)

    Steve Hitchcock

    2010-07-01

    Full Text Available The move to digital is being accompanied by a huge rise in volumes of (born-digital content and data. As a result the curation lifecycle has to be redrawn. Processes such as selection and evaluation for preservation have to be driven by automation. Manual processes will not scale, and the traditional signifiers and selection criteria in older formats, such as print publication, are changing. The paper will examine at a conceptual and practical level how preservation intelligence can be built into software-based digital preservation tools and services on the Web and across the network ‘cloud’ to create ‘smart’ storage for long-term, continuous data monitoring and management. Some early examples will be presented, focussing on storage management and format risk assessment.

  15. Preserving Transactional Data

    OpenAIRE

    Sara Day Thomson

    2017-01-01

    This paper is an adaptation of a longer report commissioned by the UK Data Service. The longer report contributes to on-going support for the Big Data Network – a programme funded by the Economic and Social Research Council (ESRC). The longer report can be found at doi:10.7207/twr16-02. This paper discusses requirements for preserving transactional data and the accompanying challenges facing the companies and institutions who aim to re-use these data for analysis or research. It present...

  16. Towards a privacy preserving cohort discovery framework for clinical research networks.

    Science.gov (United States)

    Yuan, Jiawei; Malin, Bradley; Modave, François; Guo, Yi; Hogan, William R; Shenkman, Elizabeth; Bian, Jiang

    2017-02-01

    The last few years have witnessed an increasing number of clinical research networks (CRNs) focused on building large collections of data from electronic health records (EHRs), claims, and patient-reported outcomes (PROs). Many of these CRNs provide a service for the discovery of research cohorts with various health conditions, which is especially useful for rare diseases. Supporting patient privacy can enhance the scalability and efficiency of such processes; however, current practice mainly relies on policy, such as guidelines defined in the Health Insurance Portability and Accountability Act (HIPAA), which are insufficient for CRNs (e.g., HIPAA does not require encryption of data - which can mitigate insider threats). By combining policy with privacy enhancing technologies we can enhance the trustworthiness of CRNs. The goal of this research is to determine if searchable encryption can instill privacy in CRNs without sacrificing their usability. We developed a technique, implemented in working software to enable privacy-preserving cohort discovery (PPCD) services in large distributed CRNs based on elliptic curve cryptography (ECC). This technique also incorporates a block indexing strategy to improve the performance (in terms of computational running time) of PPCD. We evaluated the PPCD service with three real cohort definitions: (1) elderly cervical cancer patients who underwent radical hysterectomy, (2) oropharyngeal and tongue cancer patients who underwent robotic transoral surgery, and (3) female breast cancer patients who underwent mastectomy) with varied query complexity. These definitions were tested in an encrypted database of 7.1 million records derived from the publically available Healthcare Cost and Utilization Project (HCUP) Nationwide Inpatient Sample (NIS). We assessed the performance of the PPCD service in terms of (1) accuracy in cohort discovery, (2) computational running time, and (3) privacy afforded to the underlying records during PPCD. The

  17. Cuban strategy for reproducing, preserving and developing nuclear knowledge

    International Nuclear Information System (INIS)

    Elias Hardy, L.L.; Guzman Martinez, F.; Rodriguez Hoyos, O.E.; Lopez Nunez, A.F.

    2006-01-01

    One of the problems in the changing world is the preservation of knowledge for the next human generation, and nuclear knowledge is not an exception. Cuba has worked for reproducing, preserving, developing and capturing nuclear knowledge, mainly through a higher education centre, the Higher Institute of Nuclear Sciences and Technologies. This institute is a component of a national network in the preparation of manpower not only for nuclear activities but also for environmental and managerial activities too. (author)

  18. Coarse graining for synchronization in directed networks

    Science.gov (United States)

    Zeng, An; Lü, Linyuan

    2011-05-01

    Coarse-graining model is a promising way to analyze and visualize large-scale networks. The coarse-grained networks are required to preserve statistical properties as well as the dynamic behaviors of the initial networks. Some methods have been proposed and found effective in undirected networks, while the study on coarse-graining directed networks lacks of consideration. In this paper we proposed a path-based coarse-graining (PCG) method to coarse grain the directed networks. Performing the linear stability analysis of synchronization and numerical simulation of the Kuramoto model on four kinds of directed networks, including tree networks and variants of Barabási-Albert networks, Watts-Strogatz networks, and Erdös-Rényi networks, we find our method can effectively preserve the network synchronizability.

  19. Privacy-preserving user clustering in a social network

    NARCIS (Netherlands)

    Erkin, Z.; Veugen, P.J.M.; Toft, T.; Lagendijk, R.L.

    2009-01-01

    In a ubiquitously connected world, social networks are playing an important role on the Internet by allowing users to find groups of people with similar interests. The data needed to construct such networks may be considered sensitive personal information by the users, which raises privacy concerns.

  20. Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities

    Directory of Open Access Journals (Sweden)

    Qinlong Huang

    2017-01-01

    Full Text Available Mobile healthcare social networks (MHSN integrated with connected medical sensors and cloud-based health data storage provide preventive and curative health services in smart cities. The fusion of social data together with real-time health data facilitates a novel paradigm of healthcare big data analysis. However, the collaboration of healthcare and social network service providers may pose a series of security and privacy issues. In this paper, we propose a secure health and social data sharing and collaboration scheme in MHSN. To preserve the data privacy, we realize secure and fine-grained health data and social data sharing with attribute-based encryption and identity-based broadcast encryption techniques, respectively, which allows patients to share their private personal data securely. In order to achieve enhanced data collaboration, we allow the healthcare analyzers to access both the reencrypted health data and the social data with authorization from the data owner based on proxy reencryption. Specifically, most of the health data encryption and decryption computations are outsourced from resource-constrained mobile devices to a health cloud, and the decryption of the healthcare analyzer incurs a low cost. The security and performance analysis results show the security and efficiency of our scheme.

  1. Privacy-Preserved Behavior Analysis and Fall Detection by an Infrared Ceiling Sensor Network

    Directory of Open Access Journals (Sweden)

    Mineichi Kudo

    2012-12-01

    Full Text Available An infrared ceiling sensor network system is reported in this study to realize behavior analysis and fall detection of a single person in the home environment. The sensors output multiple binary sequences from which we know the existence/non-existence of persons under the sensors. The short duration averages of the binary responses are shown to be able to be regarded as pixel values of a top-view camera, but more advantageous in the sense of preserving privacy. Using the “pixel values” as features, support vector machine classifiers succeeded in recognizing eight activities (walking, reading, etc. performed by five subjects at an average recognition rate of 80.65%. In addition, we proposed a martingale framework for detecting falls in this system. The experimental results showed that we attained the best performance of 95.14% (F1 value, the FAR of 7.5% and the FRR of 2.0%. This accuracy is not sufficient in general but surprisingly high with such low-level information. In summary, it is shown that this system has the potential to be used in the home environment to provide personalized services and to detect abnormalities of elders who live alone.

  2. A comprehensive analysis on preservation patterns of gene co-expression networks during Alzheimer's disease progression.

    Science.gov (United States)

    Ray, Sumanta; Hossain, Sk Md Mosaddek; Khatun, Lutfunnesa; Mukhopadhyay, Anirban

    2017-12-20

    Alzheimer's disease (AD) is a chronic neuro-degenerative disruption of the brain which involves in large scale transcriptomic variation. The disease does not impact every regions of the brain at the same time, instead it progresses slowly involving somewhat sequential interaction with different regions. Analysis of the expression patterns of the genes in different regions of the brain influenced in AD surely contribute for a enhanced comprehension of AD pathogenesis and shed light on the early characterization of the disease. Here, we have proposed a framework to identify perturbation and preservation characteristics of gene expression patterns across six distinct regions of the brain ("EC", "HIP", "PC", "MTG", "SFG", and "VCX") affected in AD. Co-expression modules were discovered considering a couple of regions at once. These are then analyzed to know the preservation and perturbation characteristics. Different module preservation statistics and a rank aggregation mechanism have been adopted to detect the changes of expression patterns across brain regions. Gene ontology (GO) and pathway based analysis were also carried out to know the biological meaning of preserved and perturbed modules. In this article, we have extensively studied the preservation patterns of co-expressed modules in six distinct brain regions affected in AD. Some modules are emerged as the most preserved while some others are detected as perturbed between a pair of brain regions. Further investigation on the topological properties of preserved and non-preserved modules reveals a substantial association amongst "betweenness centrality" and "degree" of the involved genes. Our findings may render a deeper realization of the preservation characteristics of gene expression patterns in discrete brain regions affected by AD.

  3. Optimization of preservation activities and preservation engineering (1)

    International Nuclear Information System (INIS)

    Aoki, Takayuki; Mimaki, Hidehito; Oda, Mitsuyuki

    2004-01-01

    In order to deal with the optimization of preservation activities and 'preservation engineering' which makes it possible, the relation between general society and preservation, the content and the structure of preservation activities, and the viewpoint and the approach of the optimization of the preventive preservation are described. The optimization of the preventive preservation is shown respectively in the four stages of planning, implementation, result evaluation and countermeasure. (K. Kato)

  4. Northern emporia and maritime networks. Modelling past communication using archaeological network analysis

    DEFF Research Database (Denmark)

    Sindbæk, Søren Michael

    2015-01-01

    preserve patterns of thisinteraction. Formal network analysis and modelling holds the potential to identify anddemonstrate such patterns, where traditional methods often prove inadequate. Thearchaeological study of communication networks in the past, however, calls for radically different analytical...... this is not a problem of network analysis, but network synthesis: theclassic problem of cracking codes or reconstructing black-box circuits. It is proposedthat archaeological approaches to network synthesis must involve a contextualreading of network data: observations arising from individual contexts, morphologies...

  5. Optimization of preservation activities and preservation engineering (2)

    International Nuclear Information System (INIS)

    Aoki, Takayuki; Mimaki, Hidehito; Oda, Mitsuyuki

    2004-01-01

    In order to deal with the optimization of preservation activities and 'preservation engineering' which makes it possible, the viewpoint and the approach of the optimization of the ex post facto preservation and the content to be possessed in 'preservation engineering' are described. The optimization of the ex post facto preservation is shown respectively in the four stages of planning, implementation, result evaluation and countermeasure. (K. Kato)

  6. System And Method For Monitoring Traffic While Preserving Personal Privacy

    KAUST Repository

    Canepa, Edward

    2015-08-06

    A traffic monitoring system and method for mapping traffic speed and density while preserving privacy. The system can include fixed stations that make up a network and mobile probes that are associated with vehicles. The system and method do not gather, store, or transmit any unique or identifying information, and thereby preserves the privacy of members of traffic. The system and method provide real-time traffic density and speed mapping. The system and method can further be integrated with a complementary flood monitoring system and method.

  7. ISCTN: Cuban strategy for reproducing, preserving and developing the nuclear knowledge

    International Nuclear Information System (INIS)

    Elias Hardy, L.L.; Martinez, F.G.; Rodriguez Hoyos, O.E.; Nunez, A.L.

    2004-01-01

    One of the problems in the changing world is the preservation of the knowledge for the next human generation and the nuclear knowledge is not an exception. Cuba has worked for reproducing, preserving, developing and capturing the nuclear knowledge, mainly through a higher education center, the Higher Institute of Nuclear Sciences and Technologies. This institute is a component of a national network in the preparation of Manpower not only for nuclear activities and for environmental and managerial too. (author)

  8. Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks†

    Science.gov (United States)

    Zhang, Xiaoying; Dong, Lei; Peng, Hui; Chen, Hong; Zhao, Suyun; Li, Cuiping

    2014-01-01

    Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromised master nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals. PMID:25615731

  9. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  10. Fulltext PDF

    Indian Academy of Sciences (India)

    Admin

    experiences and viewpoints on matters related to teaching and learning science. ... Science Education (TIFR). V N Purav Marg ... both models is that a high acceleration cannot be ... run profiles of Usain Bolt, Tyson Gay and Asafa Pow-.

  11. Network preservation through a topology control algorithm for wireless mesh networks

    CSIR Research Space (South Africa)

    Aron, FO

    2008-09-01

    Full Text Available to the wireless infrastructure-based networks. The benefits of WMN deployments, however, come with certain challenges e.g., power management. While focussing on WMN applications in rural areas, this paper explains the need for transmit power consumption control...

  12. Evolutionarily significant units of the critically endangered leaf frog Pithecopus ayeaye (Anura, Phyllomedusidae) are not effectively preserved by the Brazilian protected areas network.

    Science.gov (United States)

    de Magalhães, Rafael Félix; Lemes, Priscila; Camargo, Arley; Oliveira, Ubirajara; Brandão, Reuber Albuquerque; Thomassen, Hans; Garcia, Paulo Christiano de Anchietta; Leite, Felipe Sá Fortes; Santos, Fabrício Rodrigues

    2017-11-01

    Protected areas (PAs) are essential for biodiversity conservation, but their coverage is considered inefficient for the preservation of all species. Many species are subdivided into evolutionarily significant units (ESUs) and the effectiveness of PAs in protecting them needs to be investigated. We evaluated the usefulness of the Brazilian PAs network in protecting ESUs of the critically endangered Pithecopus ayeaye through ongoing climate change. This species occurs in a threatened mountaintop ecosystem known as campos rupestres . We used multilocus DNA sequences to delimit geographic clusters, which were further validated as ESUs with a coalescent approach. Ecological niche modeling was used to estimate spatial changes in ESUs' potential distributions, and a gap analysis was carried out to evaluate the effectiveness of the Brazilian PAs network to protect P. ayeaye in the face of climate changes. We tested the niche overlap between ESUs to gain insights for potential management alternatives for the species. Pithecopus ayeaye contains at least three ESUs isolated in distinct mountain regions, and one of them is not protected by any PA. There are no climatic niche differences between the units, and only 4% of the suitable potential area of the species is protected in present and future projections. The current PAs are not effective in preserving the intraspecific diversity of P. ayeaye in its present and future range distributions. The genetic structure of P. ayeaye could represent a typical pattern in campos rupestres endemics, which should be considered for evaluating its conservation status.

  13. Creating preservation metadata from XML-metadata profiles

    Science.gov (United States)

    Ulbricht, Damian; Bertelmann, Roland; Gebauer, Petra; Hasler, Tim; Klump, Jens; Kirchner, Ingo; Peters-Kottig, Wolfgang; Mettig, Nora; Rusch, Beate

    2014-05-01

    Registration of dataset DOIs at DataCite makes research data citable and comes with the obligation to keep data accessible in the future. In addition, many universities and research institutions measure data that is unique and not repeatable like the data produced by an observational network and they want to keep these data for future generations. In consequence, such data should be ingested in preservation systems, that automatically care for file format changes. Open source preservation software that is developed along the definitions of the ISO OAIS reference model is available but during ingest of data and metadata there are still problems to be solved. File format validation is difficult, because format validators are not only remarkably slow - due to variety in file formats different validators return conflicting identification profiles for identical data. These conflicts are hard to resolve. Preservation systems have a deficit in the support of custom metadata. Furthermore, data producers are sometimes not aware that quality metadata is a key issue for the re-use of data. In the project EWIG an university institute and a research institute work together with Zuse-Institute Berlin, that is acting as an infrastructure facility, to generate exemplary workflows for research data into OAIS compliant archives with emphasis on the geosciences. The Institute for Meteorology provides timeseries data from an urban monitoring network whereas GFZ Potsdam delivers file based data from research projects. To identify problems in existing preservation workflows the technical work is complemented by interviews with data practitioners. Policies for handling data and metadata are developed. Furthermore, university teaching material is created to raise the future scientists awareness of research data management. As a testbed for ingest workflows the digital preservation system Archivematica [1] is used. During the ingest process metadata is generated that is compliant to the

  14. nestor Guideline for Preservation Planning – a Process Model

    Directory of Open Access Journals (Sweden)

    Sabine Schrimpf

    2014-02-01

    Full Text Available The nestor guideline for preservation planning is the latest in a series of nestor publications. nestor is the German competence network for digital preservation and it offers all interested parties from the private and public domains the possibility to participate in working groups. The guideline for preservation planning is the result of such a working group, which discussed the conceptual and practical issues of implementing the OAIS Functional Entity “Preservation Planning”.The guideline describes a process model and offers some guidance on potential implementations. It integrates and builds on recognized community concepts like Significant Properties, the OAIS Designated Community, the National Archives of Australia’s Performance Model, the PREMIS concept of Intellectual Entities and Representations, and the PLANET’s approach to preservation planning. Furthermore, it introduces the concepts “intended use” (Nutzungsziele, “information type” (Informationstyp and “preservation group” (Erhaltungsgruppe. The purpose of these new categories is that information objects shall be grouped by information type (e.g., audio, video, text… and intended use (e.g., reading for pleasure, search for specific information… to preservation groups for automatic processing. Significant properties can then be derived for whole preservation groups. The file format alone is considered as not completely sufficient for such categorisation. Some exemplary implementation solutions of the new concepts are presented in an annex.The guideline takes into account that resources for preservation planning and preservation actions are limited and has therefore adopted 4 premises: adequacy, financial viability, automation, and authenticity of archived objects. Its pragmatic approach becomes apparent in the definition and explanation of these dimensions. The guideline is written from the point of view of representatives of memory institutions, i

  15. Knowledge Preservation and Consolidation through an Innovative Multimedia Tool

    International Nuclear Information System (INIS)

    Corniani, E.

    2013-01-01

    The JRC (Joint Research Centre) is the European Commission’s in-house science service. It provides the science for policy decisions, with a view to ensuring that the EU achieves its Europe 2020 goals for a productive economy as well as a safe, secure and sustainable future. The JRC plays a key role in the European Research Area and reinforces its multi-disciplinarity by networking extensively with leading scientific organisations in the Member States, Associated Countries and worldwide. The presentation is about • JRC methodology in Knowledge Preservation; • A Multimedia tool developed for preserving knowledge on WWER reactors; • EC involvement on Fast Reactors

  16. A method for safely resecting anterior butterfly gliomas: the surgical anatomy of the default mode network and the relevance of its preservation.

    Science.gov (United States)

    Burks, Joshua D; Bonney, Phillip A; Conner, Andrew K; Glenn, Chad A; Briggs, Robert G; Battiste, James D; McCoy, Tressie; O'Donoghue, Daniel L; Wu, Dee H; Sughrue, Michael E

    2017-06-01

    OBJECTIVE Gliomas invading the anterior corpus callosum are commonly deemed unresectable due to an unacceptable risk/benefit ratio, including the risk of abulia. In this study, the authors investigated the anatomy of the cingulum and its connectivity within the default mode network (DMN). A technique is described involving awake subcortical mapping with higher attention tasks to preserve the cingulum and reduce the incidence of postoperative abulia for patients with so-called butterfly gliomas. METHODS The authors reviewed clinical data on all patients undergoing glioma surgery performed by the senior author during a 4-year period at the University of Oklahoma Health Sciences Center. Forty patients were identified who underwent surgery for butterfly gliomas. Each patient was designated as having undergone surgery either with or without the use of awake subcortical mapping and preservation of the cingulum. Data recorded on these patients included the incidence of abulia/akinetic mutism. In the context of the study findings, the authors conducted a detailed anatomical study of the cingulum and its role within the DMN using postmortem fiber tract dissections of 10 cerebral hemispheres and in vivo diffusion tractography of 10 healthy subjects. RESULTS Forty patients with butterfly gliomas were treated, 25 (62%) with standard surgical methods and 15 (38%) with awake subcortical mapping and preservation of the cingulum. One patient (1/15, 7%) experienced postoperative abulia following surgery with the cingulum-sparing technique. Greater than 90% resection was achieved in 13/15 (87%) of these patients. CONCLUSIONS This study presents evidence that anterior butterfly gliomas can be safely removed using a novel, attention-task based, awake brain surgery technique that focuses on preserving the anatomical connectivity of the cingulum and relevant aspects of the cingulate gyrus.

  17. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  18. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    Directory of Open Access Journals (Sweden)

    Shunrong Jiang

    2015-09-01

    Full Text Available Mobile healthcare social networks (MHSNs have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE. Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  19. Comparison of Tissue Preservation using Formalin and Ethanol as Preservative Formula

    OpenAIRE

    See Woan Shian; Arifin Soenggono; Sawkar Vijay Pramod

    2016-01-01

    Background: Tissue preservation can be performed through embalming, by providing the chemical embalming fluid to the human remains. Formalin’s preservative formula is the foundation for modern methods of embalming. Unfortunately, this preservative formula has several disadvantages. While Ethanol’s preservative formula is a considerable agent to replace formalin’s preservative formula. The aim of this study was to compare the tissue preservation using formalin and ethanol as preservative formu...

  20. Achieve Location Privacy-Preserving Range Query in Vehicular Sensing.

    Science.gov (United States)

    Kong, Qinglei; Lu, Rongxing; Ma, Maode; Bao, Haiyong

    2017-08-08

    Modern vehicles are equipped with a plethora of on-board sensors and large on-board storage, which enables them to gather and store various local-relevant data. However, the wide application of vehicular sensing has its own challenges, among which location-privacy preservation and data query accuracy are two critical problems. In this paper, we propose a novel range query scheme, which helps the data requester to accurately retrieve the sensed data from the distributive on-board storage in vehicular ad hoc networks (VANETs) with location privacy preservation. The proposed scheme exploits structured scalars to denote the locations of data requesters and vehicles, and achieves the privacy-preserving location matching with the homomorphic Paillier cryptosystem technique. Detailed security analysis shows that the proposed range query scheme can successfully preserve the location privacy of the involved data requesters and vehicles, and protect the confidentiality of the sensed data. In addition, performance evaluations are conducted to show the efficiency of the proposed scheme, in terms of computation delay and communication overhead. Specifically, the computation delay and communication overhead are not dependent on the length of the scalar, and they are only proportional to the number of vehicles.

  1. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    In order to provide context--aware Location--Based Services, real location data of mobile users must be collected and analyzed by spatio--temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy....... To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...... data is anonymized in the system using data cloaking and data swapping techniques. Finally, the paper empirically demonstrates that the proposed system is effective and feasible....

  2. Efficient privacy preserving K-means clustering in a three-party setting

    NARCIS (Netherlands)

    Beye, Michael; Erkin, Zekeriya; Erkin, Zekeriya; Lagendijk, Reginald L.

    2011-01-01

    User clustering is a common operation in online social networks, for example to recommend new friends. In previous work [5], Erkin et al. proposed a privacy-preserving K-means clustering algorithm for the semi-honest model, using homomorphic encryption and multi-party computation. This paper makes

  3. Hybrid Food Preservation Program Improves Food Preservation and Food Safety Knowledge

    Science.gov (United States)

    Francis, Sarah L.

    2014-01-01

    The growing trend in home food preservation raises concerns about whether the resulting food products will be safe to eat. The increased public demand for food preservation information led to the development of the comprehensive food preservation program, Preserve the Taste of Summer (PTTS). PTTS is a comprehensive hybrid food preservation program…

  4. Security and privacy preserving in social networks

    CERN Document Server

    Chbeir, Richard

    2013-01-01

    This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. It provides the reader with an overview of the state-of-the art techniques, studies, and approaches as well as outlining future directions in this field. A wide range of interdisciplinary contributions from various research groups ensures for a balanced and complete perspective.

  5. Managerial Challenges Within Networks - Emphasizing the Paradox of Network Participation

    DEFF Research Database (Denmark)

    Jakobsen, Morten

    2003-01-01

    Flexibility and access to numerous resources are essential benefits associated with network participation. An important aspect of managing the network participation of a company is to maintain a dynamic portfolio of partners, and thereby keep up the strategic opportunities for development. However......, maintaining the dynamics within a network seems to be a complex challenge. There is a risk that the network ends up in The Paradox of Network Participation. The desired renewal and flexibility are not utilised because the involved parties preserve the existing networks structure consisting of the same...... and thereby sort out the paradox of network participation. Trust and information are mechanisms employed to absorb uncertainty. The relationship between trust and the requirement for information depends on the maturity of the relationship. When trust becomes too important as uncertainty absorption mechanism...

  6. Managerial challenges within networks: emphasizing the paradox of network participation

    DEFF Research Database (Denmark)

    Jakobsen, Morten

    Flexibility and access to numerous resources are essential benefits associated with network participation. An important aspect of managing the network participation of a company is to maintain a dynamic portfolio of partners, and thereby keep up the strategic opportunities for development. However......, maintaining the dynamics within a network seems to be a complex challenge. There is a risk that the network ends up in The Paradox of Network Participation. The desired renewal and flexibility are not utilised because the involved parties preserve the existing networks structure consisting of the same...... and thereby sort out the paradox of network participation. Trust and information are mechanisms employed to absorb uncertainty. The relationship between trust and the requirement for information depends on the maturity of the relationship. When trust becomes too important as uncertainty absorption mechanism...

  7. Software preservation

    Directory of Open Access Journals (Sweden)

    Tadej Vodopivec

    2011-01-01

    Full Text Available Comtrade Ltd. covers a wide range of activities related to information and communication technologies; its deliverables include web applications, locally installed programs,system software, drivers, embedded software (used e.g. in medical devices, auto parts,communication switchboards. Also the extensive knowledge and practical experience about digital long-term preservation technologies have been acquired. This wide spectrum of activities puts us in the position to discuss the often overlooked aspect of the digital preservation - preservation of software programs. There are many resources dedicated to digital preservation of digital data, documents and multimedia records,but not so many about how to preserve the functionalities and features of computer programs. Exactly these functionalities - dynamic response to inputs - render the computer programs rich compared to documents or linear multimedia. The article opens the questions on the beginning of the way to the permanent digital preservation. The purpose is to find a way in the right direction, where all relevant aspects will be covered in proper balance. The following questions are asked: why at all to preserve computer programs permanently, who should do this and for whom, when we should think about permanent program preservation, what should be persevered (such as source code, screenshots, documentation, and social context of the program - e.g. media response to it ..., where and how? To illustrate the theoretic concepts given the idea of virtual national museum of electronic banking is also presented.

  8. Changes in Ocular Surface Characteristics after Switching from Benzalkonium Chloride-Preserved Latanoprost to Preservative-Free Tafluprost or Benzalkonium Chloride-Preserved Tafluprost

    Directory of Open Access Journals (Sweden)

    Naoto Tokuda

    2017-01-01

    Full Text Available Purpose. The aim of the present study was to examine the effects of switching from Latanoprost ophthalmic solution containing a preservative to preservative-free Tafluprost ophthalmic solution or Tafluprost containing a preservative on ocular surfaces. Materials and Methods. Forty patients (40 eyes with glaucoma (mean age: 62.0 ± 10.9 years using Latanoprost with preservative for six months or longer were assigned either to a Tafluprost-containing-preservative group (20 eyes or preservative-free-Tafluprost group (20 eyes. The intraocular pressure, corneal epithelial barrier function (fluorescein uptake concentration with fluorophotometer FL-500, superficial punctate keratopathy (AD classification, and tear film breakup time (TBUT were assessed before switching and at 12 weeks after switching. Results. No significant differences in intraocular pressure were noted after switching in either group. Corneal epithelial barrier function was improved significantly after switching in both the Tafluprost-containing-preservative and the preservative-free-Tafluprost groups. There were no significant differences in AD scores after switching in the Tafluprost-containing-preservative group, but significant improvements were noted in the preservative-free-Tafluprost group. No significant differences in TBUT were noted in the Tafluprost-containing-preservative or preservative-free-Tafluprost groups after switching. Conclusion. After switching from preservative Latanoprost to Tafluprost containing-preservative or preservative-free Tafluprost, corneal epithelial barrier function was improved while the intraocular pressure reduction was retained.

  9. Changes in Ocular Surface Characteristics after Switching from Benzalkonium Chloride-Preserved Latanoprost to Preservative-Free Tafluprost or Benzalkonium Chloride-Preserved Tafluprost.

    Science.gov (United States)

    Tokuda, Naoto; Kitaoka, Yasushi; Matsuzawa, Akiko; Tsukamoto, Ayaka; Sase, Kana; Sakae, Shinsuke; Takagi, Hitoshi

    2017-01-01

    The aim of the present study was to examine the effects of switching from Latanoprost ophthalmic solution containing a preservative to preservative-free Tafluprost ophthalmic solution or Tafluprost containing a preservative on ocular surfaces. Forty patients (40 eyes) with glaucoma (mean age: 62.0 ± 10.9 years) using Latanoprost with preservative for six months or longer were assigned either to a Tafluprost-containing-preservative group (20 eyes) or preservative-free-Tafluprost group (20 eyes). The intraocular pressure, corneal epithelial barrier function (fluorescein uptake concentration with fluorophotometer FL-500), superficial punctate keratopathy (AD classification), and tear film breakup time (TBUT) were assessed before switching and at 12 weeks after switching. No significant differences in intraocular pressure were noted after switching in either group. Corneal epithelial barrier function was improved significantly after switching in both the Tafluprost-containing-preservative and the preservative-free-Tafluprost groups. There were no significant differences in AD scores after switching in the Tafluprost-containing-preservative group, but significant improvements were noted in the preservative-free-Tafluprost group. No significant differences in TBUT were noted in the Tafluprost-containing-preservative or preservative-free-Tafluprost groups after switching. After switching from preservative Latanoprost to Tafluprost containing-preservative or preservative-free Tafluprost, corneal epithelial barrier function was improved while the intraocular pressure reduction was retained.

  10. Analysis of complex networks using aggressive abstraction.

    Energy Technology Data Exchange (ETDEWEB)

    Colbaugh, Richard; Glass, Kristin.; Willard, Gerald

    2008-10-01

    This paper presents a new methodology for analyzing complex networks in which the network of interest is first abstracted to a much simpler (but equivalent) representation, the required analysis is performed using the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit abstractions that are simultaneously dramatically simplifying and property preserving we call these aggressive abstractions -- and which can therefore be analyzed using the proposed approach. We then introduce and develop two forms of aggressive abstraction: 1.) finite state abstraction, in which dynamical networks with uncountable state spaces are modeled using finite state systems, and 2.) onedimensional abstraction, whereby high dimensional network dynamics are captured in a meaningful way using a single scalar variable. In each case, the property preserving nature of the abstraction process is rigorously established and efficient algorithms are presented for computing the abstraction. The considerable potential of the proposed approach to complex networks analysis is illustrated through case studies involving vulnerability analysis of technological networks and predictive analysis for social processes.

  11. MoDOT pavement preservation research program volume IV, pavement evaluation tools-data collection methods.

    Science.gov (United States)

    2015-10-01

    The overarching goal of the MoDOT Pavement Preservation Research Program, Task 3: Pavement Evaluation Tools Data : Collection Methods was to identify and evaluate methods to rapidly obtain network-level and project-level information relevant to :...

  12. Energy efficient topology control algorithm for wireless mesh networks

    CSIR Research Space (South Africa)

    Aron, FO

    2008-08-01

    Full Text Available The control of the topology of a network makes it possible for the network nodes to reduce their power of transmission while ensuring that network connectivity is preserved. This paper explains the need for energy consumption control in Wireless...

  13. Parameter-free Network Sparsification and Data Reduction by Minimal Algorithmic Information Loss

    KAUST Repository

    Zenil, Hector

    2018-02-16

    The study of large and complex datasets, or big data, organized as networks has emerged as one of the central challenges in most areas of science and technology. Cellular and molecular networks in biology is one of the prime examples. Henceforth, a number of techniques for data dimensionality reduction, especially in the context of networks, have been developed. Yet, current techniques require a predefined metric upon which to minimize the data size. Here we introduce a family of parameter-free algorithms based on (algorithmic) information theory that are designed to minimize the loss of any (enumerable computable) property contributing to the object\\'s algorithmic content and thus important to preserve in a process of data dimension reduction when forcing the algorithm to delete first the least important features. Being independent of any particular criterion, they are universal in a fundamental mathematical sense. Using suboptimal approximations of efficient (polynomial) estimations we demonstrate how to preserve network properties outperforming other (leading) algorithms for network dimension reduction. Our method preserves all graph-theoretic indices measured, ranging from degree distribution, clustering-coefficient, edge betweenness, and degree and eigenvector centralities. We conclude and demonstrate numerically that our parameter-free, Minimal Information Loss Sparsification (MILS) method is robust, has the potential to maximize the preservation of all recursively enumerable features in data and networks, and achieves equal to significantly better results than other data reduction and network sparsification methods.

  14. Self-preserving cosmetics.

    Science.gov (United States)

    Varvaresou, A; Papageorgiou, S; Tsirivas, E; Protopapa, E; Kintziou, H; Kefala, V; Demetzos, C

    2009-06-01

    Preservatives are added to products for two reasons: first, to prevent microbial spoilage and therefore to prolong the shelf life of the product; second, to protect the consumer from a potential infection. Although chemical preservatives prevent microbial growth, their safety is questioned by a growing segment of consumers. Therefore, there is a considerable interest in the development of preservative-free or self-preserving cosmetics. In these formulations traditional/chemical preservatives have been replaced by other cosmetic ingredients with antimicrobial properties that are not legislated as preservatives according to the Annex VI of the Commission Directive 76/768/EEC and the amending directives (2003/15/EC, 2007/17/EC and 2007/22/EC). 'Hurdle Technology', a technology that has been used for the control of product safety in the food industry since 1970s, has also been applied for the production of self-preserving cosmetics. 'Hurdle Technology' is a term used to describe the intelligent combination of different preservation factors or hurdles to deteriorate the growth of microorganisms. Adherence to current good manufacturing practice, appropriate packaging, careful choice of the form of the emulsion, low water activity and low or high pH values are significant variables for the control of microbial growth in cosmetic formulations. This paper describes the application of the basic principles of 'Hurdle Technology' in the production of self-preserving cosmetics. Multifunctional antimicrobial ingredients and plant-derived essential oils and extracts that are used as alternative or natural preservatives and are not listed in Annex VI of the Cosmetic Directive are also reported.

  15. Dynamic behaviors in directed networks

    International Nuclear Information System (INIS)

    Park, Sung Min; Kim, Beom Jun

    2006-01-01

    Motivated by the abundance of directed synaptic couplings in a real biological neuronal network, we investigate the synchronization behavior of the Hodgkin-Huxley model in a directed network. We start from the standard model of the Watts-Strogatz undirected network and then change undirected edges to directed arcs with a given probability, still preserving the connectivity of the network. A generalized clustering coefficient for directed networks is defined and used to investigate the interplay between the synchronization behavior and underlying structural properties of directed networks. We observe that the directedness of complex networks plays an important role in emerging dynamical behaviors, which is also confirmed by a numerical study of the sociological game theoretic voter model on directed networks

  16. Think global, act local: Preserving the global commons

    OpenAIRE

    Hauser, Oliver P.; Hendriks, Achim; Rand, David G.; Nowak, Martin A.

    2016-01-01

    Preserving global public goods, such as the planet’s ecosystem, depends on large-scale cooperation, which is difficult to achieve because the standard reciprocity mechanisms weaken in large groups. Here we demonstrate a method by which reciprocity can maintain cooperation in a large-scale public goods game (PGG). In a first experiment, participants in groups of on average 39 people play one round of a Prisoner’s Dilemma (PD) with their two nearest neighbours on a cyclic network after each PGG...

  17. A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qian Xiao

    2012-09-01

    Full Text Available To provide security for data gathering based on network coding in wireless sensor networks (WSNs, a secure network coding-based data gathering model is proposed, and a data-privacy preserving and pollution preventing (DPPaamp;PP protocol using network coding is designed. DPPaamp;PP makes use of a new proposed pollution symbol selection and pollution (PSSP scheme based on a new obfuscation idea to pollute existing symbols. Analyses of DPPaamp;PP show that it not only requires low overhead on computation and communication, but also provides high security on resisting brute-force attacks.

  18. Organ Preservation: Current Concepts and New Strategies for the Next Decade

    Science.gov (United States)

    Guibert, Edgardo E.; Petrenko, Alexander Y.; Balaban, Cecilia L.; Somov, Alexander Y.; Rodriguez, Joaquín V.; Fuller, Barry J.

    2011-01-01

    Summary Organ transplantation has developed over the past 50 years to reach the sophisticated and integrated clinical service of today through several advances in science. One of the most important of these has been the ability to apply organ preservation protocols to deliver donor organs of high quality, via a network of organ exchange to match the most suitable recipient patient to the best available organ, capable of rapid resumption of life-sustaining function in the recipient patient. This has only been possible by amassing a good understanding of the potential effects of hypoxic injury on donated organs, and how to prevent these by applying organ preservation. This review sets out the history of organ preservation, how applications of hypothermia have become central to the process, and what the current status is for the range of solid organs commonly transplanted. The science of organ preservation is constantly being updated with new knowledge and ideas, and the review also discusses what innovations are coming close to clinical reality to meet the growing demands for high quality organs in transplantation over the next few years. PMID:21566713

  19. Comparison of contamination rates between preserved and preservative-free fluoroquinolone eyedrops.

    Science.gov (United States)

    Kim, Mo Sae; Kim, Hong Kyun; Kim, Joon Mo; Choi, Chul Young

    2013-03-01

    To evaluate the antimicrobial effectiveness of preservative-free fluoroquinolone products compared with benzalkonium chloride containing fluoroquinolones using the challenge test provided by the United States Pharmacopeia (USP) and the in-use test. 1. Challenge test: to compare the growth of microorganisms between different fluoroquinolone preparations, four test organisms, including Staphylococcus aureus, Pseudomonas aeruginosa, Candida albicans, and Aspergillus niger were chosen among five microorganisms listed by USP 2004. The inoculated products were sampled for microbial survivors at days 7, 14, and 28 following initial inoculation at room temperature. The number of surviving organisms were calculated as a Log10 reduction from the original inocula. 2. In-use test: a total of 100 bottles were collected after instillation of preservative-free fluoroquinolone eyedrops in volunteer patients after 1 week of use. The remaining fluid and tips of the bottles were cultured. Colonies on the plates were counted at the end of the incubation period. All microorganisms were identified by Gram staining and biochemical assays. 1. Challenge test: preservative-free gatifloxacin and levofloxacin demonstrated a lower log reduction against A. niger than preserved fluoroquinolones and preservative-free moxifloxacin at all time points. 2. In-use test: There was no contamination identified on plates inoculated by preservative-free quinolone bottles after 1 week of use in this study. Physicians should be aware of the lower antifungal preservative effectiveness of some preservative-free fluoroquinolone preparations than preserved ones.

  20. Wood preservation

    Science.gov (United States)

    Kevin Archer; Stan Lebow

    2006-01-01

    Wood preservation can be interpreted to mean protection from fire, chemical degradation, mechanical wear, weathering, as well as biological attack. In this chapter, the term preservation is applied more restrictively to protection from biological hazards.

  1. Machine Perfusion of Porcine Livers with Oxygen-Carrying Solution Results in Reprogramming of Dynamic Inflammation Networks

    Directory of Open Access Journals (Sweden)

    David Sadowsky

    2016-11-01

    Full Text Available Background: Ex vivo machine perfusion (MP can better preserve organs for transplantation. We have recently reported on the first application of a MP protocol in which liver allografts were fully oxygenated, under dual pressures and subnormothermic conditions, with a new hemoglobin-based oxygen carrier solution specifically developed for ex vivo utilization. In those studies, MP improved organ function post-operatively and reduced inflammation in porcine livers. Herein, we sought to refine our knowledge regarding the impact of MP by defining dynamic networks of inflammation in both tissue and perfusate. Methods: Porcine liver allografts were preserved either with MP (n = 6 or with cold static preservation (CSP; n = 6, then transplanted orthotopically after 9 h of preservation. Fourteen inflammatory mediators were measured in both tissue and perfusate during liver preservation at multiple time points, and analyzed using Dynamic Bayesian Network (DyBN inference to define feedback interactions, as well as Dynamic Network Analysis (DyNA to define the time-dependent development of inflammation networks.Results: Network analyses of tissue and perfusate suggested an NLRP3 inflammasome-regulated response in both treatment groups, driven by the pro-inflammatory cytokine interleukin (IL-18 and the anti-inflammatory mediator IL-1 receptor antagonist (IL-1RA. Both DyBN and DyNA suggested a reduced role of IL-18 and increased role of IL-1RA with MP, along with increased liver damage with CSP. DyNA also suggested divergent progression of responses over the 9 h preservation time, with CSP leading to a stable pattern of IL-18-induced liver damage and MP leading to a resolution of the pro-inflammatory response. These results were consistent with prior clinical, biochemical, and histological findings after liver transplantation. Conclusion: Our results suggest that analysis of dynamic inflammation networks in the setting of liver preservation may identify novel

  2. Changes in Ocular Surface Characteristics after Switching from Benzalkonium Chloride-Preserved Latanoprost to Preservative-Free Tafluprost or Benzalkonium Chloride-Preserved Tafluprost

    OpenAIRE

    Tokuda, Naoto; Kitaoka, Yasushi; Matsuzawa, Akiko; Tsukamoto, Ayaka; Sase, Kana; Sakae, Shinsuke; Takagi, Hitoshi

    2017-01-01

    Purpose. The aim of the present study was to examine the effects of switching from Latanoprost ophthalmic solution containing a preservative to preservative-free Tafluprost ophthalmic solution or Tafluprost containing a preservative on ocular surfaces. Materials and Methods. Forty patients (40 eyes) with glaucoma (mean age: 62.0 ± 10.9 years) using Latanoprost with preservative for six months or longer were assigned either to a Tafluprost-containing-preservative group (20 eyes) or preservativ...

  3. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.

    Science.gov (United States)

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-06-20

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.

  4. Efficient spatial privacy preserving scheme for sensor network

    Science.gov (United States)

    Debnath, Ashmita; Singaravelu, Pradheepkumar; Verma, Shekhar

    2013-03-01

    The privacy of sensitive events observed by a wireless sensor networks (WSN) needs to be protected. Adversaries with the knowledge of sensor deployment and network protocols can infer the location of a sensed event by monitoring the communication from the sensors even when the messages are encrypted. Encryption provides confidentiality; however, the context of the event can used to breach the privacy of sensed objects. An adversary can track the trajectory of a moving object or determine the location of the occurrence of a critical event to breach its privacy. In this paper, we propose ring signature to obfuscate the spatial information. Firstly, the extended region of location of an event of interest as estimated from a sensor communication is presented. Then, the increase in this region of spatial uncertainty due to the effect of ring signature is determined. We observe that ring signature can effectively enhance the region of location uncertainty of a sensed event. As the event of interest can be situated anywhere in the enhanced region of uncertainty, its privacy against local or global adversary is ensured. Both analytical and simulation results show that induced delay and throughput are insignificant with negligible impact on the performance of a WSN.

  5. Registering, indexing and digitally preserving RDBCI: Production indicators of 2003 to 2016

    Directory of Open Access Journals (Sweden)

    Gildenir Carolino Santos

    2016-09-01

    Full Text Available The question of explosion and digital preservation issues are totally in vogue today. In this context, the aim of this study is to analyze bibliographically the typeset production and published the “RDBCI: Revista Digital de Biblioteconomia e Ciência da Informação” in these its thirteen years of existence, in order to disclose the analysis of published scientific production, featuring the themes of articles and the most representative authors, contributing to the community area in question as well as enhance the importance of the magazine to the field of Library and Information Science. The journal is entirely digital, born and incubated on free platform OJS/SEER, provided by IBICT since 2004. Moreover, in these years of experience the magazine is effective information vehicle of the area and its existence confirms that electronic publications born in this format, survive in the digital world. From 2013, the RDBCI began to integrate Cariniana Network (IBICT, digitally preserving your entire collection through the LOCKSS software, and other institutions aggregated to the network, and in March 2016 began to integrate The Keepers Registry, making If the first Brazilian publication to be part of this international digital preservation network. The methodology adopted was through a survey of articles published from 2003 to 2016, collecting data such as access numbers, downloads, and other statistical and qualitative indicators, making use of tools such as Google Analytics, Altmetrics, Index h and alternative metrics as well as databases, directories, portals and indexes where the journal is indexed. We believe the result of this work serves as a qualitative analysis model for other periodicals and promotes growth of more national and international scientific publications with open access.

  6. Preservation in the Age of Google: Digitization, Digital Preservation, and Dilemmas

    Science.gov (United States)

    Conway, Paul

    2010-01-01

    The cultural heritage preservation community now functions largely within the environment of digital technologies. This article begins by juxtaposing definitions of the terms "digitization for preservation" and "digital preservation" within a sociotechnical environment for which Google serves as a relevant metaphor. It then reviews two reports…

  7. Positivity Preserving Interpolation Using Rational Bicubic Spline

    Directory of Open Access Journals (Sweden)

    Samsul Ariffin Abdul Karim

    2015-01-01

    Full Text Available This paper discusses the positivity preserving interpolation for positive surfaces data by extending the C1 rational cubic spline interpolant of Karim and Kong to the bivariate cases. The partially blended rational bicubic spline has 12 parameters in the descriptions where 8 of them are free parameters. The sufficient conditions for the positivity are derived on every four boundary curves network on the rectangular patch. Numerical comparison with existing schemes also has been done in detail. Based on Root Mean Square Error (RMSE, our partially blended rational bicubic spline is on a par with the established methods.

  8. Evaluation of Seasonality in Shallow Groundwater Dynamics and Storage in an Urban Prairie Nature Preserve Using a High-Frequency Sensing Network

    Science.gov (United States)

    Rivera, V. A.; Hernandez-Gonzalez, L. M.; Phillips, C. B.; Nair, A.; Negri, M. C.; Gnaedinger, K. J.; Miller, W. M.; Packman, A. I.

    2017-12-01

    Changing regional climate applies stresses to urban areas in the form of altered weather patterns, requiring new strategies for stormwater runoff management and flood mitigation. At the same time, the proportion of people residing in urban areas is increasing and cities are turning to greenspace as a tool for managing runoff. Gensburg Markham Prairie (GMP), located in Markham, Illinois south of Chicago, is an urban prairie nature preserve and a U.S. National Natural Landmark. Owned by Northeastern Illinois University and managed by the Nature Conservancy, GMP receives runoff from surrounding urban areas and provides valuable stormwater storage, while also hosting high biodiversity and providing critical habitat for sensitive and endemic. A successful management strategy for GMP should preserve both of these valuable ecosystem services. To understand GMP's role within the urban environment, we installed a suite of instruments in 2016 and 2017 to measure surface and groundwater levels, rainfall, soil moisture, and electrical conductivity throughout the prairie. This monitoring network includes 40 sensors collecting high frequency data (every 30 minutes). We are also collecting monthly distributed surface and groundwater samples to quantify a range of anions and cations that signal potentially detrimental anthropogenic impacts on the prairie. In addition, we are using historical and ongoing plant distribution surveys to explore the interactions between spatial patterns in vegetation and water dynamics in the prairie. The high measurement frequency and large diversity of sensor types supports holistic investigation of the response of the prairie to diverse events, including summer thunderstorms, winter road salt runoff, and spring snowmelt. The 18 months of data collected to date reveals clear patterns in response to weather events with influence from soil type and spatial variables. We are using time-series analysis with MODFLOW modelling to explore surface

  9. Seniors' self-preservation by maintaining established self and defying deterioration - A grounded theory.

    Science.gov (United States)

    Eriksson, Jeanette Källstrand; Hildingh, Cathrine; Buer, Nina; Thulesius, Hans

    2016-01-01

    The purpose of this classic grounded theory study was to understand how seniors who are living independently resolve issues influenced by visual impairment and high fall risk. We interviewed and observed 13 seniors with visual impairment in their homes. We also interviewed six visual instructors with experience from many hundreds of relevant incidents from the same group of seniors. We found that the seniors are resolving their main concern of "remaining themselves as who they used to be" by self-preservation. Within this category, the strategies maintaining the established self and defying deterioration emerged as the most prominent in our data. The theme maintaining the established self is mostly guided by change inertia and includes living the past (retaining past activities, reminiscing, and keeping the home intact) and facading (hiding impairment, leading to avoidance of becoming a burden and to risk juggling). Defying deterioration is a proactive scheme and involves moving (by exercising, adapting activities, using walking aids, driving), adapting (by finding new ways), and networking by sustaining old support networks or finding new networks. Self-preservation is generic human behavior and modifying this theory to other fields may therefore be worthwhile. In addition, health care providers may have use for the theory in fall preventive planning.

  10. Digital preservation

    CERN Document Server

    Deegan, Marilyn

    2013-01-01

    Digital preservation is an issue of huge importance to the library and information profession right now. With the widescale adoption of the internet and the rise of the world wide web, the world has been overwhelmed by digital information. Digital data is being produced on a massive scale by individuals and institutions: some of it is born, lives and dies only in digital form, and it is the potential death of this data, with its impact on the preservation of culture, that is the concern of this book. So how can information professionals try to remedy this? Digital preservation is a complex iss

  11. Concurrent conditional clustering of multiple networks: COCONETS.

    Directory of Open Access Journals (Sweden)

    Sabrina Kleessen

    Full Text Available The accumulation of high-throughput data from different experiments has facilitated the extraction of condition-specific networks over the same set of biological entities. Comparing and contrasting of such multiple biological networks is in the center of differential network biology, aiming at determining general and condition-specific responses captured in the network structure (i.e., included associations between the network components. We provide a novel way for comparison of multiple networks based on determining network clustering (i.e., partition into communities which is optimal across the set of networks with respect to a given cluster quality measure. To this end, we formulate the optimization-based problem of concurrent conditional clustering of multiple networks, termed COCONETS, based on the modularity. The solution to this problem is a clustering which depends on all considered networks and pinpoints their preserved substructures. We present theoretical results for special classes of networks to demonstrate the implications of conditionality captured by the COCONETS formulation. As the problem can be shown to be intractable, we extend an existing efficient greedy heuristic and applied it to determine concurrent conditional clusters on coexpression networks extracted from publically available time-resolved transcriptomics data of Escherichia coli under five stresses as well as on metabolite correlation networks from metabolomics data set from Arabidopsis thaliana exposed to eight environmental conditions. We demonstrate that the investigation of the differences between the clustering based on all networks with that obtained from a subset of networks can be used to quantify the specificity of biological responses. While a comparison of the Escherichia coli coexpression networks based on seminal properties does not pinpoint biologically relevant differences, the common network substructures extracted by COCONETS are supported by

  12. Shear-induced network-to-network transition in a block copolymer melt

    International Nuclear Information System (INIS)

    Cochran, Eric W.; Bates, Frank S.

    2004-01-01

    A tricontinuous (10,3)c network phase is documented in a poly(cyclohexylethylene-b-ethylethylene-b-ethylene) triblock copolymer melt based on small-angle x-ray scattering. Application of shear transforms the self-assembled soft material into a single crystal (10,3)d network while preserving the short-range threefold connector geometry. Long-range topological restructuring reduces the space group symmetry, from Fddd to Pnna, maintaining orthorhombic lattice symmetry. Both phases are stable to long time annealing, indicative of nearly degenerate free energies and prohibitive kinetic barriers

  13. A Framework for Relating Timed Transition Systems and Preserving TCTL Model Checking

    DEFF Research Database (Denmark)

    Jacobsen, Lasse; Jacobsen, Morten; Møller, Mikael Harkjær

    2010-01-01

    Many formal translations between time dependent models have been proposed over the years. While some of them produce timed bisimilar models, others preserve only reachability or (weak) trace equivalence. We suggest a general framework for arguing when a translation preserves Timed Computation Tree...... Logic (TCTL) or its safety fragment.The framework works at the level of timed transition systems, making it independent of the modeling formalisms and applicable to many of the translations published in the literature. Finally, we present a novel translation from extended Timed-Arc Petri Nets...... to Networks of Timed Automata and using the framework argue that itpreserves the full TCTL. The translation has been implemented in the verification tool TAPAAL....

  14. Virtualized cognitive network architecture for 5G cellular networks

    KAUST Repository

    Elsawy, Hesham

    2015-07-17

    Cellular networks have preserved an application agnostic and base station (BS) centric architecture1 for decades. Network functionalities (e.g. user association) are decided and performed regardless of the underlying application (e.g. automation, tactile Internet, online gaming, multimedia). Such an ossified architecture imposes several hurdles against achieving the ambitious metrics of next generation cellular systems. This article first highlights the features and drawbacks of such architectural ossification. Then the article proposes a virtualized and cognitive network architecture, wherein network functionalities are implemented via software instances in the cloud, and the underlying architecture can adapt to the application of interest as well as to changes in channels and traffic conditions. The adaptation is done in terms of the network topology by manipulating connectivities and steering traffic via different paths, so as to attain the applications\\' requirements and network design objectives. The article presents cognitive strategies to implement some of the classical network functionalities, along with their related implementation challenges. The article further presents a case study illustrating the performance improvement of the proposed architecture as compared to conventional cellular networks, both in terms of outage probability and handover rate.

  15. Modes of fossil preservation

    Science.gov (United States)

    Schopf, J.M.

    1975-01-01

    The processes of geologic preservation are important for understanding the organisms represented by fossils. Some fossil differences are due to basic differences in organization of animals and plants, but the interpretation of fossils has also tended to be influenced by modes of preservation. Four modes of preservation generally can be distinguished: (1) Cellular permineralization ("petrifaction") preserves anatomical detail, and, occasionally, even cytologic structures. (2) Coalified compression, best illustrated by structures from coal but characteristic of many plant fossils in shale, preserves anatomical details in distorted form and produces surface replicas (impressions) on enclosing matrix. (3) Authigenic preservation replicates surface form or outline (molds and casts) prior to distortion by compression and, depending on cementation and timing, may intergrade with fossils that have been subject to compression. (4) Duripartic (hard part) preservation is characteristic of fossil skeletal remains, predominantly animal. Molds, pseudomorphs, or casts may form as bulk replacements following dissolution of the original fossil material, usually by leaching. Classification of the kinds of preservation in fossils will aid in identifying the processes responsible for modifying the fossil remains of both animals and plants. ?? 1975.

  16. Design and implementation of a topology control scheme for wireless mesh networks

    CSIR Research Space (South Africa)

    Mudali, P

    2009-09-01

    Full Text Available The Wireless Mesh Network (WMN) backbone is usually comprised of stationary nodes but the transient nature of wireless links results in changing network topologies. Topology Control (TC) aims to preserve network connectivity in ad hoc and mesh...

  17. Efficient Secure and Privacy-Preserving Route Reporting Scheme for VANETs

    Science.gov (United States)

    Zhang, Yuanfei; Pei, Qianwen; Dai, Feifei; Zhang, Lei

    2017-10-01

    Vehicular ad-hoc network (VANET) is a core component of intelligent traffic management system which could provide various of applications such as accident prediction, route reporting, etc. Due to the problems caused by traffic congestion, route reporting becomes a prospective application which can help a driver to get optimal route to save her travel time. Before enjoying the convenience of route reporting, security and privacy-preserving issues need to be concerned. In this paper, we propose a new secure and privacy-preserving route reporting scheme for VANETs. In our scheme, only an authenticated vehicle can use the route reporting service provided by the traffic management center. Further, a vehicle may receive the response from the traffic management center with low latency and without violating the privacy of the vehicle. Experiment results show that our scheme is much more efficiency than the existing one.

  18. La Serra d'Almos (Tarragona): an example of phenological data rescue and preservation in Catalonia

    Science.gov (United States)

    Busto, Montserrat; Cunillera, Jordi; de Yzaguirre, Xavi; Borrell, Josep

    2016-04-01

    The interruption of important phenological series and the progressive disappearance of phenological observations in Catalonia led the Meteorological Service of Catalonia (SMC) to design and impulse a new phenological network promoted by the Climate Change Unit of this Met Service. The "Fenocat" network was born in March 2013, and currently has around fifty observers distributed throughout Catalonia that observe plants, birds and butterflies. We are providing data from different plant phenophases to PEP725 database. Besides this new phenological network (Fenocat), one of the aims of SMC is to rescue and preserve historical data from different observation points in Catalonia. We show in this poster the example of rescue and preservation of phenological data from la Serra d'Almos (in Tivissa, near Tarragona, Catalonia, NE Iberian Peninsula), an observation series that began in 1973. After digitalization process and quality control tasks, we show preliminary results of this phenological series, and we compare them with those of similar European series. We show the evolution trends for different observed species, such as almond tree (Prunus dulcis), hazel (Corylus avellana), plum (Prunus domestica), olive tree (Olea europea), apple tree (Malus domestica) or vineyard (Vitis vinifera).

  19. Preserving Digital Materials

    CERN Document Server

    Harvey, Ross

    2011-01-01

    This book provides a single-volume introduction to the principles, strategies and practices currently applied by librarians and recordkeeping professionals to the critical issue of preservation of digital information. It incorporates practice from both the recordkeeping and the library communities, taking stock of current knowledge about digital preservation and describing recent and current research, to provide a framework for reflecting on the issues that digital preservation raises in professional practice.

  20. A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing

    DEFF Research Database (Denmark)

    Wang, Yu; Xie, Lin; Li, Wenjuan

    2017-01-01

    Nowadays, cyber threats (e.g., intrusions) are distributed across various networks with the dispersed networking resources. Intrusion detection systems (IDSs) have already become an essential solution to defend against a large amount of attacks. With the development of cloud computing, a modern IDS...

  1. Management of fertility preservation in young breast cancer patients in a large breast cancer centre.

    Science.gov (United States)

    Lawrenz, B; Neunhoeffer, E; Henes, M; Lessmann-Bechle, S; Krämer, B; Fehm, Tanja

    2010-11-01

    The increase of breast cancer in young women under 40 years and the increasing age of women at the time of the birth of their first child underlines the importance to implement counselling for fertility-preserving strategies in the management of breast cancer care. We present the fertility-preserving procedures performed after routine counselling for primary breast cancer patients in a large certified breast cancer centre. Since November 2006, patients aged below 40 years with histologically confirmed breast cancer are routinely counselled on fertility-preserving possibilities before breast surgery and chemotherapy in the fertility centre of the University Women's Hospital in Tuebingen. The recommendations are based on the treatment recommendations of the network FertiPROTEKT. During the last 40 months, 56 primary breast cancer patients were counselled. Forty-one of these patients were hormone receptor positive. Thirty-four patients (63%) underwent fertility-preserving strategies. The majority of the patients (n = 22) decided on ovarian tissue cryopreservation. GnRH protection was performed in 14 patients. In 12 patients an ovarian stimulation protocol was initiated to cryopreserve fertilized or unfertilized oocytes. A combination of different fertility-preserving methods was performed in 12 patients. The preservation of ovarian function and fertility are of great importance to young breast cancer patients. Counselling on fertility-preserving strategies is therefore critical in these patients and should be routinely performed.

  2. Seniors’ self-preservation by maintaining established self and defying deterioration – A grounded theory

    Science.gov (United States)

    Eriksson, Jeanette Källstrand; Hildingh, Cathrine; Buer, Nina; Thulesius, Hans

    2016-01-01

    The purpose of this classic grounded theory study was to understand how seniors who are living independently resolve issues influenced by visual impairment and high fall risk. We interviewed and observed 13 seniors with visual impairment in their homes. We also interviewed six visual instructors with experience from many hundreds of relevant incidents from the same group of seniors. We found that the seniors are resolving their main concern of “remaining themselves as who they used to be” by self-preservation. Within this category, the strategies maintaining the established self and defying deterioration emerged as the most prominent in our data. The theme maintaining the established self is mostly guided by change inertia and includes living the past (retaining past activities, reminiscing, and keeping the home intact) and facading (hiding impairment, leading to avoidance of becoming a burden and to risk juggling). Defying deterioration is a proactive scheme and involves moving (by exercising, adapting activities, using walking aids, driving), adapting (by finding new ways), and networking by sustaining old support networks or finding new networks. Self-preservation is generic human behavior and modifying this theory to other fields may therefore be worthwhile. In addition, health care providers may have use for the theory in fall preventive planning. PMID:27172511

  3. Seniors’ self-preservation by maintaining established self and defying deterioration – A grounded theory

    Directory of Open Access Journals (Sweden)

    Jeanette Källstrand Eriksson

    2016-05-01

    Full Text Available The purpose of this classic grounded theory study was to understand how seniors who are living independently resolve issues influenced by visual impairment and high fall risk. We interviewed and observed 13 seniors with visual impairment in their homes. We also interviewed six visual instructors with experience from many hundreds of relevant incidents from the same group of seniors. We found that the seniors are resolving their main concern of “remaining themselves as who they used to be” by self-preservation. Within this category, the strategies maintaining the established self and defying deterioration emerged as the most prominent in our data. The theme maintaining the established self is mostly guided by change inertia and includes living the past (retaining past activities, reminiscing, and keeping the home intact and facading (hiding impairment, leading to avoidance of becoming a burden and to risk juggling. Defying deterioration is a proactive scheme and involves moving (by exercising, adapting activities, using walking aids, driving, adapting (by finding new ways, and networking by sustaining old support networks or finding new networks. Self-preservation is generic human behavior and modifying this theory to other fields may therefore be worthwhile. In addition, health care providers may have use for the theory in fall preventive planning.

  4. Preservation of information about the repository for spent nuclear fuels - proposal for action plan

    International Nuclear Information System (INIS)

    Bowen-Schrire, Monica; Eckerhall, Daniel; Jander, Hans; Waniewska, Katarina

    2008-10-01

    This report is a proposal for an action plan with the ultimate aim of ensuring that information about the repository for spent nuclear fuel can be preserved and transferred for future generations. The purpose of the proposal for an action plan is to present ideas on tangible measures and guidelines for information preservation and transfer, in the short and long term. The report deals with a number of aspects relating to information preservation as well as risks that can lead to the loss of important information. The proposal for an action plan is based on reasoning about these subjects. The main emphasis is on measures that need to be implemented in the near future to ensure that successive and direct information transfer is handled in a suitable manner. It is suggested that the following measures should be implemented within a five-year period: - Designate a person responsible for information preservation. - Work out guidelines for information preservation and transfer. - Form a network with other organizations in Sweden. - Initiate a dialogue with other countries, especially USA and France. - Participate in seminars, conferences and workgroups on an international level within the IAEA and NEA. In a longer time perspective the following measures should also be implemented: - Implement guidelines for information preservation and transfer. - Document the archiving system. - Establish a communication plan. - Archive information about the repository. - Keep the action plan up to date

  5. Secure and Cost-Effective Distributed Aggregation for Mobile Sensor Networks.

    Science.gov (United States)

    Guo, Kehua; Zhang, Ping; Ma, Jianhua

    2016-04-23

    Secure data aggregation (SDA) schemes are widely used in distributed applications, such as mobile sensor networks, to reduce communication cost, prolong the network life cycle and provide security. However, most SDA are only suited for a single type of statistics (i.e., summation-based or comparison-based statistics) and are not applicable to obtaining multiple statistic results. Most SDA are also inefficient for dynamic networks. This paper presents multi-functional secure data aggregation (MFSDA), in which the mapping step and coding step are introduced to provide value-preserving and order-preserving and, later, to enable arbitrary statistics support in the same query. MFSDA is suited for dynamic networks because these active nodes can be counted directly from aggregation data. The proposed scheme is tolerant to many types of attacks. The network load of the proposed scheme is balanced, and no significant bottleneck exists. The MFSDA includes two versions: MFSDA-I and MFSDA-II. The first one can obtain accurate results, while the second one is a more generalized version that can significantly reduce network traffic at the expense of less accuracy loss.

  6. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  7. Inventory of Amphibians and Reptiles at Mojave National Preserve: Final Report

    Science.gov (United States)

    Persons, Trevor B.; Nowak, Erika M.

    2007-01-01

    As part of the National Park Service Inventory and Monitoring Program in the Mojave Network, we conducted an inventory of amphibians and reptiles at Mojave National Preserve in 2004-2005. Objectives for this inventory were to use fieldwork, museum collections, and literature review to document the occurrence of reptile and amphibian species occurring at MOJA. Our goals were to document at least 90% of the species present, provide one voucher specimen for each species identified, provide GIS-referenced distribution information for sensitive species, and provide all deliverables, including NPSpecies entries, as outlined in the Mojave Network Biological Inventory Study Plan. Methods included daytime and nighttime visual encounter surveys and nighttime road driving. Survey effort was concentrated in predetermined priority sampling areas, as well as in areas with a high potential for detecting undocumented species. We recorded 31 species during our surveys. During literature review and museum specimen database searches, we found records for seven additional species from MOJA, elevating the documented species list to 38 (two amphibians and 36 reptiles). Based on our surveys, as well as literature and museum specimen review, we estimate an overall inventory completeness of 95% for Mojave National Preserve herpetofauna; 67% for amphibians and 97% for reptiles.

  8. An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining

    OpenAIRE

    Yogendra Kumar Jain,; Vinod Kumar Yadav,; Geetika S. Panday

    2011-01-01

    The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research trend in privacy data for data mining and statistical database. Association analysis is a powerful toolfor discovering relationships which are hidden in large database. Association rules hiding algorithms get strong and efficient performance for protecting confidential and cru...

  9. A Local Asynchronous Distributed Privacy Preserving Feature Selection Algorithm for Large Peer-to-Peer Networks

    Data.gov (United States)

    National Aeronautics and Space Administration — In this paper we develop a local distributed privacy preserving algorithm for feature selection in a large peer-to-peer environment. Feature selection is often used...

  10. Randomizing growing networks with a time-respecting null model

    Science.gov (United States)

    Ren, Zhuo-Ming; Mariani, Manuel Sebastian; Zhang, Yi-Cheng; Medo, Matúš

    2018-05-01

    Complex networks are often used to represent systems that are not static but grow with time: People make new friendships, new papers are published and refer to the existing ones, and so forth. To assess the statistical significance of measurements made on such networks, we propose a randomization methodology—a time-respecting null model—that preserves both the network's degree sequence and the time evolution of individual nodes' degree values. By preserving the temporal linking patterns of the analyzed system, the proposed model is able to factor out the effect of the system's temporal patterns on its structure. We apply the model to the citation network of Physical Review scholarly papers and the citation network of US movies. The model reveals that the two data sets are strikingly different with respect to their degree-degree correlations, and we discuss the important implications of this finding on the information provided by paradigmatic node centrality metrics such as indegree and Google's PageRank. The randomization methodology proposed here can be used to assess the significance of any structural property in growing networks, which could bring new insights into the problems where null models play a critical role, such as the detection of communities and network motifs.

  11. ANADP II Keynote Clifford Lynch - Coalition of Networked Information

    OpenAIRE

    Lynch, Clifford

    2014-01-01

    Aligning National Approaches to Digital Preservation: An Action Assembly Biblioteca de Catalunya (National Library of Catalonia) November 18-20, 2013, Barcelona, Spain Auburn University Council on Library and Information Resources (CLIR) Digital Curation Centre (DCC) Digital Preservation Network (DPN) Joint Information Systems Committee (JISC) University of North Texas Virginia Tech Interuniversity Consortium for Political and Social Research (ICPSR) Innovative Inte...

  12. Summary of the preservation techniques and the evolution of the anammox bacteria characteristics during preservation.

    Science.gov (United States)

    Chen, Hui; Jin, Ren-Cun

    2017-06-01

    The anaerobic ammonium oxidation (anammox) process is a promising wastewater treatment method for biological nitrogen removal. A sufficient amount of active anammox sludge as a seed is crucial to the fast establishment and stability of the anammox process. Anammox bacteria is a kind of microorganism which is sensitive to the environmental conditions, e.g., oxygen, temperature. The optimum temperature and pH for the growth of the anammox bacteria are 30-40 °C and 6.7-8.3. A proper preservation technique allows fast start-up of the anammox process, overcoming the long doubling time of anammox biomass. The preservation of the anammox sludge is influenced by various factors, e.g., preservation techniques, duration, temperature, substrates, and protective agents. During preservation, the characteristics of the anammox biomass, including the bioactivity, heme c content, extracellular polymeric substances (EPS), and sludge morphology, change with time. The optimum preservation technique is not invariable and it depends on the purpose of preservation (precedence of bioactivity or quantity), the bacterial community, and other parameters. It is important for the preserved anammox biomass to achieve reactivation so that stable anammox reactors can be established as soon as possible. However, because the preservation process is complicated, the knowledge regarding preservation is far from complete, and much future work will be required to increase the understanding of preservation.

  13. Low-level efficacy of cosmetic preservatives

    DEFF Research Database (Denmark)

    Lundov, M D; Johansen, J D; Zachariae, C

    2011-01-01

    Preservation using combinations of preservatives has several advantages. This study shows that the concentration of some of the most frequently used allergenic preservatives can be markedly lowered when they are combined with phenoxyethanol. The antimicrobial efficacy of cosmetic preservatives...... of the preservatives indicated additive effects against the microorganisms. No combination of preservatives showed any inhibitory action on each other. Challenge tests with different concentrations and combinations were performed in a cosmetic cream. Diazolidinyl urea and MCI/MI alone were ineffective against C....... albicans in a challenge test at concentrations up to 16 times higher than the observed MIC values. When combining phenoxyethanol with either one of the allergenic preservatives diazolidinyl urea, MCI/MI or MI, the cosmetic cream was adequately preserved at concentrations well below the preservatives' MIC values as well...

  14. POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks

    NARCIS (Netherlands)

    Jeckmans, Arjan; Tang, Qiang; Hartel, Pieter H.

    2011-01-01

    Currently, none of the existing online social networks (OSNs) enables its users to make new friends without revealing their private information. This leaves the users in a vulnerable position when searching for new friends. We propose a solution which enables a user to compute her profile similarity

  15. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  16. Preservation and reactivation of Candidatus Jettenia asiatica and Anammoxoglobus propionicus using different preservative agents.

    Science.gov (United States)

    Viancelli, A; Pra, M C; Scussiato, L A; Cantão, M; Ibelli, A M G; Kunz, A

    2017-11-01

    Anaerobic ammonium oxidation (anammox) bacteria have peculiar characteristics that make them difficult to cultivate. The conservation of these microorganisms in culture collections or laboratories requires successful preservation and reactivation techniques. Furthermore, studies have shown that successful reactivation may be preservative dependent. Considering this, the present study aimed to evaluate the preservation and reactivation of anammox consortia enriched from swine manure treatment lagoons, by using different preservative agents at different temperatures: KNO 3 (at 4 °C), glycerol (-20 °C, -80 °C), and skimmed cow milk (-20 °C, -80 °C, -200 °C). After 4 months, the biomass was thawed (except for KNO 3 ), and the reestablishment of anammox activity was evaluated by stoichiometric coefficients. Microbial community transformation during the reactivation process was also studied by 16S rDNA sequence analysis. The results showed that the anammox biomass preserved with glycerol or skimmed cow milk at -80 °C recovered activity, while the biomass preserved with other methodologies did not reestablish activity during the studied time (90 days). The bacterial community from the biomass with anammox activity was characterized and showed the presence of Candidatus Brocadia anammoxidans, Candidatus Jettenia asiatica, and Candidatus Anammoxoglobus propionicus. Preservation with skimmed cow milk at -80 °C favored the selection of Candidatus Anammoxoglobus propionicus, while preservation with glycerol at -80 °C was successful for Candidatus Jettenia asiatica. The present study was effective on anammox sludge preservation and reactivation using low-cost processes for anammox cultures preservation, which is important for biomass transport and deammonification reactor start up. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Multilevel method for modeling large-scale networks.

    Energy Technology Data Exchange (ETDEWEB)

    Safro, I. M. (Mathematics and Computer Science)

    2012-02-24

    Understanding the behavior of real complex networks is of great theoretical and practical significance. It includes developing accurate artificial models whose topological properties are similar to the real networks, generating the artificial networks at different scales under special conditions, investigating a network dynamics, reconstructing missing data, predicting network response, detecting anomalies and other tasks. Network generation, reconstruction, and prediction of its future topology are central issues of this field. In this project, we address the questions related to the understanding of the network modeling, investigating its structure and properties, and generating artificial networks. Most of the modern network generation methods are based either on various random graph models (reinforced by a set of properties such as power law distribution of node degrees, graph diameter, and number of triangles) or on the principle of replicating an existing model with elements of randomization such as R-MAT generator and Kronecker product modeling. Hierarchical models operate at different levels of network hierarchy but with the same finest elements of the network. However, in many cases the methods that include randomization and replication elements on the finest relationships between network nodes and modeling that addresses the problem of preserving a set of simplified properties do not fit accurately enough the real networks. Among the unsatisfactory features are numerically inadequate results, non-stability of algorithms on real (artificial) data, that have been tested on artificial (real) data, and incorrect behavior at different scales. One reason is that randomization and replication of existing structures can create conflicts between fine and coarse scales of the real network geometry. Moreover, the randomization and satisfying of some attribute at the same time can abolish those topological attributes that have been undefined or hidden from

  18. Towards a Standard for Provenance and Context for Preservation of Data for Earth System Science

    Science.gov (United States)

    Ramaprian, Hampapuram K.; Moses, John F.

    2011-01-01

    Long-term data sets with data from many missions are needed to study trends and validate model results that are typical in Earth System Science research. Data and derived products originate from multiple missions (spaceborne, airborne and/or in situ) and from multiple organizations. During the missions as well as well past their termination, it is essential to preserve the data and products to support future studies. Key aspects of preservation are: preserving bits and ensuring data are uncorrupted, preserving understandability with appropriate documentation, and preserving reproducibility of science with appropriate documentation and other artifacts. Computer technology provides adequate standards to ensure that, with proper engineering, bits are preserved as hardware evolves. However, to ensure understandability and reproducibility, it is essential to plan ahead to preserve all the relevant data and information. There are currently no standards to identify the content that needs to be preserved, leading to non-uniformity in content and users not being sure of whether preserved content is comprehensive. Each project, program or agency can specify the items to be preserved as a part of its data management requirements. However, broader community consensus that cuts across organizational or national boundaries would be needed to ensure comprehensiveness, uniformity and long-term utility of archived data. The Federation of Earth Science Information Partners (ESIP), a diverse network of scientists, data stewards and technology developers, has a forum for ESIP members to collaborate on data preservation issues. During early 2011, members discussed the importance of developing a Provenance and Context Content Standard (PCCS) and developed an initial list of content items. This list is based on the outcome of a NASA and NOAA meeting held in 1998 under the auspices of the USGCRP, documentation requirements from NOAA and our experience with some of the NASA Earth science

  19. Optimization of wavelet decomposition for image compression and feature preservation.

    Science.gov (United States)

    Lo, Shih-Chung B; Li, Huai; Freedman, Matthew T

    2003-09-01

    A neural-network-based framework has been developed to search for an optimal wavelet kernel that can be used for a specific image processing task. In this paper, a linear convolution neural network was employed to seek a wavelet that minimizes errors and maximizes compression efficiency for an image or a defined image pattern such as microcalcifications in mammograms and bone in computed tomography (CT) head images. We have used this method to evaluate the performance of tap-4 wavelets on mammograms, CTs, magnetic resonance images, and Lena images. We found that the Daubechies wavelet or those wavelets with similar filtering characteristics can produce the highest compression efficiency with the smallest mean-square-error for many image patterns including general image textures as well as microcalcifications in digital mammograms. However, the Haar wavelet produces the best results on sharp edges and low-noise smooth areas. We also found that a special wavelet whose low-pass filter coefficients are 0.32252136, 0.85258927, 1.38458542, and -0.14548269) produces the best preservation outcomes in all tested microcalcification features including the peak signal-to-noise ratio, the contrast and the figure of merit in the wavelet lossy compression scheme. Having analyzed the spectrum of the wavelet filters, we can find the compression outcomes and feature preservation characteristics as a function of wavelets. This newly developed optimization approach can be generalized to other image analysis applications where a wavelet decomposition is employed.

  20. Dynamics of continuous-time bidirectional associative memory neural networks with impulses and their discrete counterparts

    International Nuclear Information System (INIS)

    Huo Haifeng; Li Wantong

    2009-01-01

    This paper is concerned with the global stability characteristics of a system of equations modelling the dynamics of continuous-time bidirectional associative memory neural networks with impulses. Sufficient conditions which guarantee the existence of a unique equilibrium and its exponential stability of the networks are obtained. For the goal of computation, discrete-time analogues of the corresponding continuous-time bidirectional associative memory neural networks with impulses are also formulated and studied. Our results show that the above continuous-time and discrete-time systems with impulses preserve the dynamics of the networks without impulses when we make some modifications and impose some additional conditions on the systems, the convergence characteristics dynamics of the networks are preserved by both continuous-time and discrete-time systems with some restriction imposed on the impulse effect.

  1. Online Social Networking: A Primer for Radiology

    OpenAIRE

    Prasanna, Prasanth M.; Seagull, F. Jacob; Nagy, Paul

    2011-01-01

    Online social networking is an immature, but rapidly evolving industry of web-based technologies that allow individuals to develop online relationships. News stories populate the headlines about various websites which can facilitate patient and doctor interaction. There remain questions about protecting patient confidentiality and defining etiquette in order to preserve the doctor/patient relationship and protect physicians. How much social networking-based communication or other forms of E-c...

  2. Globalization and Localization of Heritage Preservation in Taiwan - an Analysis Perspective under the Cultural Heritage Preservation Act

    Science.gov (United States)

    Chen, C.-C.; Fu, C.-C.

    2015-08-01

    The key contribution to the legislation of heritage preservation in Taiwan primarily derived from the historical monument movements in the 1970s. Specific legislation results include the establishment of Council for Cultural Affairs and the implementation of the Cultural Heritage Preservation Act in 1982. Although the Cultural Heritage Preservation Act is the first subjective cultural act, its lack of structure during the initial commencement stages made it un-conducive to heritage preservation and thus unable to meet the people's expectations. Therefore, throughout the 33 years after the implementation of the Cultural Heritage Preservation Act, the Act has been amended 6 times. These amendments reflect the degree of importance that the society has attached to heritage preservation, and the innovative system also showcases the progress in preservation concepts and methods. These innovative orientations, such as emphasizing on the authenticity and integrity of heritage preservation, intangible cultural heritage, and cultural diversity, conform to the international preservation trends. They are also local trends such as encouraging community participation, adaptive-reuse, or enhancing the local governments' powers to implement local cultural governance. This is particularly true for the fifth comprehensive revision in 2005, which has symbolic significance because its contents epitomized the heritage preservation work while moving Taiwan's heritage preservation system towards globalization and localization. Therefore, we analyzed the Cultural Heritage Preservation Act amendment and revision processes over the past 33 years to highlight the innovations in Taiwan's cultural heritage work and illustrate their globalization and localization features. Finally, we proposed recommendations for Taiwan's preservation work in the future as the Cultural Heritage Preservation Act is about to undergo its seventh amendment in 2015.

  3. Post-consumer use efficacies of preservatives in personal care and topical drug products: relationship to preservative category.

    Science.gov (United States)

    Ravita, Timothy D; Tanner, Ralph S; Ahearn, Donald G; Arms, Erin L; Crockett, Patrick W

    2009-01-01

    Ninety-six used personal care and topical OTC drug items collected from consumers in the USA were examined for the presence of microbial contaminants. Of the eye and face product type containing global preservative chemistries (i.e., acceptable for use in Japan without major restrictions), 55% yielded numbers of microorganisms in excess of 500 CFU/g (P preservative chemistries, 79% yielded numbers of microorganisms in excess of 500 CFU/g (P preservative chemistries accounted for 88% (n = 14) of the products that had microbial contents above 10(4) CFU/g (P preserved with global preservative chemistries did not maintain as adequate preservation as products with non-global preservatives.

  4. A Holistic Approach to Bit Preservation

    DEFF Research Database (Denmark)

    Zierau, Eld Maj-Britt Olmütz

    2011-01-01

    This thesis presents three main results for a holistic approach to bit preservation, where the ultimate goal is to find the optimal bit preservation strategy for specific digital material that must be digitally preserved. Digital material consists of sequences of bits, where a bit is a binary digit...... which can have the value 0 or 1. Bit preservation must ensure that the bits remain intact and readable in the future, but bit preservation is not concerned with how bits can be interpreted as e.g. an image. A holistic approach to bit preservation includes aspects that influence the final choice of a bit...... a holistic approach and include aspects of digital representation, confidentiality, availability, bit safety and costs when defining requirements for the bit preservation. Analysis of such requirements and choice of the final bit preservation solution can be supported by the three main results presented...

  5. Local quantum channels preserving classical correlations

    International Nuclear Information System (INIS)

    Guo Zhihua; Cao Huaixin

    2013-01-01

    The aim of this paper is to discuss local quantum channels that preserve classical correlations. First, we give two equivalent characterizations of classical correlated states. Then we obtain the relationships among classical correlation-preserving local quantum channels, commutativity-preserving local quantum channels and commutativity-preserving quantum channels on each subsystem. Furthermore, for a two-qubit system, we show the general form of classical correlation-preserving local quantum channels. (paper)

  6. Social networks and human development / Redes sociales y desarrollo humano

    Directory of Open Access Journals (Sweden)

    Sara Gallego Trijueque

    2011-10-01

    Full Text Available The aim of this work is a brief introduction to the concept of social networks and their importance in society. Social networks have been responsible over the centuries to preserve community values, in addition to being facilitators of social interaction in human development processes, through communication and relationships between individuals.

  7. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs

    Science.gov (United States)

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-01-01

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme. PMID:28338620

  8. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.

    Science.gov (United States)

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-03-24

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme.

  9. A network dynamics approach to chemical reaction networks

    Science.gov (United States)

    van der Schaft, A. J.; Rao, S.; Jayawardhana, B.

    2016-04-01

    A treatment of a chemical reaction network theory is given from the perspective of nonlinear network dynamics, in particular of consensus dynamics. By starting from the complex-balanced assumption, the reaction dynamics governed by mass action kinetics can be rewritten into a form which allows for a very simple derivation of a number of key results in the chemical reaction network theory, and which directly relates to the thermodynamics and port-Hamiltonian formulation of the system. Central in this formulation is the definition of a balanced Laplacian matrix on the graph of chemical complexes together with a resulting fundamental inequality. This immediately leads to the characterisation of the set of equilibria and their stability. Furthermore, the assumption of complex balancedness is revisited from the point of view of Kirchhoff's matrix tree theorem. Both the form of the dynamics and the deduced behaviour are very similar to consensus dynamics, and provide additional perspectives to the latter. Finally, using the classical idea of extending the graph of chemical complexes by a 'zero' complex, a complete steady-state stability analysis of mass action kinetics reaction networks with constant inflows and mass action kinetics outflows is given, and a unified framework is provided for structure-preserving model reduction of this important class of open reaction networks.

  10. Evolution of natural agents: preservation, advance, and emergence of functional information.

    Science.gov (United States)

    Sharov, Alexei A

    2016-04-01

    Biological evolution is often viewed narrowly as a change of morphology or allele frequency in a sequence of generations. Here I pursue an alternative informational concept of evolution, as preservation, advance, and emergence of functional information in natural agents. Functional information is a network of signs (e.g., memory, transient messengers, and external signs) that are used by agents to preserve and regulate their functions. Functional information is preserved in evolution via complex interplay of copying and construction processes: the digital components are copied, whereas interpreting subagents together with scaffolds, tools, and resources, are constructed. Some of these processes are simple and invariant, whereas others are complex and contextual. Advance of functional information includes improvement and modification of already existing functions. Although the genome information may change passively and randomly, the interpretation is active and guided by the logic of agent behavior and embryonic development. Emergence of new functions is based on the reinterpretation of already existing information, when old tools, resources, and control algorithms are adopted for novel functions. Evolution of functional information progressed from protosemiosis, where signs correspond directly to actions, to eusemiosis, where agents associate signs with objects. Language is the most advanced form of eusemiosis, where the knowledge of objects and models is communicated between agents.

  11. Training for Preservation Management

    Directory of Open Access Journals (Sweden)

    Mirjam M. Foot

    1999-05-01

    Full Text Available In August 1997 the first of a series of summer schools in Preservation Management was held at the Archivschule in Marburg (Germany. The school was organised by the ECPA, the LIBER Division on Preservation, ICA and the Archivschule itself and was aimed at archivists and librarians in management positions from European institutions. It dealt with managerial, organisational and financial aspects of preservation and required active participation by those attending. Apart from introductory sessions by the teaching staff at the Archivschule, a large part of the course took the form of working groups, discussions, assignments and role play, to which participants were expected to take their own experience and problems. The school was conducted in German. Topics, spread over five days, ranged from preservation in the context of the core activities of libraries and archives; planning of preservation projects; general management issues, such as resource management, budgeting, priority setting, communication and effecting change; to more detailed considerations of day-to-day issues, such as storage, disaster control, microfilming and digitising, mass conservation processes, and moulds and fungi.

  12. Joint location, inventory, and preservation decisions for non-instantaneous deterioration items under delay in payments

    Science.gov (United States)

    Tsao, Yu-Chung

    2016-02-01

    This study models a joint location, inventory and preservation decision-making problem for non-instantaneous deteriorating items under delay in payments. An outside supplier provides a credit period to the wholesaler which has a distribution system with distribution centres (DCs). The non-instantaneous deteriorating means no deterioration occurs in the earlier stage, which is very useful for items such as fresh food and fruits. This paper also considers that the deteriorating rate will decrease and the reservation cost will increase as the preservation effort increases. Therefore, how much preservation effort should be made is a crucial decision. The objective of this paper is to determine the optimal locations and number of DCs, the optimal replenishment cycle time at DCs, and the optimal preservation effort simultaneously such that the total network profit is maximised. The problem is formulated as piecewise nonlinear functions and has three different cases. Algorithms based on piecewise nonlinear optimisation are provided to solve the joint location and inventory problem for all cases. Computational analysis illustrates the solution procedures and the impacts of the related parameters on decisions and profits. The results of this study can serve as references for business managers or administrators.

  13. 36 CFR 910.32 - Historic preservation.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Historic preservation. 910.32... DEVELOPMENT AREA Standards Uniformly Applicable to the Development Area § 910.32 Historic preservation... Preservation Plan of the Corporation, are specified for preservation, shall be acomplished (a) in accordance...

  14. Emittance preservation

    Energy Technology Data Exchange (ETDEWEB)

    Kain, V; Arduini, G; Goddard, B; Holzer, B J; Jowett, J M; Meddahi, M; Mertens, T; Roncarolo, F; Schaumann, M; Versteegen, R; Wenninger, J [European Organization for Nuclear Research, Geneva (Switzerland)

    2012-07-01

    Emittance measurements during the LHC proton run 2011 indicated a blow-up of 20 % to 30 % from LHC injection to collisions. This presentation will show the emittance preservation throughout the different parts of the LHC cycle and discuss the current limitations on emittance determination. An overview of emittance preservation through the injector complex as function of bunch intensity will also be given. Possible sources for the observed blow-up and required tests in 2012 will be presented. Possible improvements of emittance diagnostics and analysis tools for 2012 will be shown.

  15. Ranking species in mutualistic networks

    Science.gov (United States)

    Domínguez-García, Virginia; Muñoz, Miguel A.

    2015-02-01

    Understanding the architectural subtleties of ecological networks, believed to confer them enhanced stability and robustness, is a subject of outmost relevance. Mutualistic interactions have been profusely studied and their corresponding bipartite networks, such as plant-pollinator networks, have been reported to exhibit a characteristic ``nested'' structure. Assessing the importance of any given species in mutualistic networks is a key task when evaluating extinction risks and possible cascade effects. Inspired in a recently introduced algorithm -similar in spirit to Google's PageRank but with a built-in non-linearity- here we propose a method which -by exploiting their nested architecture- allows us to derive a sound ranking of species importance in mutualistic networks. This method clearly outperforms other existing ranking schemes and can become very useful for ecosystem management and biodiversity preservation, where decisions on what aspects of ecosystems to explicitly protect need to be made.

  16. Secure and privacy-preserving data communication in Internet of Things

    CERN Document Server

    Zhu, Liehuang; Xu, Chang

    2017-01-01

    This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader’s horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.

  17. Static analysis of topology-dependent broadcast networks

    DEFF Research Database (Denmark)

    Nanz, Sebastian; Nielson, Flemming; Nielson, Hanne Riis

    2010-01-01

    changing network topology is a crucial ingredient. In this paper, we develop a static analysis that automatically constructs an abstract transition system, labelled by actions and connectivity information, to yield a mobility-preserving finite abstraction of the behaviour of a network expressed......Broadcast semantics poses significant challenges over point-to-point communication when it comes to formal modelling and analysis. Current approaches to analysing broadcast networks have focused on fixed connectivities, but this is unsuitable in the case of wireless networks where the dynamically...... in a process calculus with asynchronous local broadcast. Furthermore, we use model checking based on a 3-valued temporal logic to distinguish network behaviour which differs under changing connectivity patterns. (C) 2009 Elsevier Inc. All rights reserved....

  18. Preservative treatments for building components

    Science.gov (United States)

    Stan Lebow

    2007-01-01

    The wood species most commonly used in construction have little natural durability Thus, they are treated with preservatives when used in conditions that favor biodeterioration. The type of preservative used varies with the type of wood product, exposure condition, and specific agent of deterioration. This paper discusses the characteristics of several preservative...

  19. A triple network connectivity study of large-scale brain systems in cognitively normal APOE4 carriers

    Directory of Open Access Journals (Sweden)

    Xia Wu

    2016-09-01

    Full Text Available The triple network model, consisting of the central executive network, salience network and default mode network, has been recently employed to understand dysfunction in core networks across various disorders. Here we used the triple network model to investigate the large-scale brain networks in cognitively normal APOE4 carriers who are at risk of Alzheimer’s disease (AD. To explore the functional connectivity for each of the three networks and the effective connectivity among them, we evaluated 17 cognitively normal individuals with a family history of AD and at least one copy of the apolipoprotein e4 (APOE4 allele and compared the findings to those of 12 individuals who did not carry the APOE4 gene or have a family history of AD, using independent component analysis and Bayesian network approach. Our findings indicated altered within-network connectivity that suggests future cognitive decline risk, and preserved between-network connectivity that may support their current preserved cognition in the cognitively normal APOE4 allele carries. The study provides novel sights into our understanding of the risk factors for AD and their influence on the triple network model of major psychopathology.

  20. Preservation of Built Environments

    DEFF Research Database (Denmark)

    Pilegaard, Marie Kirstine

    When built environments and recently also cultural environments are to be preserved, the historic and architectural values are identified as the key motivations. In Denmark the SAVE system is used as a tool to identify architectural values, but in recent years it has been criticized for having...... architectural value in preservation work as a matter of maintaining the buildings -as keeping them "alive" and allowing this to continue in the future. The predominantly aesthetic preservation approach will stop the buildings' life process, which is the same as - "letting them die". Finnebyen in Aarhus...... is an example of a residential area, where the planning authority currently has presented a preservational district plan, following guidelines from the SAVE method. The purpose is to protect the area's architectural values in the future. The predominantly aesthetic approach is here used coupled to the concept...

  1. Effective seeding strategy in evolutionary prisoner's dilemma games on online social networks

    Science.gov (United States)

    Xu, Bo; Shi, Huibin; Wang, Jianwei; Huang, Yun

    2015-04-01

    This paper explores effective seeding strategies in prisoner's dilemma game (PDG) on online social networks, i.e. the optimal strategy to obtain global cooperation with minimum cost. Three distinct seeding strategies are compared by performing computer simulations on real online social network datasets. Our finding suggests that degree centrality seeding outperforms other strategies regardless of the initial payoff setting or network size. Celebrities of online social networks play key roles in preserving cooperation.

  2. Preservative-free versus preserved latanoprost eye drops in patients with open-angle glaucoma or ocular hypertension.

    Science.gov (United States)

    Aptel, Florent; Choudhry, Reena; Stalmans, Ingeborg

    2016-08-01

    This study compared the efficacy, safety, and pharmacokinetics of a preservative-free latanoprost formulation to an established, benzalkonium chloride (BAK) containing formulation for the treatment of open-angle glaucoma or ocular hypertension. This was a phase II, randomized, cross-over, investigator-masked, multi-center, pilot study (NCT01494753). A total of 30 untreated adult patients (aged ≥18 years) with primary open angle glaucoma, pseudo-exfoliative glaucoma, pigmentary glaucoma, or ocular hypertension received either preservative-free or preserved latanoprost once daily in both eyes for 6 weeks, before crossing over to receive the other treatment. Efficacy (intraocular pressure [IOP] at 8 am, midday, 4 pm and 8 pm, and global efficacy assessment by investigator), safety (adverse events, ocular symptoms and global tolerance, slit lamp examination, funduscopy, visual field examination, visual acuity, and heart rate), and pharmacokinetics were assessed at Days 0, 42, and 84. Both treatments resulted in a reduction in IOP that was similar for the preservative-free and the preserved formulation at all time points. Similarly, the overall diurnal reduction was similar in both groups (6.3 mmHg [27.9% reduction] and 6.4 mmHg [28.1% reduction] for preserved and preservative-free latanoprost, respectively). There were no differences in global efficacy assessment or in the safety and tolerance of each treatment. Systemic concentrations of latanoprost were very low; AUC0-30 and Cmax were lower and tmax was longer for preservative-free latanoprost. Preservative-free latanoprost showed similar efficacy at all time points compared to BAK preservative containing formulation, with no difference in tolerance, allowing progression to phase III clinical development.

  3. Comparative in vitro toxicology study of travoprost polyquad-preserved, travoprost BAK-preserved, and latanoprost BAK-preserved ophthalmic solutions on human conjunctival epithelial cells.

    Science.gov (United States)

    Brignole-Baudouin, Françoise; Riancho, Luisa; Liang, Hong; Baudouin, Christophe

    2011-11-01

    To compare the toxicological profile of a new formulation of travoprost 0.004% ophthalmic solution (travoprost PQ), containing the preservative polyquaternium-1(PQ, polyquad), with the commercially available formulation of benzalkonium chloride (BAK)-preserved travoprost 0.004% ophthalmic solution (travoprost BAK) and BAK-preserved latanoprost 0.005% ophthalmic solution (latanoprost BAK). Human conjunctival epithelial cells were incubated with phosphate-buffered saline (PBS), BAK 0.015%, BAK 0.020%, PQ 0.001%, travoprost PQ preserved with PQ 0.001%, travoprost preserved with BAK 0.015%, or latanoprost preserved with BAK 0.020%. Six toxicological assays were used to assess: cell viability (neutral red, Alamar blue), apoptosis (YO-PRO-1, Hoechst 33342), and oxidative stress (H(2)DCF-DA, hydroethidine). Apoptosis and oxidative stress were each reported according to cell viability as observed with neutral red and Alamar blue for a total of 10 analyses per treatment depending on the cell viability test used to interpret apoptosis and oxidative stress responses. There were no significant differences in toxicity between cells exposed to PBS and cells exposed to travoprost PQ (10/10 analyses) or PQ 0.001% (9/10 analyses). Ten out of 10 analyses revealed that travoprost PQ produced significantly less cytotoxicity than latanoprost BAK (p solution in 9 of 10 analyses (p < 0.0001). A panel of in vitro toxicity analyses supports the safety of travoprost PQ. Travoprost PQ may be better for ocular surface health than BAK-preserved formulations of latanoprost or travoprost but clinical studies are required to validate these comparisons.

  4. Microbial control and food Preservation: Theory and practice:Principles of food preservation

    Science.gov (United States)

    Food preservation is an action or method used to maintain foods at certain desirable properties or quality to obtain maximum benefit. A good method of food preservation is one that slows down or prevents altogether the action of the agents of spoilage without damaging the food. To achieve this, cert...

  5. DECENTRALIZED SOCIAL NETWORK SERVICE USING THE WEB HOSTING SERVER FOR PRIVACY PRESERVATION

    Directory of Open Access Journals (Sweden)

    Yoonho Nam

    2013-10-01

    Full Text Available In recent years, the number of subscribers of the social network services such as Facebook and Twitter has increased rapidly. In accordance with the increasing popularity of social network services, concerns about user privacy are also growing. Existing social network services have a centralized structure that a service provider collects all the user’s profile and logs until the end of the connection. The information collected typically useful for commercial purposes, but may lead to a serious user privacy violation. The user’s profile can be compromised for malicious purposes, and even may be a tool of surveillance extremely. In this paper, we remove a centralized structure to prevent the service provider from collecting all users’ information indiscriminately, and present a decentralized structure using the web hosting server. The service provider provides only the service applications to web hosting companies, and the user should select a web hosting company that he trusts. Thus, the user’s information is distributed, and the user’s privacy is guaranteed from the service provider.

  6. Conceptual Paper: Digital Preservation Strategies in Archival Institution

    OpenAIRE

    Ismail Adila; Bullah Affandy Habee

    2018-01-01

    In this paper, the overall overview of concept of preservation regardless if it is preservation of physical records/archives or digital records/archives is discussed. The concept of the preservation discussed includes preventive preservation, restorative preservation, and content preservation. Then the concept of digital preservation. Furthermore, this paper highlighted the strategies and methods used in implementing the preservation of digital records/archives. The issues those are involved ...

  7. Mass preserving image registration

    DEFF Research Database (Denmark)

    Gorbunova, Vladlena; Sporring, Jon; Lo, Pechin Chien Pau

    2010-01-01

    The paper presents results the mass preserving image registration method in the Evaluation of Methods for Pulmonary Image Registration 2010 (EMPIRE10) Challenge. The mass preserving image registration algorithm was applied to the 20 image pairs. Registration was evaluated using four different...

  8. Emerging concepts in liver graft preservation

    Science.gov (United States)

    Bejaoui, Mohamed; Pantazi, Eirini; Folch-Puy, Emma; Baptista, Pedro M; García-Gil, Agustín; Adam, René; Roselló-Catafau, Joan

    2015-01-01

    The urgent need to expand the donor pool in order to attend to the growing demand for liver transplantation has obliged physicians to consider the use of suboptimal liver grafts and also to redefine the preservation strategies. This review examines the different methods of liver graft preservation, focusing on the latest advances in both static cold storage and machine perfusion (MP). The new strategies for static cold storage are mainly designed to increase the fatty liver graft preservation via the supplementation of commercial organ preservation solutions with additives. In this paper we stress the importance of carrying out effective graft washout after static cold preservation, and present a detailed discussion of the future perspectives for dynamic graft preservation using MP at different temperatures (hypothermia at 4 °C, normothermia at 37 °C and subnormothermia at 20 °C-25 °C). Finally, we highlight some emerging applications of regenerative medicine in liver graft preservation. In conclusion, this review discusses the “state of the art” and future perspectives in static and dynamic liver graft preservation in order to improve graft viability. PMID:25593455

  9. A New Heuristic Anonymization Technique for Privacy Preserved Datasets Publication on Cloud Computing

    Science.gov (United States)

    Aldeen Yousra, S.; Mazleena, Salleh

    2018-05-01

    Recent advancement in Information and Communication Technologies (ICT) demanded much of cloud services to sharing users’ private data. Data from various organizations are the vital information source for analysis and research. Generally, this sensitive or private data information involves medical, census, voter registration, social network, and customer services. Primary concern of cloud service providers in data publishing is to hide the sensitive information of individuals. One of the cloud services that fulfill the confidentiality concerns is Privacy Preserving Data Mining (PPDM). The PPDM service in Cloud Computing (CC) enables data publishing with minimized distortion and absolute privacy. In this method, datasets are anonymized via generalization to accomplish the privacy requirements. However, the well-known privacy preserving data mining technique called K-anonymity suffers from several limitations. To surmount those shortcomings, I propose a new heuristic anonymization framework for preserving the privacy of sensitive datasets when publishing on cloud. The advantages of K-anonymity, L-diversity and (α, k)-anonymity methods for efficient information utilization and privacy protection are emphasized. Experimental results revealed the superiority and outperformance of the developed technique than K-anonymity, L-diversity, and (α, k)-anonymity measure.

  10. Experimental implementation of a real-time token-based network protocol on a microcontroller

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Krikke, Robert; Baron, Bert; Jansen, P.G.; Scholten, Johan

    The real-time token-based RTnet network protocol has been implemented on a standard Ethernet network to investigate the possibility to use cheap components with strict resource limitations while preserving Quality of Service guarantees. It will be shown that the proposed implementation is feasible

  11. Experimental implementation of a real-time token-based network protocol on a microcontroller

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Krikke, Robert; Baron, Bert; Jansen, P.G.; Scholten, Johan

    2004-01-01

    The real-time token-based RTnet network protocol has been implemented on a standard Ethernet network to investigate the possibility to use cheap components with strict resource limitations while preserving Quality of Service guarantees. It will be shown that the proposed implementation is feasible

  12. A Privacy Preservation Model for Health-Related Social Networking Sites

    OpenAIRE

    Li, Jingquan

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many use...

  13. Hereditary History Preserving Bisimilarity Is Undecidable

    DEFF Research Database (Denmark)

    Jurdzinski, Marcin; Nielsen, Mogens

    2000-01-01

    History preserving bisimilarity (hp-bisimilarity) and hereditary history preserving bisimilarity (hhp-bisimilarity) are behavioural equivalences taking into account causal relationships between events of concurrent systems. Their prominent feature is being preserved under action refinement...

  14. Preservation Copying Endangered Historic Negative Collections

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad

    2008-01-01

    This article discusses preservation copying of unstable B&W nitrate and acetate still photographic negatives. It focuses on evaluating two different strategies for preserving the copies from a point of view of quality and cost-effectiveness. The evaluated strategies are preservation of the master...... by describing essential characteristics of negatives, which must be passed on to the copies, and the required metadata and technical imaging specifications. Next the paper discusses strategies for preservation and makes an analysis with the LIFE2 Costing Model. The paper concludes that the most beneficial...... and cost-effective preservation solution for large format negatives is to keep the preservation copies as digital files. However, it also acknowledges that it is important to revisit such strategies regularly to monitor changes in user expectations, technologies and costs....

  15. Food preservation by irradiation

    International Nuclear Information System (INIS)

    Labots, H.; Huis in 't Veld, G.J.P.; Verrips, C.T.

    1985-01-01

    After a review of several methods for the preservation of food and the routes of food infections, the following chapters are devoted to the preservation by irradiation. Applications and legal aspects of food irradiation are described. Special reference is made to the international situation. (Auth.)

  16. Preserving Employee Privacy in Wellness.

    Science.gov (United States)

    Terry, Paul E

    2017-07-01

    The proposed "Preserving Employee Wellness Programs Act" states that the collection of information about the manifested disease or disorder of a family member shall not be considered an unlawful acquisition of genetic information. The bill recognizes employee privacy protections that are already in place and includes specific language relating to nondiscrimination based on illness. Why did legislation expressly intending to "preserve wellness programs" generate such antipathy about wellness among journalists? This article argues that those who are committed to preserving employee wellness must be equally committed to preserving employee privacy. Related to this, we should better parse between discussions and rules about commonplace health screenings versus much less common genetic testing.

  17. Data Preservation, Information Preservation, and Lifecyle of Information Management at NASA GES DISC

    Science.gov (United States)

    Khayat, Mo; Kempler, Steve; Deshong, Barbara; Johnson, James; Gerasimov, Irina; Esfandiari, Ed; Berganski, Michael; Wei, Jennifer

    2014-01-01

    Data lifecycle management awareness is common today; planners are more likely to consider lifecycle issues at mission start. NASA remote sensing missions are typically subject to life cycle management plans of the Distributed Active Archive Center (DAAC), and NASA invests in these national centers for the long-term safeguarding and benefit of future generations. As stewards of older missions, it is incumbent upon us to ensure that a comprehensive enough set of information is being preserved to prevent the risk for information loss. This risk is greater when the original data experts have moved on or are no longer available. Preservation of items like documentation related to processing algorithms, pre-flight calibration data, or input-output configuration parameters used in product generation, are examples of digital artifacts that are sometimes not fully preserved. This is the grey area of information preservation; the importance of these items is not always clear and requires careful consideration. Missing important metadata about intermediate steps used to derive a product could lead to serious challenges in the reproducibility of results or conclusions. Organizations are rapidly recognizing that the focus of life-cycle preservation needs to be enlarged from the strict raw data to the more encompassing arena of information lifecycle management. By understanding what constitutes information, and the complexities involved, we are better equipped to deliver longer lasting value about the original data and derived knowledge (information) from them. The NASA Earth Science Data Preservation Content Specification is an attempt to define the content necessary for long-term preservation. It requires new lifecycle infrastructure approach along with content repositories to accommodate artifacts other than just raw data. The NASA Goddard Earth Sciences Data and Information Services Center (GES DISC) setup an open-source Preservation System capable of long-term archive of

  18. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Provider Pocket Guides Provider Guides Fertility Preservation for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed ... Patient Pocket Guides Patient Guides Fertility Preservation for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed ...

  19. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed with Cancer Fertility Preservation for Children Diagnosed ... for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed with Cancer Fertility Preservation for Children Diagnosed ...

  20. Contact dermatitis caused by preservatives.

    Science.gov (United States)

    Yim, Elizabeth; Baquerizo Nole, Katherine L; Tosti, Antonella

    2014-01-01

    Preservatives are biocidal chemicals added to food, cosmetics, and industrial products to prevent the growth of microorganisms. They are usually nontoxic and inexpensive and have a long shelf life. Unfortunately, they commonly cause contact dermatitis. This article reviews the most important classes of preservatives physicians are most likely to encounter in their daily practice, specifically isothiazolinones, formaldehyde and formaldehyde-releasers, iodopropynyl butylcarbamate, methyldibromoglutaronitrile, and parabens. For each preservative mentioned, the prevalence of sensitization, clinical presentation of contact dermatitis, patch testing concentrations, cross reactions, and related legislation will be discussed. Mandatory labeling of preservatives is required in some countries, but not required in others. Until policies are made, physicians and patients must be proactive in identifying potential sensitizers and removing their use. We hope that this article will serve as a guide for policy makers in creating legislation and future regulations on the use and concentration of certain preservatives in cosmetics and industrial products.

  1. Machine perfusion preservation of the pig liver using a new preservation solution, polysol

    NARCIS (Netherlands)

    Bessems, M.; Doorschodt, B. M.; Dinant, S.; de Graaf, W.; van Gulik, T. M.

    2006-01-01

    INTRODUCTION: The current gold standard for donor liver preservation is cold storage in a preservation solution (4 degrees C), such as Celsior or the University of Wisconsin solution (UW). Recent studies have suggested the benefits of machine perfusion (MP) over cold storage. To improve the results

  2. Towards Building a Blog Preservation Platform

    CERN Document Server

    Kasioumis, Nikos; Kalb, Hendrik

    2014-01-01

    Social media content and user participation has increased dramatically since the advent of Web 2.0. Blogs have become relevant to every aspect of business and personal life. Nevertheless, we do not have the right tools to aggregate and preserve blog content correctly, as well as to manage blog archives effectively. Given the rising importance of blogs, it is crucial to build systems to facilitate blog preservation, safeguarding an essential part of our heritage that will prove valuable for current and future generations. In this paper, we present our work in progress towards building a novel blog preservation platform featuring robust digital preservation, management and dissemination facilities for blogs. This work is part of the BlogForever project which is aiming to make an impact to the theory and practice of blog preservation by creating guidelines and software that any individual or organization could use to preserve their blogs.

  3. ACHP | Summary of the Preserve America Initiative

    Science.gov (United States)

    Initiative Preserve America: Explore and Enjoy Our Heritage (logo) Summary of the Preserve America Initiative Preserve America is a White House initiative that encourages and supports community efforts to preserve and enjoy our priceless cultural and natural heritage. The goals of the initiative include a greater shared

  4. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  5. OAIS and Distributed Digital Preservation in Practice

    DEFF Research Database (Denmark)

    Zierau, Eld

    The aim of the paper is to illustrate how the distributed aspects of digital preservation can be aligned in practice, with the concepts and principles of the Open Archival Information System (OAIS) Reference Model. There has been a growing awareness within the digital preservation community...... of the need for cooperation between organizations to address digital preservation requirements. One common example is that replicas of preservation copies of digital objects need to be independently preserved (e.g., stored, managed, monitored, documented) to ensure that at least one correct replica...... will survive for as long as needed. Such independence can be achieved through distributed digital preservation that relies upon specific agreements between participating and contributing organizations. The OAIS Reference Model does not address the challenges of distributed digital preservation in detail...

  6. Disclosure of Personal Data in Ubiquitous Social Networking

    DEFF Research Database (Denmark)

    Sapuppo, Antonio

    users' privacy. Firstly, it updates the current privacy guidelines of ubiquitous computing by proposing four drawbacks to be avoided when designing for privacy in ubiquitous social networking environments. Secondly, this dissertation identifies and investigates the determinants that might influence......Ubiquitous social networking focuses on developing possible advantageous relationships such as friendships, partnerships and business relations in the physical world, by uncovering hidden connections that people share with others nearby. The foundation of these services is based on disclosure...... of personal information, which can provoke numerous accidental invasions of privacy. This dissertation contributes by addressing two problems, related to support of privacy-aware social networking in ubiquitous computing environments that focus on maximizing potential networking benefits while preserving...

  7. Cosmetic preservative labelling on the Thai market.

    Science.gov (United States)

    Bunyavaree, Monthathip; Kasemsarn, Pranee; Boonchai, Waranya

    2016-04-01

    Preservatives are added to cosmetics and other consumer products to prevent microbial growth and product degradation. Many cosmetic preservatives are skin sensitizers and frequent causes of contact dermatitis. The use of preservatives may vary by country and/or region, according to legislation, and may be reflected in differences in the prevalence rates of preservative allergy worldwide. To examine the type and frequency of preservative use in cosmetics sold in Thai markets in metropolitan Bangkok, Thailand. Preservatives contained in 1000 different cosmetics sold in Thai markets were documented and analysed, based on the labelling of ingredients. Most of the cosmetic and skincare products sold in Thai markets were international brands, with only a small proportion of cosmetic products being produced in Thailand. International brand cosmetics were more likely to contain non-formaldehyde-releasing preservatives than domestically produced brands. Isothiazolinone-based preservatives, which are responsible for the current increase in the prevalence of contact allergy, were found at a significant frequency in domestically produced, leave-on cosmetic products. Preservatives in cosmetics were significantly different according to source of production and type of cosmetics. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  8. Epidemics on adaptive networks with geometric constraints

    Science.gov (United States)

    Shaw, Leah; Schwartz, Ira

    2008-03-01

    When a population is faced with an epidemic outbreak, individuals may modify their social behavior to avoid exposure to the disease. Recent work has considered models in which the contact network is rewired dynamically so that susceptibles avoid contact with infectives. We consider extensions in which the rewiring is subject to constraints that preserve key properties of the social network structure. Constraining to a fixed degree distribution destroys previously observed bistable behavior. The most effective rewiring strategy is found to depend on the spreading rate.

  9. A holistic approach to bit preservation

    DEFF Research Database (Denmark)

    Zierau, Eld

    2012-01-01

    Purpose: The purpose of this paper is to point out the importance of taking a holistic approach to bit preservation when setting out to find an optimal bit preservation solution for specific digital materials. In the last decade there has been an increasing awareness that bit preservation, which ...

  10. 32 CFR 174.18 - Historic preservation.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Historic preservation. 174.18 Section 174.18... Historic preservation. (a) The transfer, lease, or sale of National Register-eligible historic property to... the regulations implementing the National Historic Preservation Act (36 CFR 800.5(a)(2)(vii)). One way...

  11. Environmental education on wood preservatives and preservative ...

    African Journals Online (AJOL)

    The development and use of wood preservatives in Nigeria should address not only the cost and demand functions but also the potential hazards in environmental equations. Forest products specialists are often asked about the perceived risks and environmental costs of treated wood products. Evidently, the civil society is ...

  12. A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

    Directory of Open Access Journals (Sweden)

    Chalee Vorakulpipat

    2017-01-01

    Full Text Available Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.

  13. ACHP | Tribal Historic Preservation Officers

    Science.gov (United States)

    preservation of significant historic properties. Those functions include identifying and maintaining Working with Section 106 Federal, State, & Tribal Programs Training & Education Publications Search skip specific nav links Home arrow Historic Preservation Programs & Officers arrow THPOs

  14. Training development for pavement preservation.

    Science.gov (United States)

    2013-05-01

    This research project strives to help the Iowa Department of Transportation (DOT) fully achieve the full benefits of pavement : preservation through training on proper selection, design, and application of pavement preservation treatments. In some ca...

  15. Implementing digital preservation in repositories: Knowledge and practices

    Directory of Open Access Journals (Sweden)

    Caterina Groposo Pavão

    2016-09-01

    Full Text Available Digital preservation has to be undertaken by institutional repositories, which are responsible for the preservation of the scientific output from academic institutions. However, due to the constant evolution of the field, to gain domain knowledge and recognise best practices is a complex task for people responsible for digital preservation in those institutions. Digital preservation research, practices and solutions address specific problems, such as formats, curation, reference models, authenticity, policies and preservation plans, tools, etc., while stakeholders need an integrated, contextualized and applicable overview. This paper focuses on the implementation of digital preservation in repositories, from the perspective of the team responsible for the project, regarding the necessary knowledge and best practices. Initially, it defines and contextualizes digital preservation repositories. The following section presents a conceptual model of digital preservation, synthesized from conceptual models developed in influential projects in the field, which allows us to identify the domain knowledge in digital preservation. Finally, aspects represented in the model are discussed in the light of the performance of teams implementing digital preservation repositories. It provides recommendations, guides and examples that may be useful for the implementation of digital preservation. It points to the need to strengthen the relationship between domain knowledge in digital preservation repositories with practices developed in numerous projects developed worldwide.

  16. Modelling the Costs of Preserving Digital Assets

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2012-01-01

    Information is increasingly being produced in digital form, and some of it must be preserved for the longterm. Digital preservation includes a series of actively managed activities that require on-going funding. To obtain sufficient resources, there is a need for assessing the costs...... and the benefits accrued by preserving the assets. Cost data is also needed for optimizing activities and comparing the costs of different preservation alternatives. The purpose of this study is to analyse generic requirements for modelling the cost of preserving digital assets. The analysis was based...

  17. Structural constraints in complex networks

    International Nuclear Information System (INIS)

    Zhou, S; Mondragon, R J

    2007-01-01

    We present a link rewiring mechanism to produce surrogates of a network where both the degree distribution and the rich-club connectivity are preserved. We consider three real networks, the autonomous system (AS)-Internet, protein interaction and scientific collaboration. We show that for a given degree distribution, the rich-club connectivity is sensitive to the degree-degree correlation, and on the other hand the degree-degree correlation is constrained by the rich-club connectivity. In particular, in the case of the Internet, the assortative coefficient is always negative and a minor change in its value can reverse the network's rich-club structure completely; while fixing the degree distribution and the rich-club connectivity restricts the assortative coefficient to such a narrow range, that a reasonable model of the Internet can be produced by considering mainly the degree distribution and the rich-club connectivity. We also comment on the suitability of using the maximal random network as a null model to assess the rich-club connectivity in real networks

  18. Friend suggestion in social network based on user log

    Science.gov (United States)

    Kaviya, R.; Vanitha, M.; Sumaiya Thaseen, I.; Mangaiyarkarasi, R.

    2017-11-01

    Simple friend recommendation algorithms such as similarity, popularity and social aspects is the basic requirement to be explored to methodically form high-performance social friend recommendation. Suggestion of friends is followed. No tags of character were followed. In the proposed system, we use an algorithm for network correlation-based social friend recommendation (NC-based SFR).It includes user activities like where one lives and works. A new friend recommendation method, based on network correlation, by considering the effect of different social roles. To model the correlation between different networks, we develop a method that aligns these networks through important feature selection. We consider by preserving the network structure for a more better recommendations so that it significantly improves the accuracy for better friend-recommendation.

  19. ENEN - European Nuclear Educational Network Association

    International Nuclear Information System (INIS)

    De Regge, P.

    2006-01-01

    After the pioneering initiative of BNEN, the Belgian Nuclear higher Education Network, other countries, e.g. Italy, United Kingdom, Germany, Switzerland, etc., created their own pool of education. At the European level the ENEN Association (European Nuclear Education Network) is a sustainable product generated by an FP5 project. The main objective of the ENEN Association is the preservation and the further development of higher nuclear education and expertise. This objective is realized through the co-operation between European universities, involved in education and research in the nuclear engineering field, nuclear research centres and nuclear industry

  20. The influence of branch order on optimal leaf vein geometries: Murray's law and area preserving branching.

    Directory of Open Access Journals (Sweden)

    Charles A Price

    Full Text Available Models that predict the form of hierarchical branching networks typically invoke optimization based on biomechanical similitude, the minimization of impedance to fluid flow, or construction costs. Unfortunately, due to the small size and high number of vein segments found in real biological networks, complete descriptions of networks needed to evaluate such models are rare. To help address this we report results from the analysis of the branching geometry of 349 leaf vein networks comprising over 1.5 million individual vein segments. In addition to measuring the diameters of individual veins before and after vein bifurcations, we also assign vein orders using the Horton-Strahler ordering algorithm adopted from the study of river networks. Our results demonstrate that across all leaves, both radius tapering and the ratio of daughter to parent branch areas for leaf veins are in strong agreement with the expectation from Murray's law. However, as veins become larger, area ratios shift systematically toward values expected under area-preserving branching. Our work supports the idea that leaf vein networks differentiate roles of leaf support and hydraulic supply between hierarchical orders.

  1. Extending a configuration model to find communities in complex networks

    International Nuclear Information System (INIS)

    Jin, Di; Hu, Qinghua; He, Dongxiao; Yang, Bo; Baquero, Carlos

    2013-01-01

    Discovery of communities in complex networks is a fundamental data analysis task in various domains. Generative models are a promising class of techniques for identifying modular properties from networks, which has been actively discussed recently. However, most of them cannot preserve the degree sequence of networks, which will distort the community detection results. Rather than using a blockmodel as most current works do, here we generalize a configuration model, namely, a null model of modularity, to solve this problem. Towards decomposing and combining sub-graphs according to the soft community memberships, our model incorporates the ability to describe community structures, something the original model does not have. Also, it has the property, as with the original model, that it fixes the expected degree sequence to be the same as that of the observed network. We combine both the community property and degree sequence preserving into a single unified model, which gives better community results compared with other models. Thereafter, we learn the model using a technique of nonnegative matrix factorization and determine the number of communities by applying consensus clustering. We test this approach both on synthetic benchmarks and on real-world networks, and compare it with two similar methods. The experimental results demonstrate the superior performance of our method over competing methods in detecting both disjoint and overlapping communities. (paper)

  2. Urine Preservative

    Science.gov (United States)

    Smith, Scott M. (Inventor); Nillen, Jeannie (Inventor)

    2001-01-01

    Disclosed is CPG, a combination of a chlorhexidine salt (such as chlorhexidine digluconate, chlorhexidine diacetate, or chlorhexidine dichloride) and n-propyl gallate that can be used at ambient temperatures as a urine preservative.

  3. Preservation in New Buildings

    Directory of Open Access Journals (Sweden)

    Christopher Kitching

    2000-06-01

    Full Text Available In the United Kingdom (as in many other countries increasing attention is being paid to the importance of each library and archive having a written preservation strategy endorsed by its governing body. So increasingly we are asking: where does „preservation“ begin and what are its top priorities? Some would say preservation begins with the definition of collecting policies to ensure that only relevant items are acquired in the first place, and therefore that no unnecessary costs are incurred on the long-term care of unwanted and unconsulted items. Others might argue that the first priority must be the careful appraisal of existing holdings to determine their preservation and conservation requirements and to prioritise their treatment. Or should preservation begin with damage-limitation: restricting the physical handling of books and documents, on the one hand by providing whenever possible surrogate copies in digital formats or microform, and on the other hand by offering at least basic protection through appropriate boxing and packaging? This, surely, goes hand-in-hand with the education of staff and readers about the importance of treating rare or unique materials with proper respect.

  4. Anuran artifacts of preservation: 27 years later

    Directory of Open Access Journals (Sweden)

    Jessica L. Deichmann

    2009-07-01

    Full Text Available Measurements made on preserved anuran specimens are often used in studies of systematics, ecology and evolution. Here, we examine the effect of preservation on one of the most common measurement of frogs, snout-urostyle length (SUL. Preservation had significanteffects on the SUL of 13 of the 14 species of North American frogs included in this study, with all species decreasing in SUL by 0.31-5.62%. Smaller frog species did not shrink proportionally more or less than larger species. Absolute shrinkage was correlated with SUL and was greater in larger species. Within species, percent shrinkage was not significantly correlated with SUL in 10 species, but significantly greater for larger individuals in 3 species, and decreased with size in 1 species. Absolute shrinkage was statistically greater for larger individuals in 4 species. Our results agree with studies of morphological permutations in fish which show that most preservation-related changes take place within the first few months after initial preservation. We suggest that the potential consequences of using preserved specimens in research must be considered and that future studies continue to examine preservation effects, not only on frogs, but on all preserved specimens used in scientific investigations.

  5. Package Formats for Preserved Digital Material

    DEFF Research Database (Denmark)

    Zierau, Eld

    2012-01-01

    This paper presents an investigation of the best suitable package formats for long term digital preservation. The choice of a package format for preservation is crucial for future access, thus a thorough analysis of choice is important. The investigation presented here covers setting up requireme......This paper presents an investigation of the best suitable package formats for long term digital preservation. The choice of a package format for preservation is crucial for future access, thus a thorough analysis of choice is important. The investigation presented here covers setting up...... requirements for package formats used for long term preserved digital material, and using these requirements as the basis for analysing a range of package formats. The result of the concrete investigation is that the WARC format is the package format best suited for the listed requirements. Fulfilling...

  6. Contamination versus preservation of cosmetics

    DEFF Research Database (Denmark)

    Lundov, Michael Dyrgaard; Moesby, Lise; Zachariae, Claus

    2009-01-01

    Cosmetics with high water content are at a risk of being contaminated by micro-organisms that can alter the composition of the product or pose a health risk to the consumer. Pathogenic micro-organisms such as Staphylococcus aureus and Pseudomonas aeruginosa are frequently found in contaminated...... cosmetics. In order to avoid contamination of cosmetics, the manufacturers add preservatives to their products. In the EU and the USA, cosmetics are under legislation and all preservatives must be safety evaluated by committees. There are several different preservatives available but the cosmetic market...

  7. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Directory of Open Access Journals (Sweden)

    Javier Portela

    2016-11-01

    Full Text Available Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  8. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  9. Fertility preservation: a challenge for IVF-clinics.

    Science.gov (United States)

    Dahhan, Taghride; Mol, Femke; Kenter, Gemma G; Balkenende, Eva M E; de Melker, Annemieke A; van der Veen, Fulco; Dancet, Eline A F; Goddijn, Mariëtte

    2015-11-01

    Acute fertility preservation for women is an interdisciplinary treatment that requires adequate information provision and early referral. This quality management project aimed to improve fertility preservation care by using a practical tool: Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis. Quality management project was executed between May 2011 and July 2013. This project has been executed in a university affiliated IVF-clinic in cooperation with two oncological sites and used a four-step strategy: (1) monitoring baseline referral process, (2) exploring baseline fertility preservation program by Strengths, Weaknesses, Opportunities and Threats' (SWOT)-analysis, (3) setting up a new fertility preservation program and (4) evaluating the new fertility preservation program by means of SWOT-analysis. During the three-months monitoring period, fertility preservation was requested for a total of 126 women. The mean age of the women was 33.8 years old (range 1-42 years old). Most requests came from women who wanted to cryopreserve oocytes because of age-related decline of fertility (n=90; 71%). Most requests for acute fertility preservation concerned women with breast cancer (n=16; 57%). Information leaflets and pre-consultation questionnaires for women improved the quality of first fertility preservation consultation as evaluated by final SWOT-analysis. Collaboration with oncological centres and information about fertility preservation improved the referral process. SWOT-analysis proved useful for setting up a new fertility preservation-program and can be recommended as a tool to improve the management and organisation of new types of reproductive care. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  10. Endothelial cell preservation at hypothermic to normothermic conditions using clinical and experimental organ preservation solutions

    NARCIS (Netherlands)

    Post, Ivo C. J. H.; de Boon, Wadim M. I.; Heger, Michal; van Wijk, Albert C. W. A.; Kroon, Jeffrey; van Buul, Jaap D.; van Gulik, Thomas M.

    2013-01-01

    Endothelial barrier function is pivotal for the outcome of organ transplantation. Since hypothermic preservation (gold standard) is associated with cold-induced endothelial damage, endothelial barrier function may benefit from organ preservation at warmer temperatures. We therefore assessed

  11. Fertility preservation 2

    Science.gov (United States)

    De Vos, Michel; Smitz, Johan; Woodruff, Teresa K

    2014-01-01

    Enhanced long-term survival rates of young women with cancer and advances in reproductive medicine and cryobiology have culminated in an increased interest in fertility preservation methods in girls and young women with cancer. Present data suggest that young patients with cancer should be referred for fertility preservation counselling quickly to help with their coping process. Although the clinical application of novel developments, including oocyte vitrification and oocyte maturation in vitro, has resulted in reasonable success rates in assisted reproduction programmes, experience with these techniques in the setting of fertility preservation is in its infancy. It is hoped that these and other approaches, some of which are still regarded as experimental (eg, ovarian tissue cryopreservation, pharmacological protection against gonadotoxic agents, in-vitro follicle growth, and follicle transplantation) will be optimised and become established within the next decade. Unravelling the complex mechanisms of activation and suppression of follicle growth will not only expand the care of thousands of women diagnosed with cancer, but also inform the care of millions of women confronted with reduced reproductive fitness because of ageing. PMID:25283571

  12. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... options further? Fertility Preservation - Where Does It Fit? Options for Fertility Preservation The following diagram gives a brief description of fertility preservation options available to children diagnosed with cancer before and ...

  13. User-friendly matching protocol for online social networks

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in user can match her profile with that of an off-line stranger, while both profiles are maximally protected. Our solution

  14. Cancer and fertility preservation

    DEFF Research Database (Denmark)

    Lambertini, Matteo; Del Mastro, Lucia; Pescio, Maria C

    2016-01-01

    In the last years, thanks to the improvement in the prognosis of cancer patients, a growing attention has been given to the fertility issues. International guidelines on fertility preservation in cancer patients recommend that physicians discuss, as early as possible, with all patients...... of reproductive age their risk of infertility from the disease and/or treatment and their interest in having children after cancer, and help with informed fertility preservation decisions. As recommended by the American Society of Clinical Oncology and the European Society for Medical Oncology, sperm...... data have become available, and several issues in this field are still controversial and should be addressed by both patients and their treating physicians.In April 2015, physicians with expertise in the field of fertility preservation in cancer patients from several European countries were invited...

  15. Fertility Preservation for Children Diagnosed with Cancer

    Science.gov (United States)

    ... Skip to main content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers Open menu ... with Cancer You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for ...

  16. Advanced Digital Preservation

    CERN Document Server

    Giaretta, David

    2011-01-01

    There is growing recognition of the need to address the fragility of digital information, on which our society heavily depends for smooth operation in all aspects of daily life. This has been discussed in many books and articles on digital preservation, so why is there a need for yet one more? Because, for the most part, those other publications focus on documents, images and webpages -- objects that are normally rendered to be simply displayed by software to a human viewer. Yet there are clearly many more types of digital objects that may need to be preserved, such as databases, scientific da

  17. A new disposal strategy for the Western Scheldt, conciliating port accessibility and nature preservation

    OpenAIRE

    Plancke, Y.M.G.; Ides, S.J.; Vos, G.R.; Roose, F.; Peters, J.J.

    2010-01-01

    In 1999, Flanders and the Netherlands agreed to set up a common strategy for managing the Scheldt estuary. In 2002, both parties signed a memorandum of understanding in which was defined a “Long Term Vision” strategy and its objectives. One of these is the preservation in the Western Scheldt of a dynamic flood and ebb channel network, the so-called “multi-channel system”. The present trend, a continuation of past natural morphological evolutions combined with human interference (land reclamat...

  18. An Energy-Efficient and High-Quality Video Transmission Architecture in Wireless Video-Based Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yasaman Samei

    2008-08-01

    Full Text Available Technological progress in the fields of Micro Electro-Mechanical Systems (MEMS and wireless communications and also the availability of CMOS cameras, microphones and small-scale array sensors, which may ubiquitously capture multimedia content from the field, have fostered the development of low-cost limited resources Wireless Video-based Sensor Networks (WVSN. With regards to the constraints of videobased sensor nodes and wireless sensor networks, a supporting video stream is not easy to implement with the present sensor network protocols. In this paper, a thorough architecture is presented for video transmission over WVSN called Energy-efficient and high-Quality Video transmission Architecture (EQV-Architecture. This architecture influences three layers of communication protocol stack and considers wireless video sensor nodes constraints like limited process and energy resources while video quality is preserved in the receiver side. Application, transport, and network layers are the layers in which the compression protocol, transport protocol, and routing protocol are proposed respectively, also a dropping scheme is presented in network layer. Simulation results over various environments with dissimilar conditions revealed the effectiveness of the architecture in improving the lifetime of the network as well as preserving the video quality.

  19. An Energy-Efficient and High-Quality Video Transmission Architecture in Wireless Video-Based Sensor Networks.

    Science.gov (United States)

    Aghdasi, Hadi S; Abbaspour, Maghsoud; Moghadam, Mohsen Ebrahimi; Samei, Yasaman

    2008-08-04

    Technological progress in the fields of Micro Electro-Mechanical Systems (MEMS) and wireless communications and also the availability of CMOS cameras, microphones and small-scale array sensors, which may ubiquitously capture multimedia content from the field, have fostered the development of low-cost limited resources Wireless Video-based Sensor Networks (WVSN). With regards to the constraints of videobased sensor nodes and wireless sensor networks, a supporting video stream is not easy to implement with the present sensor network protocols. In this paper, a thorough architecture is presented for video transmission over WVSN called Energy-efficient and high-Quality Video transmission Architecture (EQV-Architecture). This architecture influences three layers of communication protocol stack and considers wireless video sensor nodes constraints like limited process and energy resources while video quality is preserved in the receiver side. Application, transport, and network layers are the layers in which the compression protocol, transport protocol, and routing protocol are proposed respectively, also a dropping scheme is presented in network layer. Simulation results over various environments with dissimilar conditions revealed the effectiveness of the architecture in improving the lifetime of the network as well as preserving the video quality.

  20. Indiana Pavement Preservation Program

    OpenAIRE

    Ong, Ghim Ping (Raymond); Nantung, Tommy E.; Sinha, Kumares C.

    2010-01-01

    State highway agencies are facing immense pressure to maintain roads at acceptable levels amidst the challenging financial and economic situations. In recent years, pavement preservation has been sought as a potential alternative for managing the pavement assets, believing that it would provide a cost-effective solution in maintaining infrastructural conditions and meeting user expectations. This study explores the potential of pavement preservation concepts in managing the agency‘s pavement ...

  1. A QoS-Guaranteed Coverage Precedence Routing Algorithm for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jiun-Chuan Lin

    2011-03-01

    Full Text Available For mission-critical applications of wireless sensor networks (WSNs involving extensive battlefield surveillance, medical healthcare, etc., it is crucial to have low-power, new protocols, methodologies and structures for transferring data and information in a network with full sensing coverage capability for an extended working period. The upmost mission is to ensure that the network is fully functional providing reliable transmission of the sensed data without the risk of data loss. WSNs have been applied to various types of mission-critical applications. Coverage preservation is one of the most essential functions to guarantee quality of service (QoS in WSNs. However, a tradeoff exists between sensing coverage and network lifetime due to the limited energy supplies of sensor nodes. In this study, we propose a routing protocol to accommodate both energy-balance and coverage-preservation for sensor nodes in WSNs. The energy consumption for radio transmissions and the residual energy over the network are taken into account when the proposed protocol determines an energy-efficient route for a packet. The simulation results demonstrate that the proposed protocol is able to increase the duration of the on-duty network and provide up to 98.3% and 85.7% of extra service time with 100% sensing coverage ratio comparing with LEACH and the LEACH-Coverage-U protocols, respectively.

  2. Preserving location and absence privacy in geo-social networks

    DEFF Research Database (Denmark)

    Freni, Dario; Vicente, Carmen Ruiz; Mascetti, Sergio

    2010-01-01

    accessible to multiple users. This renders it difficult for GeoSN users to control which information about them is available and to whom it is available. This paper addresses two privacy threats that occur in GeoSNs: location privacy and absence privacy. The former concerns the availability of information...... about the presence of users in specific locations at given times, while the latter concerns the availability of information about the absence of an individual from specific locations during given periods of time. The challenge addressed is that of supporting privacy while still enabling useful services....... The resulting geo-aware social networks (GeoSNs) pose privacy threats beyond those found in location-based services. Content published in a GeoSN is often associated with references to multiple users, without the publisher being aware of the privacy preferences of those users. Moreover, this content is often...

  3. Compensation for Distributed Solar. A Survey of Options to Preserve Stakeholder Value

    Energy Technology Data Exchange (ETDEWEB)

    Flores-Espino, Francisco [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-09-01

    Compensation mechanisms for electricity generation systems installed behind the meter are under scrutiny in several jurisdictions in the United States. Legislators in 29 states introduced bills to amend net metering provisions in 2014, and in 33 states in the 2015 legislative session as of August 20, 2015. Some utilities have also sought to increase the revenue they receive from net-metered customers through rate redesign. The circumstances that have triggered the recent push for change include a growing percentage of net-metered customers, potential effects of distributed generation on cost allocation, decreasing photovoltaic (PV) system costs, the challenges of integrating high levels of solar generation in the distribution network, and increasing pressure on utility business models. This report presents a survey of options to charge and compensate PV customers, as well as options that may preserve utility revenues in scenarios with increased DG. These options could be used as building blocks to create a distributed generation (DG) compensation policy that may preserve the value of the different stakeholders and balance their interests.

  4. On the Control of Consensus Networks: Theory and Applications

    Science.gov (United States)

    Hudoba de Badyn, Mathias

    Signed networks allow the study of positive and negative interactions between agents. In this thesis, three papers are presented that address controllability of networked dynamics. First, controllability of signed consensus networks is approached from a symmetry perspective, for both linear and nonlinear consensus protocols. It is shown that the graph-theoretic property of signed networks known as structural balance renders the consensus protocol uncontrollable when coupled with a certain type of symmetry. Stabilizability and output controllability of signed linear consensus is also examined, as well as a data-driven approach to finding bipartite consensus stemming from structural balance for signed nonlinear consensus. Second, an algorithm is constructed that allows one to grow a network while preserving controllability, and some generalizations of this algorithm are presented. Submodular optimization is used to analyze a second algorithm that adds nodes to a network to maximize the network connectivity.

  5. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... website. Skip to main content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers Open ... Diagnosed with Cancer You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation ...

  6. 76 FR 74721 - Preserving the Open Internet

    Science.gov (United States)

    2011-12-01

    ...; Report No. 2936] Preserving the Open Internet AGENCY: Federal Communications Commission. ACTION: Final... for broadband service to preserve and reinforce Internet freedom and openness. DATES: Oppositions to... applicability. Subject: In the Matter of Preserving the Open Internet, Broadband Industry Practices, published...

  7. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Skip to main content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers Open menu ... with Cancer You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for ...

  8. A comparison of preservative-free diclofenac and preserved diclofenac eye drops after cataract surgery in patients with diabetic retinopathy.

    Science.gov (United States)

    Yasuda, Kanako; Miyazawa, Akiko; Shimura, Masahiko

    2012-06-01

    The aim of this study was to compare the anti-inflammatory efficacy of preservative-free and preserved 0.1% diclofenac eye drops for the management of postoperative inflammation after cataract surgery in patients with nonproliferative diabetic retinopathy and in normal controls. Forty-two diabetic patients and 50 normal control patients who underwent small-incision phacoemulsification cataract surgery bilaterally received topical preservative-free diclofenac in 1 eye and preserved diclofenac in the other eye. The corrected distance visual acuity (CDVA) as determined by a logarithm of the minimum angle of resolution (logMAR) chart, intraocular pressure (IOP), foveal thickness (FT) using optical coherence tomography (OCT), and the anterior chamber flare (ACF) score measured with a laser flare cell meter were monitored for 12 weeks after surgery. In the eyes with diabetic retinopathy, there were no significant differences in CDVA, IOP, FT, and ACF score between the right and left eyes at the initial exam. After cataract surgery, changes in CDVA, IOP, and FT were not influenced by the preservative in the diclofenac eye drops. In contrast, the ACF score in the eyes treated with preserved diclofenac showed slower recovery from postoperative inflammation than the eyes treated with preservative-free diclofenac. In the normal control eyes, similar but milder changes were observed in each of the clinical parameters. Because preservative suppressed the anti-inflammatory efficacy of topical diclofenac after cataract surgery, preservative-free diclofenac may have an improved safety profile during postoperative treatment, especially in patients with diabetic retinopathy.

  9. Preservation of food products by irradiation

    International Nuclear Information System (INIS)

    McGivney, W.T.

    1988-01-01

    The use of irradiation to preserve food has the potential to significantly enhance our capacity to maximize the quality and quantity of the food we consume. In a world in which distribution of food occurs across continents and in which malnourished populations are in dire need of basic food products, any safe, effective, and efficient means of preserving food is more than welcome. Irradiation, as a method for food preservation, has been studied for more than 30 years. This discussion focuses on this most recent method for the preservation of food with particular emphasis on its effects on the safety, nutritive, and aesthetic values of the food preserved by irradiation. The use of ionizing radiation as a method to preserve foods is one that has been demonstrated to be effective for a variety of food classes. Irradiation offers a means to decontaminate, disinfest, and retard the spoilage of the food supply. At the same time, it appears that the wholesomeness of these food products is maintained. Nutritive value can be sustained by use of effective doses of radiation. Concerns over the safety of irradiated food are rooted in questions regarding the potential induction of radioactivity, harmful radiolytic products, and pathogenic radiation-resistant or mutant strains of microorganisms. Research findings have allayed concerns over safety. However, more research is necessary to conclusively resolve these safety issues. Food irradiation is a promising technology that has and will contribute to our ability to feed the people of this world. This technology is but one of many available ways to preserve our greatest natural resource, the food supply. Enhancement of the ability to preserve food by irradiation will facilitate the distribution of food from fertile developed regions to the malnourished peoples of underdeveloped countries. 21 references

  10. Digitisation for access to preserved documents

    Directory of Open Access Journals (Sweden)

    Majlis Bremer-Laamanen

    2003-06-01

    Full Text Available Today the digitisation of our collections is a goal for libraries all over Europe. The choices we make in digitisation and preservation now will have a significant impact on the future. Do we only emphasise access? How do we enable access and preserve our originals in a qualitative and productive way? What will actually be left of our cultural heritage in the next millennium? In this paper I am going to look at promoting access to preserved originals mirrored by the experience at the Helsinki University Library, the National Library of Finland: · Preservation activities as platform for digitisation and OCR · Processing access to collections · The future - looking ahead

  11. Switching from a preserved to a preservative-free prostaglandin preparation in topical glaucoma medication.

    Science.gov (United States)

    Uusitalo, Hannu; Chen, Enping; Pfeiffer, Norbert; Brignole-Baudouin, Françoise; Kaarniranta, Kai; Leino, Markku; Puska, Päivi; Palmgren, Elina; Hamacher, Thomas; Hofmann, Günter; Petzold, Gernot; Richter, Ulrich; Riedel, Tobias; Winter, Martin; Ropo, Auli

    2010-05-01

    The purpose of this study was to investigate the tolerability and intraocular pressure (IOP) reducing effect of the first preservative-free prostaglandin tafluprost (Taflotan) in patients exhibiting ocular surface side-effects during latanoprost (Xalatan) treatment. A total of 158 patients were enrolled in this open-label multicentre study. Eligible patients had to have at least two ocular symptoms, or one sign and one symptom, during treatment with latanoprost. At baseline, the patients were directly switched from latanoprost to preservative-free tafluprost for 12 weeks. The patients were queried for ocular symptoms, and ocular signs were assessed by using tear break-up time, Schirmer's test, fluorescein staining and evaluation of conjunctival hyperaemia and blepharitis. In addition, HLA-DR and MUC5AC in conjunctival impression cytology specimens were analyzed, and a drop discomfort/quality of life (QoL) questionnaire was employed. IOP was measured at all visits. Preservative-free tafluprost maintained IOP at the same level after 12- weeks treatment (16.4 +/- 2.7 mmHg) as latanoprost at baseline (16.8 +/- 2.5 mmHg). During treatment with preservative-free tafluprost, the number of patients having irritation/burning/stinging (56.3%), itching (46.8%), foreign body sensation (49.4%), tearing (55.1%) and dry eye sensation (64.6%) decreased to 28.4%, 26.5%, 27.1%, 27.1% and 39.4% correspondingly. The number of the patients with abnormal fluorescein staining of cornea (81.6%) and conjunctiva (84.2%), blepharitis (60.1%), conjunctival hyperaemia (84.2%) and abnormal Schirmer's test (71.5%) was also reduced significantly to 40.6%, 43.2%, 40.6%, 60.0% and 59.4% correspondingly. The tear break-up time improved significantly from 4.5 +/- 2.5 seconds to 7.8 +/- 4.9 seconds. A reduction in the number of patients with abnormal conjunctival cells based on HLA-DR and MUC5AC was also detected. Preservative-free tafluprost maintained IOP at the same level as latanoprost, but was

  12. On the Interplay between the Evolvability and Network Robustness in an Evolutionary Biological Network: A Systems Biology Approach

    Science.gov (United States)

    Chen, Bor-Sen; Lin, Ying-Po

    2011-01-01

    In the evolutionary process, the random transmission and mutation of genes provide biological diversities for natural selection. In order to preserve functional phenotypes between generations, gene networks need to evolve robustly under the influence of random perturbations. Therefore, the robustness of the phenotype, in the evolutionary process, exerts a selection force on gene networks to keep network functions. However, gene networks need to adjust, by variations in genetic content, to generate phenotypes for new challenges in the network’s evolution, ie, the evolvability. Hence, there should be some interplay between the evolvability and network robustness in evolutionary gene networks. In this study, the interplay between the evolvability and network robustness of a gene network and a biochemical network is discussed from a nonlinear stochastic system point of view. It was found that if the genetic robustness plus environmental robustness is less than the network robustness, the phenotype of the biological network is robust in evolution. The tradeoff between the genetic robustness and environmental robustness in evolution is discussed from the stochastic stability robustness and sensitivity of the nonlinear stochastic biological network, which may be relevant to the statistical tradeoff between bias and variance, the so-called bias/variance dilemma. Further, the tradeoff could be considered as an antagonistic pleiotropic action of a gene network and discussed from the systems biology perspective. PMID:22084563

  13. Preservation of Newspapers: Theoretical Approaches and Practical Achievements

    Science.gov (United States)

    Hasenay, Damir; Krtalic, Maja

    2010-01-01

    The preservation of newspapers is the main topic of this paper. A theoretical overview of newspaper preservation is given, with an emphasis on the importance of a systematic and comprehensive approach. Efficient newspaper preservation implies understanding the meaning of preservation in general, as well as understanding specific approaches,…

  14. Fertility preservation for non-medical reasons: controversial, but increasingly common.

    Science.gov (United States)

    von Wolff, Michael; Germeyer, Ariane; Nawroth, Frank

    2015-01-16

    Fertility-preserving measures for women are increasingly being performed for non-medical reasons in Germany. This is now a controversial matter. The authors searched the PubMed database for pertinent publications on the basis of their clinical and scientific experience and evaluated relevant data from the registry of the German FertiPROTEKT network (www.fertiprotekt. com). The various fertility-preserving measures that are available are described and critically discussed. In most cases, the creation of a fertility reserve currently involves the cryopreservation of unfertilized oocytes, rather than of ovarian tissue. Most of the women who decide to undergo this procedure are over 35 years old. According to data from the FertiPROTEKT registry, most such procedures carried out in the years 2012 and 2013 involved a single stimulation cycle. The theoretical probability of childbirth per stimulation is 40% in women under age 35 and 30% in women aged 35 to 39. If the oocytes are kept for use at a later date, rather than at once, the maternal risk is higher, because the mother is older during pregnancy. The risk to the child may be higher as well because of the need for in vitro fertilization (IVF). Pregnancy over age 40 often leads to complications such as gestational diabetes and pre-eclampsia. IVF may be associated with a higher risk of epigenetic abnormalities. Ethicists have upheld women's reproductive freedom while pointing out that so-called social freezing merely postpones social problems, rather than solving them. Fertility preservation for non-medical reasons should be critically discussed, and decisions should be made on a case-by-case basis.

  15. The Use of Personal Value Estimations to Select Images for Preservation in Public Library Digital Community Collections

    Directory of Open Access Journals (Sweden)

    Andrea Copeland

    2014-05-01

    Full Text Available A considerable amount of information, particularly in image form, is shared on the web through social networking sites. If any of this content is worthy of preservation, who decides what is to be preserved and based on what criteria. This paper explores the potential for public libraries to assume this role of community digital repositories through the creation of digital collections. Thirty public library users and thirty librarians were solicited from the Indianapolis metropolitan area to evaluate five images selected from Flickr in terms of their value to public library digital collections and their worthiness of long-term preservation. Using a seven-point Likert scale, participants assigned a value to each image in terms of its importance to self, family and society. Participants were then asked to explain the reasoning behind their valuations. Public library users and librarians had similar value estimations of the images in the study. This is perhaps the most significant finding of the study, given the importance of collaboration and forming partnerships for building and sustaining community collections and archives.

  16. Relay Protection Coordination for Photovoltaic Power Plant Connected on Distribution Network

    OpenAIRE

    Nikolovski, Srete; Papuga, Vanja; Knežević, Goran

    2014-01-01

    This paper presents a procedure and computation of relay protection coordination for a PV power plant connected to the distribution network. In recent years, the growing concern for environment preservation has caused expansion of photovoltaic PV power plants in distribution networks. Numerical computer simulation is an indispensable tool for studying photovoltaic (PV) systems protection coordination. In this paper, EasyPower computer program is used with the module Power Protector. Time-curr...

  17. STUDY OF PRESERVING PRIVACY IN MOBILE SOCIAL NETWORK BY PERSONALIZATION OF FINE GRAINED SPAM FILTERING SCHEME

    OpenAIRE

    S. B. GHATTE , A. B. RAJMANE

    2018-01-01

    Mobile social-networking is a social networking where people with similar interests connect to their social communities with a mobile device. Mobile users share various types of information, such as newsletters, advertisements, experiences, interests, opinions and personal content through their mobile devices. Because of Mobile social network (MSN) it is possible for mobile users to share information in the near area and makes their cyber–physical–social interaction easier.

  18. A Secure and Stable Multicast Overlay Network with Load Balancing for Scalable IPTV Services

    Directory of Open Access Journals (Sweden)

    Tsao-Ta Wei

    2012-01-01

    Full Text Available The emerging multimedia Internet application IPTV over P2P network preserves significant advantages in scalability. IPTV media content delivered in P2P networks over public Internet still preserves the issues of privacy and intellectual property rights. In this paper, we use SIP protocol to construct a secure application-layer multicast overlay network for IPTV, called SIPTVMON. SIPTVMON can secure all the IPTV media delivery paths against eavesdroppers via elliptic-curve Diffie-Hellman (ECDH key exchange on SIP signaling and AES encryption. Its load-balancing overlay tree is also optimized from peer heterogeneity and churn of peer joining and leaving to minimize both service degradation and latency. The performance results from large-scale simulations and experiments on different optimization criteria demonstrate SIPTVMON's cost effectiveness in quality of privacy protection, stability from user churn, and good perceptual quality of objective PSNR values for scalable IPTV services over Internet.

  19. Preservation management for libraries, archives and museums

    CERN Document Server

    Gorman, G E

    2006-01-01

    Memory institutions such as libraries, archives, galleries and museums all share pressing concerns about preserving heritage. This book charts the diversity of preservation management in the contemporary information landscape, and offers guidance on preservation methods for the sustainability of collections from a range of international experts.

  20. 28 CFR 36.405 - Alterations: Historic preservation.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Alterations: Historic preservation. 36... Alterations: Historic preservation. (a) Alterations to buildings or facilities that are eligible for listing in the National Register of Historic Places under the National Historic Preservation Act (16 U.S.C...

  1. Reduced-Order Structure-Preserving Model for Parallel-Connected Three-Phase Grid-Tied Inverters

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Brian B [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Purba, Victor [University of Minnesota; Jafarpour, Saber [University of California Santa-Barbara; Bullo, Francesco [University of California Santa-Barbara; Dhople, Sairaj V. [University of Minnesota

    2017-08-21

    Next-generation power networks will contain large numbers of grid-connected inverters satisfying a significant fraction of system load. Since each inverter model has a relatively large number of dynamic states, it is impractical to analyze complex system models where the full dynamics of each inverter are retained. To address this challenge, we derive a reduced-order structure-preserving model for parallel-connected grid-tied three-phase inverters. Here, each inverter in the system is assumed to have a full-bridge topology, LCL filter at the point of common coupling, and the control architecture for each inverter includes a current controller, a power controller, and a phase-locked loop for grid synchronization. We outline a structure-preserving reduced-order inverter model with lumped parameters for the setting where the parallel inverters are each designed such that the filter components and controller gains scale linearly with the power rating. By structure preserving, we mean that the reduced-order three-phase inverter model is also composed of an LCL filter, a power controller, current controller, and PLL. We show that the system of parallel inverters can be modeled exactly as one aggregated inverter unit and this equivalent model has the same number of dynamical states as any individual inverter in the system. Numerical simulations validate the reduced-order model.

  2. Fertility preservation in Turner syndrome.

    Science.gov (United States)

    Grynberg, Michaël; Bidet, Maud; Benard, Julie; Poulain, Marine; Sonigo, Charlotte; Cédrin-Durnerin, Isabelle; Polak, Michel

    2016-01-01

    Premature ovarian insufficiency is a relatively rare condition that can appear early in life. In a non-negligible number of cases the ovarian dysfunction results from genetic diseases. Turner syndrome (TS), the most common sex chromosome abnormality in females, is associated with an inevitable premature exhaustion of the follicular stockpile. The possible or probable infertility is a major concern for TS patients and their parents, and physicians are often asked about possible options to preserve fertility. Unfortunately, there are no recommendations on fertility preservation in this group. The severely reduced follicle pool even during prepubertal life represents the major limit for fertility preservation and is the root of numerous questions regarding the competence of gametes or ovarian tissue crybanked. In addition, patients suffering from TS show higher than usual rates of spontaneous abortion, fetal anomaly, and maternal morbidity and mortality, which should be considered at the time of fertility preservation and before reutilization of the cryopreserved gametes. Apart from fulfillment of the desire of becoming genetic parents, TS patients may be potential candidates for egg donation, gestational surrogacy, and adoption. The present review discusses the different options for preserving female fertility in TS and the ethical questions raised by these approaches. Copyright © 2016 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  3. 21 CFR 146.152 - Orange juice with preservative.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false Orange juice with preservative. 146.152 Section... Fruit Juices and Beverages § 146.152 Orange juice with preservative. (a) Orange juice with preservative... of orange juice for manufacturing as provided for in § 146.151, except that a preservative is added...

  4. 6 CFR 5.28 - Preservation of records.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Preservation of records. 5.28 Section 5.28 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.28 Preservation of records. Each component will preserve all correspondence...

  5. 7 CFR 1.24 - Preservation of records.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Preservation of records. 1.24 Section 1.24 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.24 Preservation of records. Agencies shall preserve all correspondence relating to the requests it receives under this...

  6. 6 CFR 5.10 - Preservation of records.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Preservation of records. 5.10 Section 5.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Freedom of Information Act § 5.10 Preservation of records. Each component shall preserve all...

  7. DNA preservation in silk.

    Science.gov (United States)

    Liu, Yawen; Zheng, Zhaozhu; Gong, He; Liu, Meng; Guo, Shaozhe; Li, Gang; Wang, Xiaoqin; Kaplan, David L

    2017-06-27

    The structure of DNA is susceptible to alterations at high temperature and on changing pH, irradiation and exposure to DNase. Options to protect and preserve DNA during storage are important for applications in genetic diagnosis, identity authentication, drug development and bioresearch. In the present study, the stability of total DNA purified from human dermal fibroblast cells, as well as that of plasmid DNA, was studied in silk protein materials. The DNA/silk mixtures were stabilized on filter paper (silk/DNA + filter) or filter paper pre-coated with silk and treated with methanol (silk/DNA + PT-filter) as a route to practical utility. After air-drying and water extraction, 50-70% of the DNA and silk could be retrieved and showed a single band on electrophoretic gels. 6% silk/DNA + PT-filter samples provided improved stability in comparison with 3% silk/DNA + filter samples and DNA + filter samples for DNA preservation, with ∼40% of the band intensity remaining at 37 °C after 40 days and ∼10% after exposure to UV light for 10 hours. Quantitative analysis using the PicoGreen assay confirmed the results. The use of Tris/borate/EDTA (TBE) buffer enhanced the preservation and/or extraction of the DNA. The DNA extracted after storage maintained integrity and function based on serving as a functional template for PCR amplification of the gene for zinc finger protein 750 (ZNF750) and for transgene expression of red fluorescence protein (dsRed) in HEK293 cells. The high molecular weight and high content of a crystalline beta-sheet structure formed on the coated surfaces likely accounted for the preservation effects observed for the silk/DNA + PT-filter samples. Although similar preservation effects were also obtained for lyophilized silk/DNA samples, the rapid and simple processing available with the silk-DNA-filter membrane system makes it appealing for future applications.

  8. 43 CFR 3.17 - Preservation of collection.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Preservation of collection. 3.17 Section 3.17 Public Lands: Interior Office of the Secretary of the Interior PRESERVATION OF AMERICAN ANTIQUITIES § 3.17 Preservation of collection. Every collection made under the authority of the act and of...

  9. 21 CFR 178.3800 - Preservatives for wood.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Preservatives for wood. 178.3800 Section 178.3800... Certain Adjuvants and Production Aids § 178.3800 Preservatives for wood. Preservatives may be safely used... to accomplish the technical effect of protecting the wood from decay, mildew, and water absorption...

  10. On Planning and Managing the Preservation of Historical Buildings

    Directory of Open Access Journals (Sweden)

    Č. Jarský

    2003-01-01

    Full Text Available The process of preserving and reconstructing historical buildings poses several specific questions and raises problems which must be solved in the planning and management stage of the building process - from questions of architectural and art-historical significance, via the future purpose of use of the building, links to the surrounding buildings, environmental questions, questions of cost, time analysis, and quality assurance problems. Many of these problems can be solved with the help of a computer model of the course of the rehabilitation and reconstruction of the building created by a construction technology network diagram. The CONTEC integrated project planning, management and quality control system based on these diagrams has been used for bidding, planning and managing the reconstruction process of several significant historical buildings in Prague and other cities.

  11. Long-term preservation of anammox bacteria.

    Science.gov (United States)

    Rothrock, Michael J; Vanotti, Matias B; Szögi, Ariel A; Gonzalez, Maria Cruz Garcia; Fujii, Takao

    2011-10-01

    Deposit of useful microorganisms in culture collections requires long-term preservation and successful reactivation techniques. The goal of this study was to develop a simple preservation protocol for the long-term storage and reactivation of the anammox biomass. To achieve this, anammox biomass was frozen or lyophilized at two different freezing temperatures (-60°C and in liquid nitrogen (-200°C)) in skim milk media (with and without glycerol), and the reactivation of anammox activity was monitored after a 4-month storage period. Of the different preservation treatments tested, only anammox biomass preserved via freezing in liquid nitrogen followed by lyophilization in skim milk media without glycerol achieved stoichiometric ratios for the anammox reaction similar to the biomass in both the parent bioreactor and in the freshly harvested control treatment. A freezing temperature of -60°C alone, or in conjunction with lyophilization, resulted in the partial recovery of the anammox bacteria, with an equal mixture of anammox and nitrifying bacteria in the reactivated biomass. To our knowledge, this is the first report of the successful reactivation of anammox biomass preserved via sub-zero freezing and/or lyophilization. The simple preservation protocol developed from this study could be beneficial to accelerate the integration of anammox-based processes into current treatment systems through a highly efficient starting anammox biomass.

  12. Flexible Bit Preservation on a National Basis

    DEFF Research Database (Denmark)

    Jurik, Bolette; Nielsen, Anders Bo; Zierau, Eld

    2012-01-01

    In this paper we present the results from The Danish National Bit Repository project. The project aim was establishment of a system that can offer flexible and sustainable bit preservation solutions to Danish cultural heritage institutions. Here the bit preservation solutions must include support...... of bit safety as well as other requirements like e.g. confidentiality and availability. The Danish National Bit Repository is motivated by the need to investigate and handle bit preservation for digital cultural heritage. Digital preservation relies on the integrity of the bits which digital material...

  13. User Experience and Heritage Preservation

    Science.gov (United States)

    Orfield, Steven J.; Chapman, J. Wesley; Davis, Nathan

    2011-01-01

    In considering the heritage preservation of higher education campus buildings, much of the attention gravitates toward issues of selection, cost, accuracy, and value, but the model for most preservation projects does not have a clear method of achieving the best solutions for meeting these targets. Instead, it simply relies on the design team and…

  14. Knowledge Preservation and Web-tools

    Science.gov (United States)

    Moreman, Douglas; Dyer, John; Ahmad, Rashed

    1998-01-01

    We propose a library of "netbooks" as part of a national effort, preserving the wisdom of the early Space Program. NASA is losing its rocket scientists who designed the great systems of the past. Few new systems of similar ambition are being built; much of the expertise that took us to the Moon is evaporating. With retiring NASA designers, we work to preserve something of the expertise of these individuals, developed at great national cost. We show others the tools that make preservation easy and cheap. Retiring engineers and scientists can be coached into speaking (without charge) into recording devices about ideas not widely appreciated but of potential future value. Transcripts of the recordings and the audio itself are combined (cheaply) in netbooks accessible via a standard web-browser (free). Selected netbooks are indexed into a rapidly searchable system, an electronic Library. We recruit support in establishing a standards committee for that Library. The system is to be a model for access by the blind as well as for preservation of important, technical knowledge.

  15. 29 CFR 71.8 - Preservation of records.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Preservation of records. 71.8 Section 71.8 Labor Office of the Secretary of Labor PROTECTION OF INDIVIDUAL PRIVACY AND ACCESS TO RECORDS UNDER THE PRIVACY ACT OF 1974 General § 71.8 Preservation of records. Each component shall preserve all correspondence relating...

  16. Loops in hierarchical channel networks

    Science.gov (United States)

    Katifori, Eleni; Magnasco, Marcelo

    2012-02-01

    Nature provides us with many examples of planar distribution and structural networks having dense sets of closed loops. An archetype of this form of network organization is the vasculature of dicotyledonous leaves, which showcases a hierarchically-nested architecture. Although a number of methods have been proposed to measure aspects of the structure of such networks, a robust metric to quantify their hierarchical organization is still lacking. We present an algorithmic framework that allows mapping loopy networks to binary trees, preserving in the connectivity of the trees the architecture of the original graph. We apply this framework to investigate computer generated and natural graphs extracted from digitized images of dicotyledonous leaves and animal vasculature. We calculate various metrics on the corresponding trees and discuss the relationship of these quantities to the architectural organization of the original graphs. This algorithmic framework decouples the geometric information from the metric topology (connectivity and edge weight) and it ultimately allows us to perform a quantitative statistical comparison between predictions of theoretical models and naturally occurring loopy graphs.

  17. Digital preservation for heritages

    CERN Document Server

    Lu, Dongming

    2011-01-01

    ""Digital Preservation for Heritages: Technologies and Applications"" provides a comprehensive and up-to-date coverage of digital technologies in the area of cultural heritage preservation, including digitalization, research aiding, conservation aiding, digital exhibition, and digital utilization. Processes, technical frameworks, key technologies, as well as typical systems and applications are discussed in the book. It is intended for researchers and students in the fields of computer science and technology, museology, and archaeology. Dr. Dongming Lu is a professor at College of Computer Sci

  18. Antioxidant and inflammatory cytokine in tears of patients with dry eye syndrome treated with preservative-free versus preserved eye drops.

    Science.gov (United States)

    Jee, Donghyun; Park, Sang Hee; Kim, Man Soo; Kim, Eun Chul

    2014-07-03

    To compare the antioxidant and inflammatory cytokine activities in tears of patients with dry eye syndrome treated with preservative-free versus preserved eye drops. A total of 100 patients with moderate to severe dry eye syndrome were randomly divided into two groups. Fifty patients (group 1) were treated four times with preservative-free 0.1% sodium hyaluronate and 0.1% fluorometholone eye drops in the first month and with preservative-free 0.1% sodium hyaluronate and 0.05% cyclosporine eye drops in the second and third months. Another 50 patients (group 2) were treated with preserved eye drops on the same schedule. Ocular Surface Disease Index, corneal fluorescein staining, Schirmer I test, tear film breakup time, impression cytology, and antioxidant and inflammatory cytokine activities in tears were evaluated. Treatment with preservative-free eye drops led to significant improvements in symptoms, tear film breakup time, Schirmer I score, and impression cytologic findings compared to treatment with preserved eye drops (P dry eye syndrome. There was a statistically significant decrease in the IL-1β, IL-6, IL-12, and TNF-α concentrations and a statistically significant increase in the catalase, peroxiredoxin 2, superoxide dismutase 2 (SOD 2), and thioredoxin mean fluorescence intensity (MFI) of tears in the preservative-free group at 1, 2, and 3 months compared to initial values, respectively (P eye drops is effective against the dry eye syndrome. Preservative-free eye drops seem to be more effective than preserved eye drops in decreasing ocular inflammation and in increasing antioxidant contents in tears of patients with dry eye syndrome. Copyright 2014 The Association for Research in Vision and Ophthalmology, Inc.

  19. Treatment of Preserved Wastewater with UASB

    Directory of Open Access Journals (Sweden)

    Zhang Yongli

    2016-01-01

    Full Text Available The preserved wastewater was treated by the upflow anaerobic sludge blanket (UASB reactor, the effects of the anaerobic time on COD, turbidity, pH, conductivity, SS, absorbance, and decolorization rate of the preserved wastewater were investigated. The results showed that with the increase of the anaerobic time, the treatment effect of the UASB reactor on the preserved wastewater was improved. Under the optimum anaerobic time condition, the COD removal rate, turbidity removal rate, pH, conductivity, SS removal rate, absorbance, and decoloration rate of the wastewater were 49.6%, 38.5%, 5.68, 0.518×104, 24%, 0.598, and 32.4%, respectively. Therefore, the UASB reactor can be used as a pretreatment for the preserved wastewater, in order to reduce the difficulty of subsequent aerobic treatment.

  20. Audiovisual preservation strategies, data models and value-chains

    OpenAIRE

    Addis, Matthew; Wright, Richard

    2010-01-01

    This is a report on preservation strategies, models and value-chains for digital file-based audiovisual content. The report includes: (a)current and emerging value-chains and business-models for audiovisual preservation;(b) a comparison of preservation strategies for audiovisual content including their strengths and weaknesses, and(c) a review of current preservation metadata models, and requirements for extension to support audiovisual files.

  1. Supervised Learning with Complex-valued Neural Networks

    CERN Document Server

    Suresh, Sundaram; Savitha, Ramasamy

    2013-01-01

    Recent advancements in the field of telecommunications, medical imaging and signal processing deal with signals that are inherently time varying, nonlinear and complex-valued. The time varying, nonlinear characteristics of these signals can be effectively analyzed using artificial neural networks.  Furthermore, to efficiently preserve the physical characteristics of these complex-valued signals, it is important to develop complex-valued neural networks and derive their learning algorithms to represent these signals at every step of the learning process. This monograph comprises a collection of new supervised learning algorithms along with novel architectures for complex-valued neural networks. The concepts of meta-cognition equipped with a self-regulated learning have been known to be the best human learning strategy. In this monograph, the principles of meta-cognition have been introduced for complex-valued neural networks in both the batch and sequential learning modes. For applications where the computati...

  2. Orthogonality preserving infinite dimensional quadratic stochastic operators

    International Nuclear Information System (INIS)

    Akın, Hasan; Mukhamedov, Farrukh

    2015-01-01

    In the present paper, we consider a notion of orthogonal preserving nonlinear operators. We introduce π-Volterra quadratic operators finite and infinite dimensional settings. It is proved that any orthogonal preserving quadratic operator on finite dimensional simplex is π-Volterra quadratic operator. In infinite dimensional setting, we describe all π-Volterra operators in terms orthogonal preserving operators

  3. Pancreas preservation for pancreas and islet transplantation

    Science.gov (United States)

    Iwanaga, Yasuhiro; Sutherland, David E.R.; Harmon, James V.; Papas, Klearchos K.

    2010-01-01

    Purpose of review To summarize advances and limitations in pancreas procurement and preservation for pancreas and islet transplantation, and review advances in islet protection and preservation. Recent findings Pancreases procured after cardiac death, with in-situ regional organ cooling, have been successfully used for islet transplantation. Colloid-free Celsior and histidine-tryptophan-ketoglutarate preservation solutions are comparable to University of Wisconsin solution when used for cold storage before pancreas transplantation. Colloid-free preservation solutions are inferior to University of Wisconsin solution for pancreas preservation prior to islet isolation and transplantation. Clinical reports on pancreas and islet transplants suggest that the two-layer method may not offer significant benefits over cold storage with the University of Wisconsin solution: improved oxygenation may depend on the graft size; benefits in experimental models may not translate to human organs. Improvements in islet yield and quality occurred from pancreases treated with inhibitors of stress-induced apoptosis during procurement, storage, isolation or culture. Pancreas perfusion may be desirable before islet isolation and transplantation and may improve islet yields and quality. Methods for real-time, noninvasive assessment of pancreas quality during preservation have been implemented and objective islet potency assays have been developed and validated. These innovations should contribute to objective evaluation and establishment of improved pancreas preservation and islet isolation strategies. Summary Cold storage may be adequate for preservation before pancreas transplants, but insufficient when pancreases are processed for islets or when expanded donors are used. Supplementation of cold storage solutions with cytoprotective agents and perfusion may improve pancreas and islet transplant outcomes. PMID:18685343

  4. In vitro effects of preservative-free and preserved prostaglandin analogs on primary cultured human conjunctival fibroblast cells.

    Science.gov (United States)

    Kim, Eun Joo; Kim, Yeoun-Hee; Kang, Sun-Hee; Lee, Kyoo Won; Park, Young Jeung

    2013-12-01

    Long-term use of topical medication is needed for glaucoma treatment. One of the most commonly prescribed classes of hypotensive agents are prostaglandin analogs (PGs) used as both first-line monotherapy; as well as in combination therapy with other hypotensive agents. Several side effects of eye drops can be caused by preservatives. The purpose of this study was to evaluate the effects of PGs with varying concentrations of benzalkonium chloride (BAC), alternative preservatives, or no preservatives on human conjunctival fibroblast cells. Primary human conjunctival fibroblast cells were used in these experiments. Cells were exposed to the following drugs: BAC at different concentrations, bimatoprost 0.01% (with BAC 0.02%), latanoprost 0.005% (with BAC 0.02%), tafluprost 0.0015% with/without 0.001% BAC and travoprost 0.004% (with 0.001% Polyquad) for 15 and 30 minutes. Cell cytotoxicity was evaluated by phase-contrast microscopy to monitor morphological changes of cells, Counting Kit-8 (CCK-8) assay to cell viability, and fluorescent activated cell sorting (FACS) analysis to measure apoptosis. BAC caused cell shrinkage and detachment from the plate in a dose-dependent manner. Morphological changes were observed in cells treated with bimatoprost 0.01% and latanoprost 0.005%. However, mild cell shrinkage was noted in cells treated with tafluprost 0.0015%, while a non-toxic effect was noted with travoprost 0.004% and preservative-free tafluprost 0.0015%. CCK-8 assay and FACS analysis showed all groups had a significantly decreased cell viability and higher apoptosis rate compared with the control group. However, travoprost 0.004% and preservative-free tafluprost 0.0015% showed lower cytotoxicity and apoptosis rate than other drugs. This in vitro study revealed that BAC-induced cytotoxicity is dose-dependent, although it is important to emphasize that the clinical significance of toxicity differences observed among the different PGs formulations has not yet been firmly

  5. Temporal trends of preservative allergy in Denmark (1985-2008).

    Science.gov (United States)

    Thyssen, Jacob P; Engkilde, Kåre; Lundov, Michael D; Carlsen, Berit C; Menné, Torkil; Johansen, Jeanne D

    2010-02-01

    Most cosmetics and industrial products contain preservatives. Preservative allergy is common and, historically, changing contact allergy epidemics caused by preservatives have been observed. In 1997, Alan Dillarstone predicted a stable development of preservative allergy following mandatory ingredient labelling on cosmetic products. To investigate the development in the prevalence of preservative allergy in Denmark over a 24-year period (1985-2008) and to challenge the prediction made by Dillarstone. A retrospective analysis of patch test data was performed (n = 18179). Comparisons were made using a chi(2) test. Logistic regression analyses were used to test for associations. The development of preservative allergy mirrored those of other European patch test centres. The development was not dependent on sex or age group. The prevalence was higher among women and those aged 41-60 years. Formaldehyde allergy was persistently prevalent over the study years. The overall prevalence of preservative allergy increased significantly (P(trend) = 0.001), mainly because of patch testing with additional preservatives in recent years. Dillarstone's prediction was confirmed as the prevalence of contact allergy to individual preservatives remained relatively stable. However, the overall burden of preservative allergy seemed to increase. Introduction of new preservatives may add to the burden of contact allergy.

  6. Polarization-preserving holey fibers

    DEFF Research Database (Denmark)

    Broeng, Jes; Mogilevtsev, Dmitri; Libori, Stig E. Barkou

    2001-01-01

    In this work we suggest and discuss a microstructure of air capillaries with elliptical cross-section in a tread of glass that gives opportunity for Creation of polarization-preserving fiber with very small beat length between the fundamental modes of different polarization......In this work we suggest and discuss a microstructure of air capillaries with elliptical cross-section in a tread of glass that gives opportunity for Creation of polarization-preserving fiber with very small beat length between the fundamental modes of different polarization...

  7. Temporal trends of preservative allergy in Denmark (1985-2008)

    DEFF Research Database (Denmark)

    Thyssen, Jacob P; Engkilde, Kåre; Lundov, Michael D

    2010-01-01

    Most cosmetics and industrial products contain preservatives. Preservative allergy is common and, historically, changing contact allergy epidemics caused by preservatives have been observed. In 1997, Alan Dillarstone predicted a stable development of preservative allergy following mandatory...

  8. Investigation of efficient features for image recognition by neural networks.

    Science.gov (United States)

    Goltsev, Alexander; Gritsenko, Vladimir

    2012-04-01

    In the paper, effective and simple features for image recognition (named LiRA-features) are investigated in the task of handwritten digit recognition. Two neural network classifiers are considered-a modified 3-layer perceptron LiRA and a modular assembly neural network. A method of feature selection is proposed that analyses connection weights formed in the preliminary learning process of a neural network classifier. In the experiments using the MNIST database of handwritten digits, the feature selection procedure allows reduction of feature number (from 60 000 to 7000) preserving comparable recognition capability while accelerating computations. Experimental comparison between the LiRA perceptron and the modular assembly neural network is accomplished, which shows that recognition capability of the modular assembly neural network is somewhat better. Copyright © 2011 Elsevier Ltd. All rights reserved.

  9. Strong-stability-preserving additive linear multistep methods

    KAUST Repository

    Hadjimichael, Yiannis

    2018-02-20

    The analysis of strong-stability-preserving (SSP) linear multistep methods is extended to semi-discretized problems for which different terms on the right-hand side satisfy different forward Euler (or circle) conditions. Optimal perturbed and additive monotonicity-preserving linear multistep methods are studied in the context of such problems. Optimal perturbed methods attain larger monotonicity-preserving step sizes when the different forward Euler conditions are taken into account. On the other hand, we show that optimal SSP additive methods achieve a monotonicity-preserving step-size restriction no better than that of the corresponding nonadditive SSP linear multistep methods.

  10. On the security of an anonymous roaming protocol in UMTS mobile networks

    Directory of Open Access Journals (Sweden)

    Shuhua Wu

    2012-02-01

    Full Text Available In this communication, we first show that the privacy-preserving roaming protocol recently proposed for mobile networks cannot achieve the claimed security level. Then we suggest an improved protocol to remedy its security problems.

  11. Liquid growth hormone: preservatives and buffers

    DEFF Research Database (Denmark)

    Kappelgaard, Anne-Marie; Anders, Bojesen; Skydsgaard, Karen

    2004-01-01

    injection are dependent on the preservative used in the formulation and the concentration of GH. Injection pain may also be related to the buffer substance and injection volume. A liquid formulation of GH, Norditropi SimpleXx, has been developed that dispenses with the need for reconstitution before...... solution. More pain was also reported following large volume injections and following injections with solutions containing high protein concentrations. In summary, optimization of the preservative and buffer content of a liquid GH formulation may reduce injection pain and lead to improved patient...... administration. The formulation uses phenol (3 mg/ml) as a preservative (to protect product from microbial degradation or contamination) and histidine as a buffer. Alternative preservatives used in other GH formulations include m-cresol (9 mg/ml) and benzyl alcohol (3-9 mg/ml). Buffering agents include citrate...

  12. Blogs as Objects of Preservation

    DEFF Research Database (Denmark)

    Stepanyan, Karen; Gkotsis, George; Kalb, Hendrik

    2012-01-01

    challenge for the digital preservation community. While the methodological frameworks for selecting these properties provide a good foundation, a continued discussion is necessary for further clarifying and improving the available methods. This paper advances earlier work by building on the exist......challenge for the digital preservation community. While the methodological frameworks for selecting these properties provide a good foundation, a continued discussion is necessary for further clarifying and improving the available methods. This paper advances earlier work by building...... analysis) and, subsequently, improve the final reformulation of the properties. To demonstrate the applicability of the modified framework, the paper presents a use case of a blog preservation initiative that is informed by stakeholder interviews and evaluation of structural and technological foundations...

  13. Comprehensive preserving technique for Chinese chestnut storage

    International Nuclear Information System (INIS)

    Chen Yuntang; Yang Baoan; Zhang Jianwei; Li Qiufang

    2003-01-01

    Chinese chestnut can be preserved for a long time by using a comprehensive preserving technique, which consists of casing, irradiating, treating with preserving agent and controlling environment conditions. The shelftime of the treated chestnuts reaches 11 months keeping no insects, no germination and good quality for eating with the good fruit ratio of 97.5% and water losing ratio of 3.8%

  14. Temporal trends of preservative allergy in Denmark (1985-2008)

    DEFF Research Database (Denmark)

    Thyssen, Jacob P; Engkilde, Kåre; Lundov, Michael D

    2010-01-01

    Most cosmetics and industrial products contain preservatives. Preservative allergy is common and, historically, changing contact allergy epidemics caused by preservatives have been observed. In 1997, Alan Dillarstone predicted a stable development of preservative allergy following mandatory...... ingredient labelling on cosmetic products....

  15. preservative activities parkia biglobosa ervative activities of aqueous

    African Journals Online (AJOL)

    userpc

    The general idea of preserving food is to incre its shelf life ... volatile oil and resinous matter (David, 197. Development in ... extracts of P. biglobosa as plant based food preservatives with. ,Preservative ..... activity of essential oils obtained from.

  16. Vitamin D deficiency: A potential risk factor for Clostridium difficile infection

    OpenAIRE

    Youssef, Dima; Grant, William B; Peiris, Alan N

    2012-01-01

    Dima Youssef,1 William B Grant,2 Alan N Peiris3,41Department of Internal Medicine, Division of Infectious Diseases, 2Sunlight, Nutrition and Health Research Center, San Francisco, CA USA; 3Department of Medicine, Mountain Home VAMC, 4Department of Medicine, East Tennessee State University, Johnson City, Tennessee, USAIn the July 3, 2012 issue of the journal of Risk Management and Healthcare Policy, Martinez et al present a nice review on Clostridium difficile (C. difficile) infections.1 The d...

  17. Whale Preservation. Grades Five to Nine.

    Science.gov (United States)

    Racicot, Darlene

    Dedicated to the conservation and preservation of whales, dolphins, and porpoises through public education, this instructional unit for grades 5-9 provides current (1993) facts, lesson plans, activities, and conservation and preservation techniques. Interdisciplinary activities involve students in debates, critical thinking, research, and…

  18. Resting state brain networks in the prairie vole.

    Science.gov (United States)

    Ortiz, Juan J; Portillo, Wendy; Paredes, Raul G; Young, Larry J; Alcauter, Sarael

    2018-01-19

    Resting state functional magnetic resonance imaging (rsfMRI) has shown the hierarchical organization of the human brain into large-scale complex networks, referred as resting state networks. This technique has turned into a promising translational research tool after the finding of similar resting state networks in non-human primates, rodents and other animal models of great value for neuroscience. Here, we demonstrate and characterize the presence of resting states networks in Microtus ochrogaster, the prairie vole, an extraordinary animal model to study complex human-like social behavior, with potential implications for the research of normal social development, addiction and neuropsychiatric disorders. Independent component analysis of rsfMRI data from isoflurane-anestethized prairie voles resulted in cortical and subcortical networks, including primary motor and sensory networks, but also included putative salience and default mode networks. We further discuss how future research could help to close the gap between the properties of the large scale functional organization and the underlying neurobiology of several aspects of social cognition. These results contribute to the evidence of preserved resting state brain networks across species and provide the foundations to explore the use of rsfMRI in the prairie vole for basic and translational research.

  19. Study of the utilization of propolis local propolis from Konawe, Southeast Sulawesi, as preservative natural preservative for beef

    Science.gov (United States)

    Natsir, Muh.; Kurniawati, Desy; kurniasih, Yeti

    2017-03-01

    The utilization of Propolis Trigona spp from Konawe, Southeast Sulawesi as a preservative naturally in beef has been done. The purpose of this research is to determine the ability of Propolis Trigona spp as a preservative. This study includes three stages, extraction of Propolis and analysis of phytochemicals, preserving a beef by soaking, as well as the microbes test. The rendemen extracts ethanol propolis be obtained in 19,15%. Based on analysis of phytochemicals it extracts Propolis of the class of compounds alkaloids, flavonoids, triterpenoid, tannins, saponins and essential oil. The best Curing of the beef can be obtained in the treatment Propolis 2.5 %. The result shows that Propolis Trigona spp from Konawe can be used as an alternative natural preservatives for the beef.

  20. 29 CFR 1915.33 - Chemical paint and preservative removers.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Chemical paint and preservative removers. 1915.33 Section... Preparation and Preservation § 1915.33 Chemical paint and preservative removers. (a) Employees shall be protected against skin contact during the handling and application of chemical paint and preservative...

  1. Tension and robustness in multitasking cellular networks.

    Directory of Open Access Journals (Sweden)

    Jeffrey V Wong

    Full Text Available Cellular networks multitask by exhibiting distinct, context-dependent dynamics. However, network states (parameters that generate a particular dynamic are often sub-optimal for others, defining a source of "tension" between them. Though multitasking is pervasive, it is not clear where tension arises, what consequences it has, and how it is resolved. We developed a generic computational framework to examine the source and consequences of tension between pairs of dynamics exhibited by the well-studied RB-E2F switch regulating cell cycle entry. We found that tension arose from task-dependent shifts in parameters associated with network modules. Although parameter sets common to distinct dynamics did exist, tension reduced both their accessibility and resilience to perturbation, indicating a trade-off between "one-size-fits-all" solutions and robustness. With high tension, robustness can be preserved by dynamic shifting of modules, enabling the network to toggle between tasks, and by increasing network complexity, in this case by gene duplication. We propose that tension is a general constraint on the architecture and operation of multitasking biological networks. To this end, our work provides a framework to quantify the extent of tension between any network dynamics and how it affects network robustness. Such analysis would suggest new ways to interfere with network elements to elucidate the design principles of cellular networks.

  2. Nuclear Knowledge Preservation in Croatia

    International Nuclear Information System (INIS)

    Pleslic, S.; Novosel, N.

    2006-01-01

    Since the International Atomic Energy Agency (IAEA, Vienna, Austria) was founded in 1957 as an autonomous intergovernmental organization, it was authorized for exchange of technical and scientific information on peaceful uses of atomic energy. 35 years ago the International Nuclear Information System (INIS) was established from IAEA as an international bibliographic database in the nuclear field and in nuclear related areas. INIS as an instrument for a comprehensive and systematic dissemination of all information and knowledge becomes a big technological and science information system with 134 Members (114 countries and 20 international organizations). In INIS Membership Arrangements all Members are responsible for the collection, selection, description of information and providing the Agency with the full text of each item of non-conventional literature. Participation of each Member is important because decentralized information management is an operational philosophy of INIS. During all these years status of nuclear power changed significantly in the world. Some developing countries started to develop nuclear power programme and some developed countries showed tendency to decrease use of nuclear power. Anyway, expert knowledge accumulated over decades and the achievements in the field of nuclear science and technology have to be preserved and later transferred to future generations. It became obvious that the INIS is practically a pioneer in the area of nuclear knowledge preservation with well defined goals of knowledge preservation: selection of the most valuable information to convey to the future, ensuring that it remains accessible, readable and understandable and management of technological change. Main components of knowledge preservation are: selection of information for preservation including evaluation and prioritisation by value, use and risk, information capture (purchasing, copy, digitise, web links), describing, classifying, store and access

  3. Convergence speed of consensus problems over undirected scale-free networks

    International Nuclear Information System (INIS)

    Sun Wei; Dou Li-Hua

    2010-01-01

    Scale-free networks and consensus behaviour among multiple agents have both attracted much attention. To investigate the consensus speed over scale-free networks is the major topic of the present work. A novel method is developed to construct scale-free networks due to their remarkable power-law degree distributions, while preserving the diversity of network topologies. The time cost or iterations for networks to reach a certain level of consensus is discussed, considering the influence from power-law parameters. They are both demonstrated to be reversed power-law functions of the algebraic connectivity, which is viewed as a measurement on convergence speed of the consensus behaviour. The attempts of tuning power-law parameters may speed up the consensus procedure, but it could also make the network less robust over time delay at the same time. Large scale of simulations are supportive to the conclusions. (general)

  4. Grain preservation in SSSR

    International Nuclear Information System (INIS)

    Trisviatski, L.A.

    1973-01-01

    First the importance of cereals collected in the S.S.S.R., the reason why the government had to put in practice a storage chain, composed of large capacity store houses (200 000 metric tonnes, or more) is reminded. When climatic conditions result in wet harvested grains, cereals are dried either in state enterprise dryers (32 to 50 tonnes/hour) or in kolkhozes' dryers (2 to 16 tonnes/hour). A new type of drying with recycling, has been developped, economizing 10 to 15 p. 100. Then the possibilities offered by the technique of partial drying of very wet grains are studied and the preservation processes using fresh ventilation, or hot ventilation with drying effect are described. The question of silage of wet grains destined to animal consumption is then examined as well as preservation by sodium pyrosulfide; the use of propionic acid, little developped in SSSR, is studied now, just as storage with inert gas. The struggle technics against insects, either with chemical agents, or with irradiation are described. Finally the modalities of technicians formation, specialized in preservation, are discussed [fr

  5. ACHP | Federal Emergency Management Agency Historic Preservation Program

    Science.gov (United States)

    /ehp/hp/fema386-6.shtm FEMA's Historic Preservation Policies and Guidance: http://www.fema.gov /environmental-planning-and-historic-preservation-program/femas-historic-preservation-policies Homeowner Flood Insurance Affordability Act: http://www.fema.gov/media-library/assets/documents/93074 Updated February 8

  6. Quantifying loopy network architectures.

    Directory of Open Access Journals (Sweden)

    Eleni Katifori

    Full Text Available Biology presents many examples of planar distribution and structural networks having dense sets of closed loops. An archetype of this form of network organization is the vasculature of dicotyledonous leaves, which showcases a hierarchically-nested architecture containing closed loops at many different levels. Although a number of approaches have been proposed to measure aspects of the structure of such networks, a robust metric to quantify their hierarchical organization is still lacking. We present an algorithmic framework, the hierarchical loop decomposition, that allows mapping loopy networks to binary trees, preserving in the connectivity of the trees the architecture of the original graph. We apply this framework to investigate computer generated graphs, such as artificial models and optimal distribution networks, as well as natural graphs extracted from digitized images of dicotyledonous leaves and vasculature of rat cerebral neocortex. We calculate various metrics based on the asymmetry, the cumulative size distribution and the Strahler bifurcation ratios of the corresponding trees and discuss the relationship of these quantities to the architectural organization of the original graphs. This algorithmic framework decouples the geometric information (exact location of edges and nodes from the metric topology (connectivity and edge weight and it ultimately allows us to perform a quantitative statistical comparison between predictions of theoretical models and naturally occurring loopy graphs.

  7. 12 CFR 749.4 - Format for vital records preservation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Format for vital records preservation. 749.4... RECORDS PRESERVATION PROGRAM AND APPENDICES-RECORD RETENTION GUIDELINES; CATASTROPHIC ACT PREPAREDNESS GUIDELINES § 749.4 Format for vital records preservation. Preserved records may be in any format that can be...

  8. On orthogonality preserving quadratic stochastic operators

    Energy Technology Data Exchange (ETDEWEB)

    Mukhamedov, Farrukh; Taha, Muhammad Hafizuddin Mohd [Department of Computational and Theoretical Sciences, Faculty of Science International Islamic University Malaysia, P.O. Box 141, 25710 Kuantan, Pahang Malaysia (Malaysia)

    2015-05-15

    A quadratic stochastic operator (in short QSO) is usually used to present the time evolution of differing species in biology. Some quadratic stochastic operators have been studied by Lotka and Volterra. In the present paper, we first give a simple characterization of Volterra QSO in terms of absolutely continuity of discrete measures. Further, we introduce a notion of orthogonal preserving QSO, and describe such kind of operators defined on two dimensional simplex. It turns out that orthogonal preserving QSOs are permutations of Volterra QSO. The associativity of genetic algebras generated by orthogonal preserving QSO is studied too.

  9. On orthogonality preserving quadratic stochastic operators

    International Nuclear Information System (INIS)

    Mukhamedov, Farrukh; Taha, Muhammad Hafizuddin Mohd

    2015-01-01

    A quadratic stochastic operator (in short QSO) is usually used to present the time evolution of differing species in biology. Some quadratic stochastic operators have been studied by Lotka and Volterra. In the present paper, we first give a simple characterization of Volterra QSO in terms of absolutely continuity of discrete measures. Further, we introduce a notion of orthogonal preserving QSO, and describe such kind of operators defined on two dimensional simplex. It turns out that orthogonal preserving QSOs are permutations of Volterra QSO. The associativity of genetic algebras generated by orthogonal preserving QSO is studied too

  10. Normothermic perfusion: a new paradigm for organ preservation.

    Science.gov (United States)

    Brockmann, Jens; Reddy, Srikanth; Coussios, Constantin; Pigott, David; Guirriero, Dino; Hughes, David; Morovat, Alireza; Roy, Debabrata; Winter, Lucy; Friend, Peter J

    2009-07-01

    Transplantation of organs retrieved after cardiac arrest could increase the donor organ supply. However, the combination of warm ischemia and cold preservation is highly detrimental to the reperfused organ. Our objective was to maintain physiological temperature and organ function during preservation and thereby alleviate this injury and allow successful transplantation. We have developed a liver perfusion device that maintains physiological temperature with provision of oxygen and nutrition. Reperfusion experiments suggested that this allows recovery of ischemic damage. In a pig liver transplant model, we compared the outcome following either conventional cold preservation or warm preservation. Preservation periods of 5 and 20 hours and durations of warm ischemia of 40 and 60 minutes were tested. After 20 hours preservation without warm ischemia, post-transplant survival was improved (27%-86%, P = 0.026), with corresponding differences in transaminase levels and histological analysis. With the addition of 40 minutes warm ischemia, the differences were even more marked (cold vs. warm groups 0% vs. 83%, P = 0.001). However, with 60 minutes warm ischemia and 20 hours preservation, there were no survivors. Analysis of hemodynamic and liver function data during perfusion showed several factors to be predictive of posttransplant survival, including bile production, base excess, portal vein flow, and hepatocellular enzymes. Organ preservation by warm perfusion, maintaining physiological pressure and flow parameters, has enabled prolonged preservation and successful transplantation of both normal livers and those with substantial ischemic damage. This technique has the potential to address the shortage of organs for transplantation.

  11. Privacy Preservation in Distributed Subgradient Optimization Algorithms

    OpenAIRE

    Lou, Youcheng; Yu, Lean; Wang, Shouyang

    2015-01-01

    Privacy preservation is becoming an increasingly important issue in data mining and machine learning. In this paper, we consider the privacy preserving features of distributed subgradient optimization algorithms. We first show that a well-known distributed subgradient synchronous optimization algorithm, in which all agents make their optimization updates simultaneously at all times, is not privacy preserving in the sense that the malicious agent can learn other agents' subgradients asymptotic...

  12. Temperature and oxygenation during organ preservation: friends or foes?

    Science.gov (United States)

    Gilbo, Nicholas; Monbaliu, Diethard

    2017-06-01

    The liberalization of donor selection criteria in organ transplantation, with the increased use of suboptimal grafts, has stimulated interest in ischemia-reperfusion injury prevention and graft reconditioning. Organ preservation technologies are changing considerably, mostly through the reintroduction of dynamic machine preservation. Here, we review the current evidence on the role of temperature and oxygenation during dynamic machine preservation. A large but complex body of evidence exists and comparative studies are few. Oxygenation seems to support an advantageous effect in hypothermic machine preservation and is mandatory in normothermic machine preservation, although in the latter, supraphysiological oxygen tensions should be avoided. High-risk grafts, such as suboptimal organs, may optimally benefit from oxygenated perfusion conditions that support metabolism and activate mechanisms of repair such as subnormothermic machine preservation, controlled oxygenated rewarming, and normothermic machine preservation. For lower risk grafts, oxygenation during hypothermic machine preservation may sufficiently reduce injuries and recharge the cellular energy to secure functional recovery after transplantation. The relationship between temperature and oxygenation in organ preservation is more complex than physiological laws would suggest. Rather than one default perfusion temperature/oxygenation standard, perfusion protocols should be tailored for specific needs of grafts of different quality.

  13. Archiving Software Systems: Approaches to Preserve Computational Capabilities

    Science.gov (United States)

    King, T. A.

    2014-12-01

    A great deal of effort is made to preserve scientific data. Not only because data is knowledge, but it is often costly to acquire and is sometimes collected under unique circumstances. Another part of the science enterprise is the development of software to process and analyze the data. Developed software is also a large investment and worthy of preservation. However, the long term preservation of software presents some challenges. Software often requires a specific technology stack to operate. This can include software, operating systems and hardware dependencies. One past approach to preserve computational capabilities is to maintain ancient hardware long past its typical viability. On an archive horizon of 100 years, this is not feasible. Another approach to preserve computational capabilities is to archive source code. While this can preserve details of the implementation and algorithms, it may not be possible to reproduce the technology stack needed to compile and run the resulting applications. This future forward dilemma has a solution. Technology used to create clouds and process big data can also be used to archive and preserve computational capabilities. We explore how basic hardware, virtual machines, containers and appropriate metadata can be used to preserve computational capabilities and to archive functional software systems. In conjunction with data archives, this provides scientist with both the data and capability to reproduce the processing and analysis used to generate past scientific results.

  14. Area-preserving diffeomorphisms and higher-spin algebras

    Energy Technology Data Exchange (ETDEWEB)

    Bergshoeff, E [European Organization for Nuclear Research, Geneva (Switzerland). Theory Div.; Blencowe, M P; Stelle, K S [Imperial Coll. of Science and Technology, London (UK). Blackett Lab.

    1990-03-01

    We show that there exists a one-parameter family of infinite-dimensional algebras that includes the bosonic d=3 Fradkin-Vasiliev higher-spin algebra and the non-Euclidean version of the algebra of area-preserving diffeomorphisms of the two-sphere S{sup 2} as two distinct members. The non-Euclidean version of the area preserving algebra corresponds to the algebra of area-preserving diffeomorphisms of the hyperbolic space S{sup 1,1}, and can be rewritten as lim{sub Nyieldsinfinity} su(N,N). As an application of our results, we formulate a new d=2+1 massless higher-spin field theory as the gauge theory of the area-preserving diffeomorphisms of S{sup 1,1}. (orig.).

  15. Film sound in preservation and presentation

    NARCIS (Netherlands)

    Campanini, S.

    2014-01-01

    What is the nature of film sound? How does it change through time? How can film sound be conceptually defined? To address these issues, this work assumes the perspective of film preservation and presentation practices, describing the preservation of early sound systems, as well as the presentation

  16. 7 CFR 782.14 - Identity preservation.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Identity preservation. 782.14 Section 782.14 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF... § 782.14 Identity preservation. (a) The importer and all subsequent buyers of the imported wheat shall...

  17. 20 CFR 638.304 - Historical preservation.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Historical preservation. 638.304 Section 638.304 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR JOB CORPS PROGRAM... § 638.304 Historical preservation. The Job Corps Director shall review the “National Register of...

  18. Real-time-service-based Distributed Scheduling Scheme for IEEE 802.16j Networks

    OpenAIRE

    Kuo-Feng Huang; Shih-Jung Wu

    2013-01-01

    Supporting Quality of Service (QoS) guarantees for diverse multimedia services is the primary concern for IEEE802.16j networks. A scheduling scheme that satisfies the QoS requirements has become more important for wireless communications. We proposed an adaptive nontransparent-based distributed scheduling scheme (ANDS) for IEEE 802.16j networks. ANDS comprises three major components: Priority Assignment, Resource Allocation, Preserved Bandwidth Adjustment. Different service-type connections p...

  19. A Neural-Network Clustering-Based Algorithm for Privacy Preserving Data Mining

    Science.gov (United States)

    Tsiafoulis, S.; Zorkadis, V. C.; Karras, D. A.

    The increasing use of fast and efficient data mining algorithms in huge collections of personal data, facilitated through the exponential growth of technology, in particular in the field of electronic data storage media and processing power, has raised serious ethical, philosophical and legal issues related to privacy protection. To cope with these concerns, several privacy preserving methodologies have been proposed, classified in two categories, methodologies that aim at protecting the sensitive data and those that aim at protecting the mining results. In our work, we focus on sensitive data protection and compare existing techniques according to their anonymity degree achieved, the information loss suffered and their performance characteristics. The ℓ-diversity principle is combined with k-anonymity concepts, so that background information can not be exploited to successfully attack the privacy of data subjects data refer to. Based on Kohonen Self Organizing Feature Maps (SOMs), we firstly organize data sets in subspaces according to their information theoretical distance to each other, then create the most relevant classes paying special attention to rare sensitive attribute values, and finally generalize attribute values to the minimum extend required so that both the data disclosure probability and the information loss are possibly kept negligible. Furthermore, we propose information theoretical measures for assessing the anonymity degree achieved and empirical tests to demonstrate it.

  20. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for Children Diagnosed with Cancer Ask Your Doctor Information for ...

  1. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for Children Diagnosed with Cancer Ask Your Doctor Information for Patients Many adult ...

  2. Utility-preserving anonymization for health data publishing.

    Science.gov (United States)

    Lee, Hyukki; Kim, Soohyung; Kim, Jong Wook; Chung, Yon Dohn

    2017-07-11

    Publishing raw electronic health records (EHRs) may be considered as a breach of the privacy of individuals because they usually contain sensitive information. A common practice for the privacy-preserving data publishing is to anonymize the data before publishing, and thus satisfy privacy models such as k-anonymity. Among various anonymization techniques, generalization is the most commonly used in medical/health data processing. Generalization inevitably causes information loss, and thus, various methods have been proposed to reduce information loss. However, existing generalization-based data anonymization methods cannot avoid excessive information loss and preserve data utility. We propose a utility-preserving anonymization for privacy preserving data publishing (PPDP). To preserve data utility, the proposed method comprises three parts: (1) utility-preserving model, (2) counterfeit record insertion, (3) catalog of the counterfeit records. We also propose an anonymization algorithm using the proposed method. Our anonymization algorithm applies full-domain generalization algorithm. We evaluate our method in comparison with existence method on two aspects, information loss measured through various quality metrics and error rate of analysis result. With all different types of quality metrics, our proposed method show the lower information loss than the existing method. In the real-world EHRs analysis, analysis results show small portion of error between the anonymized data through the proposed method and original data. We propose a new utility-preserving anonymization method and an anonymization algorithm using the proposed method. Through experiments on various datasets, we show that the utility of EHRs anonymized by the proposed method is significantly better than those anonymized by previous approaches.

  3. Increasing Scalability of Researcher Network Extraction from the Web

    Science.gov (United States)

    Asada, Yohei; Matsuo, Yutaka; Ishizuka, Mitsuru

    Social networks, which describe relations among people or organizations as a network, have recently attracted attention. With the help of a social network, we can analyze the structure of a community and thereby promote efficient communications within it. We investigate the problem of extracting a network of researchers from the Web, to assist efficient cooperation among researchers. Our method uses a search engine to get the cooccurences of names of two researchers and calculates the streangth of the relation between them. Then we label the relation by analyzing the Web pages in which these two names cooccur. Research on social network extraction using search engines as ours, is attracting attention in Japan as well as abroad. However, the former approaches issue too many queries to search engines to extract a large-scale network. In this paper, we propose a method to filter superfluous queries and facilitates the extraction of large-scale networks. By this method we are able to extract a network of around 3000-nodes. Our experimental results show that the proposed method reduces the number of queries significantly while preserving the quality of the network as compared to former methods.

  4. Preservative-free treatment in glaucoma: who, when, and why.

    Science.gov (United States)

    Stalmans, Ingeborg; Sunaric Mégevand, Gordana; Cordeiro, M Francesca; Hommer, Anton; Rossetti, Luca; Goñi, Francisco; Heijl, Anders; Bron, Alain

    2013-01-01

    To review and summarize the available literature on the effect of preservatives on the eye, to provide practical guidance for the clinical assessment of the ocular surface in glaucoma patients, and to define patient populations that might benefit from preservative-free topical intraocular pressure (IOP)-lowering agents. This manuscript is based on a combination of a literature review on preservatives and the eye and expert opinion from glaucoma specialists with an interest in ocular surface disease. There is an increasingly recognized association between eyedrop preservatives and ocular surface disease. Preservative-free therapy is now available for a wide range of active compounds, although there are still some misconceptions regarding their appropriate use. For patients treated topically for glaucoma or ocular hypertension, a rough estimate could be that 20% may need treatment with topical IOP-reducing agents that are free from preservatives. This review provides an up-to-date account of the literature regarding preservatives and the eye, as well as suggestions and recommendations on to when to use preservative-free antiglaucoma treatment.

  5. Status of iodine in formaldehyde-preserved milk - revisited

    International Nuclear Information System (INIS)

    Montgomery, D.M.; Gibson, J.E.

    1977-01-01

    The results of an investigation into the effect of formaldehyde preservation of raw milk in view of the differences observed by Murthy (J. Dairy Sci.; 45:1066 (1962) and J. Dairy Sci.; 49:1190 (1966)) and Thomas (personal communication. (1976)) are reported. The use of the specific electrode method for iodine analysis of formaldehyde-preserved milk has also been investigated. It was found that the Thomas preservation technique for 4 litre milk samples for 131 I analysis was acceptable, and an aliquot of the formaldehyde-preserved milk can be analyzed for total iodide concentration by the electrode method. Milk samples may also be preserved for stable iodide measurement (without iodide carrier addition) by addition of formaldehyde at 0.5 M concentration. (U.K.)

  6. QL-MAC : a Q-learning based MAC for wireless sensor networks

    NARCIS (Netherlands)

    Galzarano, S.; Liotta, A.; Fortino, G.; Aversa, R.; Kolodziej, J.; Zhang, J.; Amato, F.; Fortino, G.

    2013-01-01

    WSNs are becoming an increasingly attractive technology thanks to the significant benefits they can offer to a wide range of application domains. Extending the system lifetime while preserving good network performance is one of the main challenges in WSNs. In this paper, a novel MAC protocol

  7. Broadband phase-preserved optical elevator

    OpenAIRE

    Luo, Yuan; Han, Tiancheng; Zhang, Baile; Qiu, Cheng-Wei; Barbastathis, George

    2011-01-01

    Phase-preserved optical elevator is an optical device to lift up an entire plane virtually without distortion in light path or phase. Using transformation optics, we have predicted and observed the realization of such a broadband phase-preserved optical elevator, made of a natural homogeneous birefringent crystal without resorting to absorptive and narrowband metamaterials involving time-consuming nano-fabrication. In our demonstration, the optical elevator is designed to lift a sheet upwards...

  8. Privacy-Preserving Task Assignment in Spatial Crowdsourcing

    KAUST Repository

    Liu, An

    2017-09-20

    With the progress of mobile devices and wireless networks, spatial crowdsourcing (SC) is emerging as a promising approach for problem solving. In SC, spatial tasks are assigned to and performed by a set of human workers. To enable effective task assignment, however, both workers and task requesters are required to disclose their locations to untrusted SC systems. In this paper, we study the problem of assigning workers to tasks in a way that location privacy for both workers and task requesters is preserved. We first combine the Paillier cryptosystem with Yao’s garbled circuits to construct a secure protocol that assigns the nearest worker to a task. Considering that this protocol cannot scale to a large number of workers, we then make use of Geohash, a hierarchical spatial index to design a more efficient protocol that can securely find approximate nearest workers. We theoretically show that these two protocols are secure against semi-honest adversaries. Through extensive experiments on two real-world datasets, we demonstrate the efficiency and effectiveness of our protocols.

  9. Direct-to-PCR tissue preservation for DNA profiling.

    Science.gov (United States)

    Sorensen, Amy; Berry, Clare; Bruce, David; Gahan, Michelle Elizabeth; Hughes-Stamm, Sheree; McNevin, Dennis

    2016-05-01

    Disaster victim identification (DVI) often occurs in remote locations with extremes of temperatures and humidities. Access to mortuary facilities and refrigeration are not always available. An effective and robust DNA sampling and preservation procedure would increase the probability of successful DNA profiling and allow faster repatriation of bodies and body parts. If the act of tissue preservation also released DNA into solution, ready for polymerase chain reaction (PCR), the DVI process could be further streamlined. In this study, we explored the possibility of obtaining DNA profiles without DNA extraction, by adding aliquots of preservative solutions surrounding fresh human muscle and decomposing human muscle and skin tissue samples directly to PCR. The preservatives consisted of two custom preparations and two proprietary solutions. The custom preparations were a salt-saturated solution of dimethyl sulfoxide (DMSO) with ethylenediaminetetraacetic (EDTA) and TENT buffer (Tris, EDTA, NaCl, Tween 20). The proprietary preservatives were DNAgard (Biomatrica(®)) and Tissue Stabilising Kit (DNA Genotek). We obtained full PowerPlex(®) 21 (Promega) and GlobalFiler(®) (Life Technologies) DNA profiles from fresh and decomposed tissue preserved at 35 °C for up to 28 days for all four preservatives. The preservative aliquots removed from the fresh muscle tissue samples had been stored at -80 °C for 4 years, indicating that long-term archival does not diminish the probability of successful DNA typing. Rather, storage at -80 °C seems to reduce PCR inhibition.

  10. Temporal correlation coefficient for directed networks.

    Science.gov (United States)

    Büttner, Kathrin; Salau, Jennifer; Krieter, Joachim

    2016-01-01

    Previous studies dealing with network theory focused mainly on the static aggregation of edges over specific time window lengths. Thus, most of the dynamic information gets lost. To assess the quality of such a static aggregation the temporal correlation coefficient can be calculated. It measures the overall possibility for an edge to persist between two consecutive snapshots. Up to now, this measure is only defined for undirected networks. Therefore, we introduce the adaption of the temporal correlation coefficient to directed networks. This new methodology enables the distinction between ingoing and outgoing edges. Besides a small example network presenting the single calculation steps, we also calculated the proposed measurements for a real pig trade network to emphasize the importance of considering the edge direction. The farm types at the beginning of the pork supply chain showed clearly higher values for the outgoing temporal correlation coefficient compared to the farm types at the end of the pork supply chain. These farm types showed higher values for the ingoing temporal correlation coefficient. The temporal correlation coefficient is a valuable tool to understand the structural dynamics of these systems, as it assesses the consistency of the edge configuration. The adaption of this measure for directed networks may help to preserve meaningful additional information about the investigated network that might get lost if the edge directions are ignored.

  11. Ex-vivo machine perfusion for kidney preservation.

    Science.gov (United States)

    Hamar, Matyas; Selzner, Markus

    2018-06-01

    Machine perfusion is a novel strategy to decrease preservation injury, improve graft assessment, and increase organ acceptance for transplantation. This review summarizes the current advances in ex-vivo machine-based kidney preservation technologies over the last year. Ex-vivo perfusion technologies, such as hypothermic and normothermic machine perfusion and controlled oxygenated rewarming, have gained high interest in the field of organ preservation. Keeping kidney grafts functionally and metabolically active during the preservation period offers a unique chance for viability assessment, reconditioning, and organ repair. Normothermic ex-vivo kidney perfusion has been recently translated into clinical practice. Preclinical results suggest that prolonged warm perfusion appears superior than a brief end-ischemic reconditioning in terms of renal function and injury. An established standardized protocol for continuous warm perfusion is still not available for human grafts. Ex-vivo machine perfusion represents a superior organ preservation method over static cold storage. There is still an urgent need for the optimization of the perfusion fluid and machine technology and to identify the optimal indication in kidney transplantation. Recent research is focusing on graft assessment and therapeutic strategies.

  12. Cascade phenomenon against subsequent failures in complex networks

    Science.gov (United States)

    Jiang, Zhong-Yuan; Liu, Zhi-Quan; He, Xuan; Ma, Jian-Feng

    2018-06-01

    Cascade phenomenon may lead to catastrophic disasters which extremely imperil the network safety or security in various complex systems such as communication networks, power grids, social networks and so on. In some flow-based networks, the load of failed nodes can be redistributed locally to their neighboring nodes to maximally preserve the traffic oscillations or large-scale cascading failures. However, in such local flow redistribution model, a small set of key nodes attacked subsequently can result in network collapse. Then it is a critical problem to effectively find the set of key nodes in the network. To our best knowledge, this work is the first to study this problem comprehensively. We first introduce the extra capacity for every node to put up with flow fluctuations from neighbors, and two extra capacity distributions including degree based distribution and average distribution are employed. Four heuristic key nodes discovering methods including High-Degree-First (HDF), Low-Degree-First (LDF), Random and Greedy Algorithms (GA) are presented. Extensive simulations are realized in both scale-free networks and random networks. The results show that the greedy algorithm can efficiently find the set of key nodes in both scale-free and random networks. Our work studies network robustness against cascading failures from a very novel perspective, and methods and results are very useful for network robustness evaluations and protections.

  13. Historic Preservation Vocabulary, Designations, and Resources

    Science.gov (United States)

    Williams, Stacy D.

    2011-01-01

    Preservationists use a common language that had its beginnings in the National Historic Preservation Act of 1966. This act created the Secretary of the Interior's Standards for the Treatment of Historic Properties, which defined the terms and treatments that have become the standard for preservation projects and plans. These terms have been used…

  14. Bridging online and offline social networks: Multiplex analysis

    Science.gov (United States)

    Filiposka, Sonja; Gajduk, Andrej; Dimitrova, Tamara; Kocarev, Ljupco

    2017-04-01

    We show that three basic actor characteristics, namely normalized reciprocity, three cycles, and triplets, can be expressed using an unified framework that is based on computing the similarity index between two sets associated with the actor: the set of her/his friends and the set of those considering her/him as a friend. These metrics are extended to multiplex networks and then computed for two friendship networks generated by collecting data from two groups of undergraduate students. We found that in offline communication strong and weak ties are (almost) equally presented, while in online communication weak ties are dominant. Moreover, weak ties are much less reciprocal than strong ties. However, across different layers of the multiplex network reciprocities are preserved, while triads (measured with normalized three cycles and triplets) are not significant.

  15. [Importance of preservation of biophysical organization of isolated mitochondria for revealing physiological regulation of their functions].

    Science.gov (United States)

    Zakharchenko, M V; Khunderiakova, N V; Kondrashova, M N

    2011-01-01

    A method has been elaborated that preserves the mitochondrial-reticular network in lymphocytes in composition to the physiological one. Physiologicalby the immobilization of a blood smear on glass and its subsequent incubation in a medium closeresponses of respiration to excitation in the ition of early responses of ions. The recogn organism are well pronounced on these preparat mitochondria to pathogenic agents in the organism is a timely problem of basic and medicinal e- investigations since they play a leading role in the development of pathological states.

  16. Fossil preservation and the stratigraphic ranges of taxa

    Science.gov (United States)

    Foote, M.; Raup, D. M.

    1996-01-01

    The incompleteness of the fossil record hinders the inference of evolutionary rates and patterns. Here, we derive relationships among true taxonomic durations, preservation probability, and observed taxonomic ranges. We use these relationships to estimate original distributions of taxonomic durations, preservation probability, and completeness (proportion of taxa preserved), given only the observed ranges. No data on occurrences within the ranges of taxa are required. When preservation is random and the original distribution of durations is exponential, the inference of durations, preservability, and completeness is exact. However, reasonable approximations are possible given non-exponential duration distributions and temporal and taxonomic variation in preservability. Thus, the approaches we describe have great potential in studies of taphonomy, evolutionary rates and patterns, and genealogy. Analyses of Upper Cambrian-Lower Ordovician trilobite species, Paleozoic crinoid genera, Jurassic bivalve species, and Cenozoic mammal species yield the following results: (1) The preservation probability inferred from stratigraphic ranges alone agrees with that inferred from the analysis of stratigraphic gaps when data on the latter are available. (2) Whereas median durations based on simple tabulations of observed ranges are biased by stratigraphic resolution, our estimates of median duration, extinction rate, and completeness are not biased.(3) The shorter geologic ranges of mammalian species relative to those of bivalves cannot be attributed to a difference in preservation potential. However, we cannot rule out the contribution of taxonomic practice to this difference. (4) In the groups studied, completeness (proportion of species [trilobites, bivalves, mammals] or genera [crinoids] preserved) ranges from 60% to 90%. The higher estimates of completeness at smaller geographic scales support previous suggestions that the incompleteness of the fossil record reflects loss of

  17. Preservation theorems on finite structures

    International Nuclear Information System (INIS)

    Hebert, M.

    1994-09-01

    This paper concerns classical Preservation results applied to finite structures. We consider binary relations for which a strong form of preservation theorem (called strong interpolation) exists in the usual case. This includes most classical cases: embeddings, extensions, homomorphisms into and onto, sandwiches, etc. We establish necessary and sufficient syntactic conditions for the preservation theorems for sentences and for theories to hold in the restricted context of finite structures. We deduce that for all relations above, the restricted theorem for theories hold provided the language is finite. For the sentences the restricted version fails in most cases; in fact the ''homomorphism into'' case seems to be the only possible one, but the efforts to show that have failed. We hope our results may help to solve this frustrating problem; in the meantime, they are used to put a lower bound on the level of complexity of potential counterexamples. (author). 8 refs

  18. A Survey on Multimedia-Based Cross-Layer Optimization in Visual Sensor Networks

    Science.gov (United States)

    Costa, Daniel G.; Guedes, Luiz Affonso

    2011-01-01

    Visual sensor networks (VSNs) comprised of battery-operated electronic devices endowed with low-resolution cameras have expanded the applicability of a series of monitoring applications. Those types of sensors are interconnected by ad hoc error-prone wireless links, imposing stringent restrictions on available bandwidth, end-to-end delay and packet error rates. In such context, multimedia coding is required for data compression and error-resilience, also ensuring energy preservation over the path(s) toward the sink and improving the end-to-end perceptual quality of the received media. Cross-layer optimization may enhance the expected efficiency of VSNs applications, disrupting the conventional information flow of the protocol layers. When the inner characteristics of the multimedia coding techniques are exploited by cross-layer protocols and architectures, higher efficiency may be obtained in visual sensor networks. This paper surveys recent research on multimedia-based cross-layer optimization, presenting the proposed strategies and mechanisms for transmission rate adjustment, congestion control, multipath selection, energy preservation and error recovery. We note that many multimedia-based cross-layer optimization solutions have been proposed in recent years, each one bringing a wealth of contributions to visual sensor networks. PMID:22163908

  19. Knowledge preservation strategies for nuclear power plants

    International Nuclear Information System (INIS)

    Koruna, S.; Bachmann, H.

    2004-01-01

    The nuclear industry is currently facing several challenges. An internal threat to the safety and operations of nuclear power plants is the loss of those employees who hold knowledge that is either critical to operations or safety. This report discusses the possibilities to preserve knowledge in nuclear power plants. Dependent on the degree of tacitness two different knowledge preservation strategies can be discerned: personalization and codification. The knowledge preservation activities discussed are valued according to the criteria: cost, immediacy of availability and completeness

  20. Preservation Benefits Geoscientific Investigations Across the Nation

    Science.gov (United States)

    Powers, L. A.; Latysh, N.

    2017-12-01

    Since 2005, the National Geological and Geophysical Data Preservation Program (NGGDPP) of the U.S. Geological Survey (USGS) has distributed financial grants to state geological surveys to preserve, archive, and make available valuable geoscientific samples and data to researchers and the public. States have cataloged and preserved materials that include geophysical logs, geotechnical reports, fragile historical documents, maps, geologic samples, and legacy aerial and field-investigation photographs. Approximately 3 million metadata records describing preserved data and artifacts are cataloged in the National Digital Catalog, a component of the USGS ScienceBase data management infrastructure. Providing a centralized domain in the National Digital Catalog for uniformly described records has enabled discovery of important geoscientific assets across the Nation. Scientific investigations continue to be informed by preserved materials and data. Tennessee Geological Survey's preserved collection of historical documents describing coal mining activities in the State was used to identify vulnerable areas overlying abandoned underground coal mines, which caused surface collapses and sinkholes in populated areas. Missouri Geological Survey's preserved collection of legacy field notebooks was used to identify thousands of abandoned mines, many of which have significant soil or groundwater lead contamination and are located in areas that now have residential development. The information enabled the evaluation of risk to human health, environment, and infrastructure and identification of needed remedial actions. Information in the field notebooks also assisted the Missouri Department of Transportation responding to highway collapses and assessing collapse potential in abandoned coal mining lands. Digitization of natural gamma ray logs allowed Minnesota Geological Survey staff to directly access well data in the field, accelerating the ability to address geoscientific questions

  1. The modelling of a digital forensic readiness approach for wireless local area networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2012-06-01

    Full Text Available generated by the mobile stations and to conduct a proper digital forensic investigation. This paper attempts to address this issue by proposing a wireless digital forensic readiness model designed to monitor, log and preserve wireless network traffic...

  2. Data Preservation in High Energy Physics

    International Nuclear Information System (INIS)

    Mount, Richard; Brooks, Travis; Le Diberder, Francois; Dubois-Felsmann, Gregory; Neal, Homer; Bellis, Matt; Boehnlein, Amber; Votava, Margaret; White, Vicky; Wolbers, Stephen; Konigsberg, Jacobo; Roser, Robert; Snider, Rick; Lucchesi, Donatella; Denisov, Dmitri; Soldner-Rembold, Stefan; Li, Qizhong; Varnes, Erich; Jonckheere, Alan; Gasthuber, Martin; Gulzow, Volker

    2009-01-01

    Data from high-energy physics (HEP) experiments are collected with significant financial and human effort and are mostly unique. At the same time, HEP has no coherent strategy for data preservation and re-use. An inter-experimental Study Group on HEP data preservation and long-term analysis was convened at the end of 2008 and held two workshops, at DESY (January 2009) and SLAC (May 2009). This document is an intermediate report to the International Committee for Future Accelerators (ICFA) of the reflections of this Study Group. Large data sets accumulated during many years of detector operation at particle accelerators are the heritage of experimental HEP. These data sets offer unique opportunities for future scientific studies, sometimes long after the shut-down of the actual experiments: new theoretical input; new experimental results and analysis techniques; the quest for high-sensitivity combined analyses; the necessity of cross checks. In many cases, HEP data sets are unique; they cannot and most likely will not be superseded by data from newer generations of experiments. Once lost, or in an unusable state, HEP data samples cannot be reasonably recovered. The cost of conserving this heritage through a collaborative, target-oriented long-term data preservation program would be small, compared to the costs of past experimental projects or to the efforts to re-do experiments. However, this cost is not negligible, especially for collaborations close or past their end-date. The preservation of HEP data would provide today's collaborations with a secure way to complete their data analysis and enable them to seize new scientific opportunities in the coming years. The HEP community will benefit from preserved data samples through reanalysis, combination, education and outreach. Funding agencies would receive more scientific return, and a positive image, from their initial investment leading to the production and the first analysis of preserved data.

  3. Data Preservation in High Energy Physics

    Energy Technology Data Exchange (ETDEWEB)

    Mount, Richard; Brooks, Travis; /SLAC; Le Diberder, Francois; /Orsay, LAL; Dubois-Felsmann, Gregory; Neal, Homer; /SLAC; Bellis, Matt; /Stanford U.; Boehnlein, Amber; Votava, Margaret; White, Vicky; Wolbers, Stephen; /Fermilab; Konigsberg, Jacobo; /Florida U.; Roser, Robert; Snider, Rick; /Fermilab; Lucchesi, Donatella; /INFN, Padua; Denisov, Dmitri; /Fermilab; Soldner-Rembold, Stefan; /Manchester U.; Li, Qizhong; /Fermilab; Varnes, Erich; /Arizona U.; Jonckheere, Alan; /Fermilab; Gasthuber, Martin; Gulzow, Volker; /DESY /Marseille, CPPM /Dortmund U. /DESY /Gent U. /DESY, Zeuthen /KEK, Tsukuba /CC, Villeurbanne /CERN /INFN, Bari /Gjovik Coll. Engineering /Karlsruhe, Forschungszentrum /Beijing, Inst. High Energy Phys. /Carleton U. /Cornell U. /Rutherford

    2012-04-03

    Data from high-energy physics (HEP) experiments are collected with significant financial and human effort and are mostly unique. At the same time, HEP has no coherent strategy for data preservation and re-use. An inter-experimental Study Group on HEP data preservation and long-term analysis was convened at the end of 2008 and held two workshops, at DESY (January 2009) and SLAC (May 2009). This document is an intermediate report to the International Committee for Future Accelerators (ICFA) of the reflections of this Study Group. Large data sets accumulated during many years of detector operation at particle accelerators are the heritage of experimental HEP. These data sets offer unique opportunities for future scientific studies, sometimes long after the shut-down of the actual experiments: new theoretical input; new experimental results and analysis techniques; the quest for high-sensitivity combined analyses; the necessity of cross checks. In many cases, HEP data sets are unique; they cannot and most likely will not be superseded by data from newer generations of experiments. Once lost, or in an unusable state, HEP data samples cannot be reasonably recovered. The cost of conserving this heritage through a collaborative, target-oriented long-term data preservation program would be small, compared to the costs of past experimental projects or to the efforts to re-do experiments. However, this cost is not negligible, especially for collaborations close or past their end-date. The preservation of HEP data would provide today's collaborations with a secure way to complete their data analysis and enable them to seize new scientific opportunities in the coming years. The HEP community will benefit from preserved data samples through reanalysis, combination, education and outreach. Funding agencies would receive more scientific return, and a positive image, from their initial investment leading to the production and the first analysis of preserved data.

  4. Knowledge preservation in the nuclear industry

    International Nuclear Information System (INIS)

    Yanev, Y.

    2004-01-01

    The paper presents examples of knowledge loss in different areas related to attrition, retirements or layoff as well as the consequences of the loss of knowledge. The nature of the so called tacit knowledge and its role as a barrier to knowledge preservation is discussed. Strategies for knowledge preservation in the nuclear industry are presented

  5. Efficacy of copper borax preservative against wood decay

    Science.gov (United States)

    William Abbott; Bessie Woodward; Michael West

    2001-01-01

    In this study, a wood preservative containing active ingredients of 43.5% borax and 3.1% copper hydroxide was evaluated in soil-block tests in accordance with AWPA E10. Results suggested thatthe copper hydroxide was not contributing to fungal toxicity at preservative threshold levels. Thresholds determined for this preservative were very close to those previously...

  6. LARGE-SCALE TOPOLOGICAL PROPERTIES OF MOLECULAR NETWORKS.

    Energy Technology Data Exchange (ETDEWEB)

    MASLOV,S.SNEPPEN,K.

    2003-11-17

    Bio-molecular networks lack the top-down design. Instead, selective forces of biological evolution shape them from raw material provided by random events such as gene duplications and single gene mutations. As a result individual connections in these networks are characterized by a large degree of randomness. One may wonder which connectivity patterns are indeed random, while which arose due to the network growth, evolution, and/or its fundamental design principles and limitations? Here we introduce a general method allowing one to construct a random null-model version of a given network while preserving the desired set of its low-level topological features, such as, e.g., the number of neighbors of individual nodes, the average level of modularity, preferential connections between particular groups of nodes, etc. Such a null-model network can then be used to detect and quantify the non-random topological patterns present in large networks. In particular, we measured correlations between degrees of interacting nodes in protein interaction and regulatory networks in yeast. It was found that in both these networks, links between highly connected proteins are systematically suppressed. This effect decreases the likelihood of cross-talk between different functional modules of the cell, and increases the overall robustness of a network by localizing effects of deleterious perturbations. It also teaches us about the overall computational architecture of such networks and points at the origin of large differences in the number of neighbors of individual nodes.

  7. Quantifying the dynamics of coupled networks of switches and oscillators.

    Directory of Open Access Journals (Sweden)

    Matthew R Francis

    Full Text Available Complex network dynamics have been analyzed with models of systems of coupled switches or systems of coupled oscillators. However, many complex systems are composed of components with diverse dynamics whose interactions drive the system's evolution. We, therefore, introduce a new modeling framework that describes the dynamics of networks composed of both oscillators and switches. Both oscillator synchronization and switch stability are preserved in these heterogeneous, coupled networks. Furthermore, this model recapitulates the qualitative dynamics for the yeast cell cycle consistent with the hypothesized dynamics resulting from decomposition of the regulatory network into dynamic motifs. Introducing feedback into the cell-cycle network induces qualitative dynamics analogous to limitless replicative potential that is a hallmark of cancer. As a result, the proposed model of switch and oscillator coupling provides the ability to incorporate mechanisms that underlie the synchronized stimulus response ubiquitous in biochemical systems.

  8. Optimal traffic control in highway transportation networks using linear programming

    KAUST Repository

    Li, Yanning

    2014-06-01

    This article presents a framework for the optimal control of boundary flows on transportation networks. The state of the system is modeled by a first order scalar conservation law (Lighthill-Whitham-Richards PDE). Based on an equivalent formulation of the Hamilton-Jacobi PDE, the problem of controlling the state of the system on a network link in a finite horizon can be posed as a Linear Program. Assuming all intersections in the network are controllable, we show that the optimization approach can be extended to an arbitrary transportation network, preserving linear constraints. Unlike previously investigated transportation network control schemes, this framework leverages the intrinsic properties of the Halmilton-Jacobi equation, and does not require any discretization or boolean variables on the link. Hence this framework is very computational efficient and provides the globally optimal solution. The feasibility of this framework is illustrated by an on-ramp metering control example.

  9. Contact allergy to preservatives in patients with occupational contact dermatitis and exposure analysis of preservatives in registered chemical products for occupational use.

    Science.gov (United States)

    Schwensen, Jakob Ferløv; Friis, Ulrik Fischer; Menné, Torkil; Flyvholm, Mari-Ann; Johansen, Jeanne Duus

    2017-05-01

    The aim of the study is to investigate risk factors for sensitization to preservatives and to examine to which extent different preservatives are registered in chemical products for occupational use in Denmark. A retrospective epidemiological observational analysis of data from a university hospital was conducted. All patients had occupational contact dermatitis and were consecutively patch tested with 11 preservatives from the European baseline series and extended patch test series during a 5-year period: 2009-2013. Information regarding the same preservatives in chemical products for occupational use ('substances and materials') registered in the Danish Product Register Database (PROBAS) was obtained. The frequency of preservative contact allergy was 14.2% (n = 141) in 995 patients with occupational contact dermatitis. Patients with preservative contact allergy had significantly more frequently facial dermatitis (19.9 versus 13.1%) and age > 40 years (71.6 versus 45.8%) than patients without preservative contact allergy, whereas atopic dermatitis was less frequently observed (12.1 versus 19.8%). Preservative contact allergy was more frequent in painters with occupational contact dermatitis as compared to non-painters with occupational contact dermatitis (p contact allergy to methylisothiazolinone and contact allergy to formaldehyde. Analysis of the registered substances and materials in PROBAS revealed that preservatives occurred in several product categories, e.g., 'paints and varnishes', 'cleaning agents', 'cooling agents', and 'polishing agents'. Formaldehyde and isothiazolinones were extensively registered in PROBAS. The extensive use of formaldehyde and isothiazolinones in chemical products for occupational use may be problematic for the worker. Appropriate legislation, substitution, and employee education should be prioritized.

  10. Privacy-Preserving Smart Metering with Authentication in a Smart Grid

    Directory of Open Access Journals (Sweden)

    Jun Beom Hur

    2015-12-01

    Full Text Available The traditional security objectives of smart grids have been availability, integrity, and confidentiality. However, as the grids incorporate smart metering and load management, user and corporate privacy is increasingly becoming an issue in smart grid networks. Although transmitting current power consumption levels to the supplier or utility from each smart meter at short intervals has an advantage for the electricity supplier’s planning and management purposes, it threatens user privacy by disclosing fine-grained consumption data and usage behavior to utility providers. In this study, we propose a distributed incremental data aggregation scheme where all smart meters on an aggregation path are involved in routing the data from the source meter to the collection unit. User privacy is preserved by symmetric homomorphic encryption, which allows smart meters to participate in the aggregation without seeing any intermediate or final result. Aggregated data is further integrated with an aggregate signature to achieve data integrity and smart meter authentication in such a way that dishonest or fake smart meters cannot falsify data en route. Only the collection unit can obtain the aggregated data and verify its integrity while the individual plain data are not exposed to the collection unit. Therefore, user privacy and security are improved for the smart metering in a smart grid network.

  11. In Vivo Effects of Preservative-free and Preserved Prostaglandin Analogs: Mouse Ocular Surface Study.

    Science.gov (United States)

    Kim, Jee Hyun; Kim, Eun Joo; Kim, Yeoun-Hee; Kim, Yong Il; Lee, Se-Hyung; Jung, Jae-Chang; Lee, Kyoo Won; Park, Young Jeung

    2015-08-01

    Chronic use of topical hypotensive agents induces several side effects caused by preservatives. The purpose of this study was to evaluate the effects of prostaglandin analogs with varying concentrations of benzalkonium chloride (BAC), preservative-free (PF), and alternative preservatives on mouse corneal tissue. Thirty-five, 8- to 10-week-old female C57BL/6 mice (five mice for each group) were used for this study. To the control group, we applied normal saline, and to each drug-treated group we applied 0.02% BAC, bimatoprost 0.01% (with BAC 0.02%), latanoprost 0.005% (with BAC 0.02%), travoprost 0.004% (with 0.001% polyquad) or tafluprost 0.0015% with/without 0.001% BAC, once a day (9 p.m.) for 4 weeks. Corneal fluorescein staining was evaluated in all groups. After harvest, the corneal tissues were embedded in paraffin and then Hematoxylin-Eosin stain was performed for histopathological examination. Immunofluorescence staining was done against TNF-α, IL-6, HLA DR, pJNK, and pAkt. In corneal fluorescein staining, severe punctate epithelial keratitis was seen in the groups of 0.02% BAC, 0.02% BAC containing bimatoprost 0.01% and latanoprost 0.005%. The surface desquamation, irregular surface, loss of cell borders, anisocytosis and stromal shrinkage were observed in the groups of BAC-containing eye drops. Moreover, the groups treated with BAC-containing eye drops have high inflammatory markers, significantly decreased cell viability-related signal, pAkt, and higher apoptosis-inducing signal, pJNK, than the control group. On the other hand, travoprost 0.004% and PF tafluprost 0.0015% have less cellular morphologic changes, lower inflammation, and higher cellular viability than BAC-containing formulations. Corneal damage, increased inflammation and apoptosis and low cell viability were observed in BAC-containing groups. PF or alternatively preserved glaucoma medications seem to be a reasonable and viable alternative to those preserved with BAC.

  12. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Cancer Ask Your Doctor Information for Patients Many adult survivors of childhood cancer feel fertility preservation and ... Fertility preservation and adolescent cancer patients: lessons from adult survivors of childhood cancer and their parents. Cancer ...

  13. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... fertility preservation center closest to you Visit the Pediatric Oncofertility Research Foundation Visit the Patient Navigator Website ... Ginsberg JP. New advances in fertility preservation for pediatric cancer patients. Curr Opin Pediatr. 2010;23:9- ...

  14. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... fertility preservation is important. These key points can help start the conversation: Cancer and cancer treatment may ... several resources listed on the reverse that can help you locate a fertility preservation specialist to discuss ...

  15. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... be fertility preservation options available and having your child see a reproductive specialist in a timely manner ... there are options for preserving fertility in your child diagnosed with cancer. You may be focused on ...

  16. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... JP, Kolon TF. Fertility Preservation in Children and Adolescents With Cancer . Urology. 2016;91:190-6. Loren ... 10. Nieman CL, et al. Fertility preservation and adolescent cancer patients: lessons from adult survivors of childhood ...

  17. Survey of Fertility Preservation Options Available to Patients With Cancer Around the Globe

    Directory of Open Access Journals (Sweden)

    Alexandra S. Rashedi

    2017-06-01

    Full Text Available Purpose: Oncofertility focuses on providing fertility and endocrine-sparing options to patients who undergo life-preserving but gonadotoxic cancer treatment. The resources needed to meet patient demand often are fragmented along disciplinary lines. We quantify assets and gaps in oncofertility care on a global scale. Methods: Survey-based questionnaires were provided to 191 members of the Oncofertility Consortium Global Partners Network, a National Institutes of Health–funded organization. Responses were analyzed to measure trends and regional subtleties about patient oncofertility experiences and to analyze barriers to care at sites that provide oncofertility services. Results: Sixty-three responses were received (response rate, 25%, and 40 were analyzed from oncofertility centers in 28 countries. Thirty of 40 survey results (75% showed that formal referral processes and psychological care are provided to patients at the majority of sites. Fourteen of 23 respondents (61% stated that some fertility preservation services are not offered because of cultural and legal barriers. The growth of oncofertility and its capacity to improve the lives of cancer survivors around the globe relies on concentrated efforts to increase awareness, promote collaboration, share best practices, and advocate for research funding. Conclusion: This survey reveals global and regional successes and challenges and provides insight into what is needed to advance the field and make the discussion of fertility preservation and endocrine health a standard component of the cancer treatment plan. As the field of oncofertility continues to develop around the globe, regular assessment of both international and regional barriers to quality care must continue to guide process improvements.

  18. Spleen-preserving distal pancreatectomy in trauma.

    Science.gov (United States)

    Schellenberg, Morgan; Inaba, Kenji; Cheng, Vincent; Bardes, James M; Lam, Lydia; Benjamin, Elizabeth; Matsushima, Kazuhide; Demetriades, Demetrios

    2018-01-01

    Traumatic injuries to the distal pancreas are infrequent. Universally accepted recommendations about the need for routine splenectomy with distal pancreatectomy do not exist. The aims of this study were to compare outcomes after distal pancreatectomy and splenectomy versus spleen-preserving distal pancreatectomy, and to define the appropriate patient population for splenic preservation. All patients who underwent distal pancreatectomy (January 1, 2007, to December 31, 2014) were identified from the National Trauma Data Bank. Patients with concomitant splenic injury and those who underwent partial splenectomy were excluded. Demographics, clinical data, procedures, and outcomes were collected. Study groups were defined by surgical procedure: distal pancreatectomy and splenectomy versus spleen-preserving distal pancreatectomy. Baseline characteristics between groups were compared with univariate analysis. Multivariate analysis was performed with logistic and linear regression to examine differences in outcomes. Over the 8-year study period, 2,223 patients underwent distal pancreatectomy. After excluding 1,381 patients with concomitant splenic injury (62%) and 8 (pancreatectomy and splenectomy, those who underwent spleen-preserving distal pancreatectomy were younger (p pancreatectomy (p = 0.017). Complications, mortality, and intensive care unit LOS were not significantly different. In young patients after blunt trauma who are not severely injured, a spleen-preserving distal pancreatectomy should be considered to allow for conservation of splenic function and a shorter hospital LOS. In all other patients, the surgeon should not hesitate to remove the spleen with the distal pancreas. Therapy, level IV.

  19. Decorated tensor network renormalization for lattice gauge theories and spin foam models

    International Nuclear Information System (INIS)

    Dittrich, Bianca; Mizera, Sebastian; Steinhaus, Sebastian

    2016-01-01

    Tensor network techniques have proved to be powerful tools that can be employed to explore the large scale dynamics of lattice systems. Nonetheless, the redundancy of degrees of freedom in lattice gauge theories (and related models) poses a challenge for standard tensor network algorithms. We accommodate for such systems by introducing an additional structure decorating the tensor network. This allows to explicitly preserve the gauge symmetry of the system under coarse graining and straightforwardly interpret the fixed point tensors. We propose and test (for models with finite Abelian groups) a coarse graining algorithm for lattice gauge theories based on decorated tensor networks. We also point out that decorated tensor networks are applicable to other models as well, where they provide the advantage to give immediate access to certain expectation values and correlation functions. (paper)

  20. Decorated tensor network renormalization for lattice gauge theories and spin foam models

    Science.gov (United States)

    Dittrich, Bianca; Mizera, Sebastian; Steinhaus, Sebastian

    2016-05-01

    Tensor network techniques have proved to be powerful tools that can be employed to explore the large scale dynamics of lattice systems. Nonetheless, the redundancy of degrees of freedom in lattice gauge theories (and related models) poses a challenge for standard tensor network algorithms. We accommodate for such systems by introducing an additional structure decorating the tensor network. This allows to explicitly preserve the gauge symmetry of the system under coarse graining and straightforwardly interpret the fixed point tensors. We propose and test (for models with finite Abelian groups) a coarse graining algorithm for lattice gauge theories based on decorated tensor networks. We also point out that decorated tensor networks are applicable to other models as well, where they provide the advantage to give immediate access to certain expectation values and correlation functions.

  1. The ZEUS data preservation project

    International Nuclear Information System (INIS)

    Malka, Janusz; Wichmann, Katarzyna

    2012-01-01

    A project to allow long term access and physics analysis of ZEUS data (ZEUS data preservation) has been established in collaboration with the DESY-IT group. In the ZEUS approach the analysis model is based on the Common Ntuple project, under development since 2006. The real data and all presently available Monte Carlo samples are being preserved in a flat ROOT ntuple format. There is ongoing work to provide the ability to simulate new, additional Monte Carlo samples also in the future. The validation framework of such a scheme using virtualisation techniques is being explored. The goal is to validate the frozen ZEUS software against future changes in hardware and operating system. A cooperation between ZEUS, DESY-IT and the library was established for document digitisation and long-term preservation of collaboration web pages. Part of the ZEUS internal documentation has already been stored within the HEP documentation system INSPIRE. Existing digital documentation, needed to perform physics analysis also in the future, is being centralised and completed.

  2. BlogForever: Intelligent Blog Preservation

    CERN Multimedia

    Katarina Anthony

    2011-01-01

    A new EU co-funded project, BlogForever, has set its sights on a developing region of the Internet: the blogosphere. With society growing ever more online-oriented, blogs have become rich repositories of cultural, scientific and social information. The BlogForever software platform is designed to manage and distribute this content and preserve it for posterity.   The BlogForever project will gather blog content into a safeguarded, online archive, turning the once temporary into a well-preserved resource. The project is scheduled for completion in 2013, with partners spread across 12 different companies, universities and research organisations, including CERN. While the CERN team is primarily involved in the technical aspect of the project – designing and implementing the repository – it will also contribute to the preservation guidelines that will be used to choose what content will be kept. “Building on the success of Invenio, the digital library software used by th...

  3. INCORRECT PRESERVATION OF AMPUTATED DIGITS

    Directory of Open Access Journals (Sweden)

    Uroš Ahčan

    2004-09-01

    Full Text Available Background. A decision to replant is critically dependent on the condition of the amputated digit and the way it was preserved during transport. The most common error is exposing the amputated digit to very low temperatures. Preservation directly on ice, on cooling devices in portable refrigerators, or on top of packets of frozen meat often result in a frozen and therefore unusable body digit.Methods. An inquiry questionnaire on correct methods of preservation of amputated digits was conducted on a sample of 30 lay persons, 30 medical students, and 15 physicians.Three simulations of most frequently used methods of preservation of amputated digit were conducted (the correct method; directly on ice; on cooling devices of portable refrigerators. Environment temperature of the (simulated amputated digits stored was measured.In a retrospective study, hospital records of patients treated at the Clinical department of plastic surgery and burns in Ljubljana between 1998 and 2002 were examined. We determined the number of replantations performed, gender of the patients, their age, the mechanism of the injury, the success rate of the replantation, and the duration of hospitalisation. In five case described in detail, we present an inadequate treatment of the amputated digits.Results. The results of the questionnaire survey show that no less than 86.7% of lay person respondents would have treated the injuries in an incorrect way; same holds for 43.4% students of medicine, and 33.3% of practicing physicians.The temperature of the simulated amputated digit remained above 5°C throughout the simulated correct treatment. When preserved directly on ice on or coolant bodies, the temperature dropped below the freezing point and never climbed above 0°C throughout the duration of the simulation (150 minutes.Between years 1998 and 2002, Clinical department of plastic surgery and burns at the University clinical centre Ljubljana admitted 124 injured persons with

  4. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... available and having your child see a reproductive specialist in a timely manner can improve their future ... Can you refer us to a fertility preservation specialist to discuss my child’s options further? Fertility Preservation - ...

  5. Prolonged platelet preservation by transient metabolic suppression

    NARCIS (Netherlands)

    Badlou, Bahram Alamdary

    2006-01-01

    Introduction: Different clinical studies have shown that transfusion of stored platelets results in better haemostasis in patients with thrombocytopenia with and without a platelet function defect. Objectives: Current preservation procedures aim to optimally preserve the metabolic status of

  6. Fertility preservation: a challenge for IVF-clinics

    NARCIS (Netherlands)

    Dahhan, Taghride; Mol, Femke; Kenter, Gemma G.; Balkenende, Eva M. E.; de Melker, Annemieke A.; van der Veen, Fulco; Dancet, Eline A. F.; Goddijn, Mariëtte

    2015-01-01

    Acute fertility preservation for women is an interdisciplinary treatment that requires adequate information provision and early referral. This quality management project aimed to improve fertility preservation care by using a practical tool: Strengths, Weaknesses, Opportunities and Threats (SWOT)

  7. Fertility Preservation Counseling for Pediatric and Adolescent Cancer Patients.

    Science.gov (United States)

    Campbell, Jessica E; Assanasen, Chatchawin; Robinson, Randal D; Knudtson, Jennifer F

    2016-03-01

    Fertility preservation for children and young adults with cancer is an important part of comprehensive patient care. In 2013, the American Society of Clinical Oncology (ASCO) released updated clinical practice guidelines addressing fertility preservation. This study aimed to evaluate if pediatric oncologists were performing fertility preservation counseling, if the new guidelines were being adopted, and how reproductive endocrinologists can educate this patient population and their providers. A cross-sectional study was performed from May 26, 2014, to August 26, 2014. An online survey addressing fertility preservation practice patterns was created and provided to the members of the Children's Oncology Group (COG). Thirty-five percent of the 234 respondents reported reading the new 2013 ASCO guidelines. Ninety-five percent of providers reported mentioning fertility preservation options prior to treatment, most commonly including referral to a reproductive endocrinologist (28%), and sperm banking (57%). The most commonly reported barrier to fertility preservation counseling was the cost of treatment. Fertility preservation counseling is being performed by pediatric oncology providers. Familiarity of the ASCO guidelines is limited, revealing that the established methods for fertility preservation in women--embryo and oocyte cryopreservation--may be offered less than experimental methods in this younger patient population. Such differences in apparent practice patterns highlight the need for more education for providers.

  8. Long-term preservation of Leptospira spp.: challenges and prospects.

    Science.gov (United States)

    Philip, Noraini; Garba, Bashiru; Neela, Vasantha Kumari

    2018-05-08

    Preservation of leptospiral cultures is tantamount to success in leptospiral diagnostics, research, and development of preventive strategies. Each Leptospira isolate has imperative value not only in disease diagnosis but also in epidemiology, virulence, pathogenesis, and drug development studies. As the number of circulating leptospires is continuously increasing and congruent with the importance to retain their original characteristics and properties, an efficient long-term preservation is critically needed to be well-established. However, the preservation of Leptospira is currently characterized by difficulties and conflicting results mainly due to the biological nature of this organism. Hence, this review seeks to describe the efforts in developing efficient preservation methods, to discover the challenges in preserving this organism and to identify the factors that can contribute to an effective long-term preservation of Leptospira. Through the enlightenment of the previous studies, a potentially effective method has been suggested. The article also attempts to evaluate novel strategies used in other industrial and biotechnological preservation efforts and consider their potential application to the conservation of Leptospira spp.

  9. Cost Model for Digital Preservation: Cost of Digital Migration

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2011-01-01

    The Danish Ministry of Culture has funded a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project was to increase cost effectiveness of digital preservation activities and to provide a basis...... for comparing and estimating future cost requirements for digital preservation. In this study we describe an activity-based costing methodology for digital preservation based on the Open Archice Information System (OAIS) Reference Model. Within this framework, which we denote the Cost Model for Digital...... Preservation (CMDP), the focus is on costing the functional entity Preservation Planning from the OAIS and digital migration activities. In order to estimate these costs we have identified cost-critical activities by analysing the functions in the OAIS model and the flows between them. The analysis has been...

  10. Fertility preservation during cancer treatment: clinical guidelines

    Science.gov (United States)

    Rodriguez-Wallberg, Kenny A; Oktay, Kutluk

    2014-01-01

    The majority of children, adolescents, and young adults diagnosed with cancer today will become long-term survivors. The threat to fertility that cancer treatments pose to young patients cannot be prevented in many cases, and thus research into methods for fertility preservation is developing, aiming at offering cancer patients the ability to have biologically related children in the future. This paper discusses the current status of fertility preservation methods when infertility risks are related to surgical oncologic treatments, radiation therapy, or chemotherapy. Several scientific groups and societies have developed consensus documents and guidelines for fertility preservation. Decisions about fertility and imminent potentially gonadotoxic therapies must be made rapidly. Timely and complete information on the impact of cancer treatment on fertility and fertility preservation options should be presented to all patients when a cancer treatment is planned. PMID:24623991

  11. Small amounts of tissue preserve pancreatic function: Long-term follow-up study of middle-segment preserving pancreatectomy.

    Science.gov (United States)

    Lu, Zipeng; Yin, Jie; Wei, Jishu; Dai, Cuncai; Wu, Junli; Gao, Wentao; Xu, Qing; Dai, Hao; Li, Qiang; Guo, Feng; Chen, Jianmin; Xi, Chunhua; Wu, Pengfei; Zhang, Kai; Jiang, Kuirong; Miao, Yi

    2016-11-01

    Middle-segment preserving pancreatectomy (MPP) is a novel procedure for treating multifocal lesions of the pancreas while preserving pancreatic function. However, long-term pancreatic function after this procedure remains unclear.The aims of this current study are to investigate short- and long-term outcomes, especially long-term pancreatic endocrine function, after MPP.From September 2011 to December 2015, 7 patients underwent MPP in our institution, and 5 cases with long-term outcomes were further analyzed in a retrospective manner. Percentage of tissue preservation was calculated using computed tomography volumetry. Serum insulin and C-peptide levels after oral glucose challenge were evaluated in 5 patients. Beta-cell secreting function including modified homeostasis model assessment of beta-cell function (HOMA2-beta), area under the curve (AUC) for C-peptide, and C-peptide index were evaluated and compared with those after pancreaticoduodenectomy (PD) and total pancreatectomy. Exocrine function was assessed based on questionnaires.Our case series included 3 women and 2 men, with median age of 50 (37-81) years. Four patients underwent pylorus-preserving PD together with distal pancreatectomy (DP), including 1 with spleen preserved. The remaining patient underwent Beger procedure and spleen-preserving DP. Median operation time and estimated intraoperative blood loss were 330 (250-615) min and 800 (400-5500) mL, respectively. Histological examination revealed 3 cases of metastatic lesion to the pancreas, 1 case of chronic pancreatitis, and 1 neuroendocrine tumor. Major postoperative complications included 3 cases of delayed gastric emptying and 2 cases of postoperative pancreatic fistula. Imaging studies showed that segments representing 18.2% to 39.5% of the pancreas with good blood supply had been preserved. With a median 35.0 months of follow-ups on pancreatic functions, only 1 patient developed new-onset diabetes mellitus of the 4 preoperatively euglycemic

  12. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... this website. Skip to main content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers ... Visit the Oncofertility Consortium Web site Use the online Clinic/Center Finder to find the fertility preservation ...

  13. 76 FR 60754 - Preserving the Open Internet

    Science.gov (United States)

    2011-09-30

    ...-201] Preserving the Open Internet AGENCY: Federal Communications Commission. ACTION: Final rule..., 2011, a document establishing rules to preserve the open Internet. Inadvertently the wrong paragraph... alleging violations of the open Internet rules. Federal Communications Commission. Matt Warner, Attorney...

  14. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers Open menu Reprotopia_Main_Menu ... Cancer Fertility Preservation for Children Diagnosed with Cancer Patient Pocket Guides Patient Pocket Guides Patient Guides Fertility ...

  15. SPECIFICITY OF SELF-PRESERVATION MOTIVATION IN EXTREME SITUATION

    Directory of Open Access Journals (Sweden)

    Ekaterina Anatolevna Karacheva

    2015-02-01

    Full Text Available The article presents the results of the study motivation of self-preservation in an extreme situation. Usually extreme situation unfold from the point of view of functioning, health, high negative level mental stress and tension. The extreme situation is the situation of human activity to which man acts, carrying out certain activities. The article provides an overview of russian and foreign authors dealing with this problem. Theoretical models of motivation of self-preservation Z. Freud, A. Maslow, G. Murray, M. Magomed-Eminov. The study explores the leading motivation in an extreme situation and analyzed the levels of motivation of self-preservation. The study was conducted in the Afghan veterans, using a method of unfinished sentences and other. Identified two levels of motivation of self-preservation: individual and personal. Revealed that the motivation of self-preservation is the leading motivation in an extreme situation.

  16. Preserving and reusing high-energy-physics data analyses

    CERN Document Server

    Simko, Tibor; Dasler, Robin; Fokianos, Pamfilos; Kuncar, Jiri; Lavasa, Artemis; Mattmann, Annemarie; Rodriguez, Diego; Trzcinska, Anna; Tsanaktsidis, Ioannis

    2017-01-01

    The revalidation, reuse and reinterpretation of data analyses require having access to the original virtual environments, datasets and software that was used to produce the original scientific result. The CERN Analysis Preservation pilot project is developing a set of tools that support particle physics researchers in preserving the knowledge around analyses so that capturing, sharing, reusing and reinterpreting data becomes easier. In this talk, we shall notably focus on the aspects of reusing a preserved analysis. We describe a system that permits to instantiate the preserved analysis workflow on the computing cloud, paving the way to allowing researchers to revalidate and reinterpret research data even many years after the original publication.

  17. Validating User Flows to Protect Software Defined Network Environments

    Directory of Open Access Journals (Sweden)

    Ihsan H. Abdulqadder

    2018-01-01

    Full Text Available Software Defined Network is a promising network paradigm which has led to several security threats in SDN applications that involve user flows, switches, and controllers in the network. Threats as spoofing, tampering, information disclosure, Denial of Service, flow table overloading, and so on have been addressed by many researchers. In this paper, we present novel SDN design to solve three security threats: flow table overloading is solved by constructing a star topology-based architecture, unsupervised hashing method mitigates link spoofing attack, and fuzzy classifier combined with L1-ELM running on a neural network for isolating anomaly packets from normal packets. For effective flow migration Discrete-Time Finite-State Markov Chain model is applied. Extensive simulations using OMNeT++ demonstrate the performance of our proposed approach, which is better at preserving holding time than are other state-of-the-art works from the literature.

  18. Phase-preserved optical elevator.

    Science.gov (United States)

    Luo, Yuan; Zhang, Baile; Han, Tiancheng; Chen, Zhi; Duan, Yubo; Chu, Chia-Wei; Barbastathis, George; Qiu, Cheng Wei

    2013-03-25

    The unique superiority of transformation optics devices designed from coordinate transformation is their capability of recovering both ray trajectory and optical path length in light manipulation. However, very few experiments have been done so far to verify this dual-recovery property from viewpoints of both ray trajectory and optical path length simultaneously. The experimental difficulties arise from the fact that most previous optical transformation optics devices only work at the nano-scale; the lack of intercomparison between data from both optical path length and ray trajectory measurement in these experiments obscured the fact that the ray path was subject to a subwavelength lateral shift that was otherwise not easily perceivable and, instead, was pointed out theoretically [B. Zhang et al. Phys. Rev. Lett. 104, 233903, 2010]. Here, we use a simple macroscopic transformation optics device of phase-preserved optical elevator, which is a typical birefringent optical phenomenon that can virtually lift an optical image by a macroscopic distance, to demonstrate decisively the unique optical path length preservation property of transformation optics. The recovery of ray trajectory is first determined with no lateral shift in the reflected ray. The phase preservation is then verified with incoherent white-light interferometry without ambiguity and phase unwrapping.

  19. New stepwise cooling system for short-term porcine islet preservation.

    Science.gov (United States)

    Ikemoto, Tetsuya; Noguchi, Hirofumi; Fujita, Yasutaka; Takita, Morihito; Shimoda, Masayuki; Sugimoto, Koji; Jackson, Andrew; Naziruddin, Bashoo; Shimada, Mitsuo; Levy, Marlon F; Matsumoto, Shinichi

    2010-10-01

    Porcine islets are the most suitable for xeno-islet transplantation. However, it is necessary to establish an effective preservation method against its fragility. Recently, we developed a new cooling and preservation (Keep and Fresh [KFC]; FUJIYA Co, Tokushima, Japan) system, which can maintain viability of hepatocyte. In this study, we examined the KFC for porcine islet preservation. Isolated porcine islets were preserved in CMRL 1066 culture media with bovine serum at 37°C, 22°C, and 4°C and KFC for 24, 48, and 72 hours. Islet recovery rate, purity, and viability were evaluated. After 24-hour preservation, the recovery rate was the highest in the KFC, but no significant difference was found. After 48-hour preservation, the recovery rate by the KFC was 73.9% ± 17.3%, which was significantly higher than the other groups (48.7% ± 28.6% at 37°C, P KFC group, purities and viabilities were the highest among the groups after 24-, 48-, and 72-hour preservation. The KFC system significantly improved porcine islet preservation; therefore, the KFC might be useful for porcine islet preservation.

  20. Online social networking: a primer for radiology.

    Science.gov (United States)

    Prasanna, Prasanth M; Seagull, F Jacob; Nagy, Paul

    2011-10-01

    Online social networking is an immature, but rapidly evolving industry of web-based technologies that allow individuals to develop online relationships. News stories populate the headlines about various websites which can facilitate patient and doctor interaction. There remain questions about protecting patient confidentiality and defining etiquette in order to preserve the doctor/patient relationship and protect physicians. How much social networking-based communication or other forms of E-communication is effective? What are the potential benefits and pitfalls of this form of communication? Physicians are exploring how social networking might provide a forum for interacting with their patients, and advance collaborative patient care. Several organizations and institutions have set forth policies to address these questions and more. Though still in its infancy, this form of media has the power to revolutionize the way physicians interact with their patients and fellow health care workers. In the end, physicians must ask what value is added by engaging patients or other health care providers in a social networking format. Social networks may flourish in health care as a means of distributing information to patients or serve mainly as support groups among patients. Physicians must tread a narrow path to bring value to interactions in these networks while limiting their exposure to unwanted liability.

  1. Optimal Solution Volume for Luminal Preservation: A Preclinical Study in Porcine Intestinal Preservation.

    Science.gov (United States)

    Oltean, M; Papurica, M; Jiga, L; Hoinoiu, B; Glameanu, C; Bresler, A; Patrut, G; Grigorie, R; Ionac, M; Hellström, M

    2016-03-01

    Rodent studies suggest that luminal solutions alleviate the mucosal injury and prolong intestinal preservation but concerns exist that excessive volumes of luminal fluid may promote tissue edema. Differences in size, structure, and metabolism between rats and humans require studies in large animals before clinical use. Intestinal procurement was performed in 7 pigs. After perfusion with histidine-tryptophan-ketoglutarate (HTK), 40-cm-long segments were cut and filled with 13.5% polyethylene glycol (PEG) 3350 solution as follows: V0 (controls, none), V1 (0.5 mL/cm), V2 (1 mL/cm), V3 (1.5 mL/cm), and V4 (2 mL/cm). Tissue and luminal solutions were sampled after 8, 14, and 24 hours of cold storage (CS). Preservation injury (Chiu score), the apical membrane (ZO-1, brush-border maltase activity), and the electrolyte content in the luminal solution were studied. In control intestines, 8-hour CS in HTK solution resulted in minimal mucosal changes (grade 1) that progressed to significant subepithelial edema (grade 3) by 24 hours. During this time, a gradual loss in ZO-1 was recorded, whereas maltase activity remained unaltered. Moreover, variable degrees of submucosal edema were observed. Luminal introduction of high volumes (2 mL/mL) of PEG solution accelerated the development of the subepithelial edema and submucosal edema, leading to worse histology. However, ZO-1 was preserved better over time than in control intestines (no luminal solution). Maltase activity was reduced in intestines receiving luminal preservation. Luminal sodium content decreased in time and did not differ between groups. This PEG solution protects the apical membrane and the tight-junction proteins but may favor water absorption and tissue (submucosal) edema, and luminal volumes >2 mL/cm may result in worse intestinal morphology. Copyright © 2016 Elsevier Inc. All rights reserved.

  2. Preservation of information about the repository for spent nuclear fuels - proposal for action plan; Bevarande av information om slutfoervar foer anvaent kaernbraensle - foerslag till handlingsplan

    Energy Technology Data Exchange (ETDEWEB)

    Bowen-Schrire, Monica; Eckerhall, Daniel; Jander, Hans; Waniewska, Katarina (Vattenfall Power Consultant AB, Stockholm (Sweden))

    2008-10-15

    This report is a proposal for an action plan with the ultimate aim of ensuring that information about the repository for spent nuclear fuel can be preserved and transferred for future generations. The purpose of the proposal for an action plan is to present ideas on tangible measures and guidelines for information preservation and transfer, in the short and long term. The report deals with a number of aspects relating to information preservation as well as risks that can lead to the loss of important information. The proposal for an action plan is based on reasoning about these subjects. The main emphasis is on measures that need to be implemented in the near future to ensure that successive and direct information transfer is handled in a suitable manner. It is suggested that the following measures should be implemented within a five-year period: - Designate a person responsible for information preservation. - Work out guidelines for information preservation and transfer. - Form a network with other organizations in Sweden. - Initiate a dialogue with other countries, especially USA and France. - Participate in seminars, conferences and workgroups on an international level within the IAEA and NEA. In a longer time perspective the following measures should also be implemented: - Implement guidelines for information preservation and transfer. - Document the archiving system. - Establish a communication plan. - Archive information about the repository. - Keep the action plan up to date

  3. Hearing Preservation in Cochlear Implant Surgery

    Directory of Open Access Journals (Sweden)

    Priscila Carvalho Miranda

    2014-01-01

    Full Text Available In the past, it was thought that hearing loss patients with residual low-frequency hearing would not be good candidates for cochlear implantation since insertion was expected to induce inner ear trauma. Recent advances in electrode design and surgical techniques have made the preservation of residual low-frequency hearing achievable and desirable. The importance of preserving residual low-frequency hearing cannot be underestimated in light of the added benefit of hearing in noisy atmospheres and in music quality. The concept of electrical and acoustic stimulation involves electrically stimulating the nonfunctional, high-frequency region of the cochlea with a cochlear implant and applying a hearing aid in the low-frequency range. The principle of preserving low-frequency hearing by a “soft surgery” cochlear implantation could also be useful to the population of children who might profit from regenerative hair cell therapy in the future. Main aspects of low-frequency hearing preservation surgery are discussed in this review: its brief history, electrode design, principles and advantages of electric-acoustic stimulation, surgical technique, and further implications of this new treatment possibility for hearing impaired patients.

  4. The H1 Data Preservation Project

    International Nuclear Information System (INIS)

    South, D M; Steder, M

    2012-01-01

    The H1 data preservation project was started in 2009 as part of the global data preservation initiative in high-energy physics, DPHEP. In order to retain the full potential for future improvements, the H1 Collaboration aims for level 4 of the DPHEP recommendations, which requires the full simulation and reconstruction chain as well as the data to be preserved for future analysis. A major goal of the H1 project is therefore to provide secure, long-lived and validated access to the H1 data and analysis software, which is realised in collaboration with DESY-IT using virtualisation techniques. By implementing such a system, it is hoped that the lifetime of the unique ep collision data from HERA will be extended, providing the possibility for novel analysis in the future. The preservation of the data and software is performed alongside a consolidation programme of digital and non-digital documentation, some of which dates back to the early 1980s. A new organisational model of the H1 Collaboration, reflecting the change to the long term phase, is to be adopted in July 2012.

  5. [Valuation and prospect of function preserving gastrectomy].

    Science.gov (United States)

    Wang, Shuchang; Yu, Site; Xu, Jia; Zhao, Gang

    2017-10-25

    Preserving gastric function and improving quality of life (QOL) is the tendency of surgery for early gastric cancer. Function preserving gastrectomy (FPG) is applied to modify the extent of surgery and to achieve better quality of life at the premise of radical resection. Pylorus-preserving gastrectomy is the most favorable approach of FPG with oncological safety, which can improve nutritional status and QOL via preserving pylorus and vagal nerve. Proximal gastrectomy is widely accepted as FPG for early upper 1/3 gastric cancer. However, the most optimal way of anastomosis is not yet solved. Sentinel node navigation is currently the most accurate approach for intraoperative diagnosis of lymph node metastasis, which stimulates the development of many kinds of FPG procedures for individual treatment. Nevertheless, more efforts should be made to reduce false negative rate of sentinel node biopsy. Herein we discuss the valuation and prospect of FPG.

  6. Impulse Noise Cancellation of Medical Images Using Wavelet Networks and Median Filters

    Science.gov (United States)

    Sadri, Amir Reza; Zekri, Maryam; Sadri, Saeid; Gheissari, Niloofar

    2012-01-01

    This paper presents a new two-stage approach to impulse noise removal for medical images based on wavelet network (WN). The first step is noise detection, in which the so-called gray-level difference and average background difference are considered as the inputs of a WN. Wavelet Network is used as a preprocessing for the second stage. The second step is removing impulse noise with a median filter. The wavelet network presented here is a fixed one without learning. Experimental results show that our method acts on impulse noise effectively, and at the same time preserves chromaticity and image details very well. PMID:23493998

  7. Essential Oils: Sources of Antimicrobials and Food Preservatives

    Science.gov (United States)

    Pandey, Abhay K.; Kumar, Pradeep; Singh, Pooja; Tripathi, Nijendra N.; Bajpai, Vivek K.

    2017-01-01

    Aromatic and medicinal plants produce essential oils in the form of secondary metabolites. These essential oils can be used in diverse applications in food, perfume, and cosmetic industries. The use of essential oils as antimicrobials and food preservative agents is of concern because of several reported side effects of synthetic oils. Essential oils have the potential to be used as a food preservative for cereals, grains, pulses, fruits, and vegetables. In this review, we briefly describe the results in relevant literature and summarize the uses of essential oils with special emphasis on their antibacterial, bactericidal, antifungal, fungicidal, and food preservative properties. Essential oils have pronounced antimicrobial and food preservative properties because they consist of a variety of active constituents (e.g., terpenes, terpenoids, carotenoids, coumarins, curcumins) that have great significance in the food industry. Thus, the various properties of essential oils offer the possibility of using natural, safe, eco-friendly, cost-effective, renewable, and easily biodegradable antimicrobials for food commodity preservation in the near future. PMID:28138324

  8. 2015 Site Environmental Report Fernald Preserve

    International Nuclear Information System (INIS)

    Hertel, Bill; Hooten, Gwen

    2016-01-01

    The Fernald Preserve 2015 Site Environmental Report provides stakeholders with the results from the Fernald, Ohio, Site's environmental monitoring programs for 2015; a summary of the U.S. Department of Energy's (DOE's) activities conducted onsite; and a summary of the Fernald Preserve's compliance with the various environmental regulations, compliance agreements, and DOE policies that govern site activities. This report has been prepared in accordance with the ''Integrated Environmental Monitoring Plan,'' which is Attachment D of the Comprehensive Legacy Management and Institutional Controls Plan (LMICP) (DOE 2016). Remediation of the Fernald Preserve has been successfully completed with the exception of the groundwater. During 2015, activities at the Fernald Preserve included: environmental monitoring activities related to direct radiation, groundwater, and surface water; ecological restoration monitoring and maintenance as well as inspections, care, and monitoring of the site and the OSDF to ensure that provisions of the LMICP are fully implemented; OSDF leak detection monitoring and collection, monitoring, and treatment of leachate from the OSDF; extraction, monitoring, and treatment of contaminated groundwater from the Great Miami Aquifer (Operable Unit 5); ongoing operation of the Fernald Preserve Visitors Center, associated outreach, and educational activities; and monitoring as specified in the site's National Pollutant Discharge Elimination System (NPDES) permit. Environmental monitoring programs were developed to ensure that the remedy remains protective of the environment. The requirements of these programs are described in detail in the LMICP and reported in this Site Environmental Report.

  9. Modelling the Cost and Quality of Preservation Imaging and Archiving

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad

    2009-01-01

    , fire and other risks. In this PhD thesis it is examined how one may evaluate the long‐term costs and benefits to cultural heritage institutions of different preservation strategies for digital copies. The investigated alternatives are preserving the copies in a digital repository, and printing...... the files out on microfilm and preserving them in a non‐digital repository. In order to obtain empirical data and to understand the decisive cost factors in preservation copying, a case study was set up in which degrading sheet‐film negatives were digitised. Requirements for image quality and metadata were...... systematic evaluation of the quality of repositories and the perceived benefits that different preservation strategies may bring. This also relates to a conducted investigation of preservation requirements for a shared bit preservation system, which describes how institutions with OAIS compliant repositories...

  10. Yeasts preservation: alternatives for lyophilisation

    OpenAIRE

    Nyanga, Loveness K.; Nout, Martinus J. R.; Smid, Eddy J.; Boekhout, Teun; Zwietering, Marcel H.

    2012-01-01

    The aim of the study was to compare the effect of two low-cost, low technology traditional methods for drying starter cultures with standard lyophilisation. Lyophilised yeast cultures and yeast cultures preserved in dry rice cakes and dry plant fibre strands were examined for viable cell counts during 6 months storage at 4 and 25 °C. None of the yeast cultures showed a significant loss in viable cell count during 6 months of storage at 4 °C upon lyophilisation and preservation in dry rice cak...

  11. VT Historic Preservation Grant

    Data.gov (United States)

    Vermont Center for Geographic Information — The State-funded Historic Preservation Grant Program helps municipalities and non-profit organizations rehabilitate the historic buildings that are a vital part of...

  12. Interest communities and flow roles in directed networks: the Twitter network of the UK riots.

    Science.gov (United States)

    Beguerisse-Díaz, Mariano; Garduño-Hernández, Guillermo; Vangelov, Borislav; Yaliraki, Sophia N; Barahona, Mauricio

    2014-12-06

    Directionality is a crucial ingredient in many complex networks in which information, energy or influence are transmitted. In such directed networks, analysing flows (and not only the strength of connections) is crucial to reveal important features of the network that might go undetected if the orientation of connections is ignored. We showcase here a flow-based approach for community detection through the study of the network of the most influential Twitter users during the 2011 riots in England. Firstly, we use directed Markov Stability to extract descriptions of the network at different levels of coarseness in terms of interest communities, i.e. groups of nodes within which flows of information are contained and reinforced. Such interest communities reveal user groupings according to location, profession, employer and topic. The study of flows also allows us to generate an interest distance, which affords a personalized view of the attention in the network as viewed from the vantage point of any given user. Secondly, we analyse the profiles of incoming and outgoing long-range flows with a combined approach of role-based similarity and the novel relaxed minimum spanning tree algorithm to reveal that the users in the network can be classified into five roles. These flow roles go beyond the standard leader/follower dichotomy and differ from classifications based on regular/structural equivalence. We then show that the interest communities fall into distinct informational organigrams characterized by a different mix of user roles reflecting the quality of dialogue within them. Our generic framework can be used to provide insight into how flows are generated, distributed, preserved and consumed in directed networks.

  13. 7 CFR 500.3 - Preservation of property.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Preservation of property. 500.3 Section 500.3 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL RESEARCH SERVICE, DEPARTMENT OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.3 Preservation...

  14. Fertility Preservation for Pediatric Patients: Current State and Future Possibilities.

    Science.gov (United States)

    Johnson, Emilie K; Finlayson, Courtney; Rowell, Erin E; Gosiengfiao, Yasmin; Pavone, Mary Ellen; Lockart, Barbara; Orwig, Kyle E; Brannigan, Robert E; Woodruff, Teresa K

    2017-07-01

    This review provides an overview of pediatric fertility preservation. Topics covered include the patient populations who could benefit, the current state of fertility preservation options and research, and considerations related to ethics and program development. A broad Embase® and PubMed® search was performed to identify publications discussing investigational, clinical, ethical and health care delivery issues related to pediatric fertility preservation. Relevant publications were reviewed and summarized. Populations who could benefit from fertility preservation in childhood/adolescence include oncology patients, patients with nononcologic conditions requiring gonadotoxic chemotherapy, patients with differences/disorders of sex development and transgender individuals. Peripubertal and postpubertal fertility preservation options are well established and include cryopreservation of oocytes, embryos or sperm. Prepubertal fertility preservation is experimental. Multiple lines of active research aim to develop technologies that will enable immature eggs and sperm to be matured and used to produce a biological child in the future. Ethical challenges include the need for parental proxy decision making and the fact that fertility preservation procedures can be considered not medically necessary. Successful multidisciplinary fertility preservation care teams emphasize partnerships with adult colleagues, prioritize timely consultations and use standardized referral processes. Some aspects of fertility preservation are not covered by insurance and out-of-pocket costs can be prohibitive. Pediatric fertility preservation is an emerging, evolving field. Fertility preservation options for prepubertal patients with fertility altering conditions such as cancer and differences/disorders of sex development are currently limited. However, multiple lines of active research hold promise for the future. Key considerations include establishing a multidisciplinary team to provide

  15. ACHP | News | Laura Bush Announces Preserve America Grants Budget

    Science.gov (United States)

    Search skip specific nav links Home arrow News arrow Laura Bush Announces Preserve America Grants Budget Laura Bush Announces Preserve America Grants Budget First Preserve America Communities Also Announced ) Jan. 15, 2004, Washington, DC—Mrs. Laura Bush announced today that the President's budget for FY 2005

  16. 21 CFR 146.154 - Concentrated orange juice with preservative.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false Concentrated orange juice with preservative. 146... Canned Fruit Juices and Beverages § 146.154 Concentrated orange juice with preservative. (a) Concentrated orange juice with preservative complies with the requirements for composition and labeling of optional...

  17. Computation of Optimal Monotonicity Preserving General Linear Methods

    KAUST Repository

    Ketcheson, David I.

    2009-07-01

    Monotonicity preserving numerical methods for ordinary differential equations prevent the growth of propagated errors and preserve convex boundedness properties of the solution. We formulate the problem of finding optimal monotonicity preserving general linear methods for linear autonomous equations, and propose an efficient algorithm for its solution. This algorithm reliably finds optimal methods even among classes involving very high order accuracy and that use many steps and/or stages. The optimality of some recently proposed methods is verified, and many more efficient methods are found. We use similar algorithms to find optimal strong stability preserving linear multistep methods of both explicit and implicit type, including methods for hyperbolic PDEs that use downwind-biased operators.

  18. Triple M-brane configurations and preserved supersymmetries

    International Nuclear Information System (INIS)

    Golubtsova, A.A.; Ivashchuk, V.D.

    2013-01-01

    We investigate all standard triple composite M-brane intersections defined on products of Ricci-flat manifolds for preserving supersymmetries in eleven-dimensional N=1 supergravity. The explicit formulae for computing the numbers of preserved supersymmetries are obtained, which generalize the relations for topologically trivial flat factor spaces presented in the classification by Bergshoeff et al. We obtain certain examples of configurations preserving some fractions of supersymmetries, e.g. containing such factor spaces as K3, C ⁎ 2 /Z 2 , a four-dimensional pp-wave manifold and the two-dimensional pseudo-Euclidean manifold R ⁎ 1,1 /Z 2

  19. Usefulness of radionuclide scintiphotography to evaluate preserved kidney viability

    International Nuclear Information System (INIS)

    Sato, Koshi; Yokota, Kazuhiko; Uchida, Hisanori

    1987-01-01

    GAMMA imaging of the renal cortical microcirculation is a safe and non-invasive method for assessment of kidney viability before transplantation. We used trifluoperazine (TFP), urokinase and verapamil from 24 to 120 hour kidney preservation in dogs. For these preserved kidneys, we used radionuuclide scintiphotography to evaluate kidney viability. After preservation, these kidneys were perfused with technitium -99m labeled microspheres, and imaging of the renal vasculature was obtained by scintigraphy. The distribution of the microspheres was assessed visually and by computer analysis. Modified Collins' solution perfused kidneys show very poor cortical uptake with marked increase in uptake in the hilar region after preservation. In contrast, cortical flow remained relatively well preserved in kidneys perfused and preserved by use of modified Collins' solotion with TFP, urokinase and urokinase + verapamil. There was a direct correlation between these results and the capacity of kidneys treated in the same fashion to sustain life after retransplantation into the original host. (author)

  20. Fertility preservation in young patients with cancer

    Directory of Open Access Journals (Sweden)

    Virender Suhag

    2015-01-01

    Full Text Available Infertility can arise as a consequence of treatment of oncological conditions. The parallel and continued improvement in both the management of oncology and fertility cases in recent times has brought to the forefront the potential for fertility preservation in patients being treated for cancer. Many survivors will maintain their reproductive potential after the successful completion of treatment for cancer. However total body irradiation, radiation to the gonads, and certain high dose chemotherapy regimens can place women at risk for acute ovarian failure or premature menopause and men at risk for temporary or permanent azoospermia. Providing information about risk of infertility and possible interventions to maintain reproductive potential are critical for the adolescent and young adult population at the time of diagnosis. There are established means of preserving fertility before cancer treatment; specifically, sperm cryopreservation for men and in vitro fertilization and embryo cryopreservation for women. Several innovative techniques are being actively investigated, including oocyte and ovarian follicle cryopreservation, ovarian tissue transplantation, and in vitro follicle maturation, which may expand the number of fertility preservation choices for young cancer patients. Fertility preservation may also require some modification of cancer therapy; thus, patients' wishes regarding future fertility and available fertility preservation alternatives should be discussed before initiation of therapy.

  1. Recurrence Density Enhanced Complex Networks for Nonlinear Time Series Analysis

    Science.gov (United States)

    Costa, Diego G. De B.; Reis, Barbara M. Da F.; Zou, Yong; Quiles, Marcos G.; Macau, Elbert E. N.

    We introduce a new method, which is entitled Recurrence Density Enhanced Complex Network (RDE-CN), to properly analyze nonlinear time series. Our method first transforms a recurrence plot into a figure of a reduced number of points yet preserving the main and fundamental recurrence properties of the original plot. This resulting figure is then reinterpreted as a complex network, which is further characterized by network statistical measures. We illustrate the computational power of RDE-CN approach by time series by both the logistic map and experimental fluid flows, which show that our method distinguishes different dynamics sufficiently well as the traditional recurrence analysis. Therefore, the proposed methodology characterizes the recurrence matrix adequately, while using a reduced set of points from the original recurrence plots.

  2. Dearfield Dream Project: Developing an Interdisciplinary Historical/Cultural Research Network

    Directory of Open Access Journals (Sweden)

    Robert Brunswig

    2013-08-01

    Full Text Available The Dearfield Dream Project is a collaborative research initiative to conduct historical, cultural, archaeological, and environmental studies on the early 20th Century African-American colony site of Dearfield, Colorado, USA. Because the breadth and significance of the Dearfield Project requires an interdisciplinary research team, a network of research collaborators has been assembled. This research network seeks to discover, preserve, and disseminate knowledge of the site and its surrounding farmsteads’ economic, social, political, and environmental history for better understanding and interpretation of its contributions to Colorado and U.S. history. Herein, we detail progress that has been made on this important historical/cultural research project. Further, we outline the future of the Dearfield research network along with our current and anticipated subjects of inquiry.

  3. Tertiary Treatment Process of Preserved Wastewater

    Directory of Open Access Journals (Sweden)

    Wang Qingyu

    2016-01-01

    Full Text Available The effects of the composite coagulants on coagulation sedimentation for the preserved wastewater was investigated by changing the composite coagulant dosages, and the coagulant was composed of polymeric ferric sulfate (PFS, polyaluminium chloride (PAC, and polyaluminum ferric silicate (PAFSC, while the effect of the tertiary treatment process on the preserved wastewater was tested, which was exceeded the standard seriously. The results showed that 400 mg/L was the optimum composite coagulant dosage. The removal rates of salt and sugar were as high as 99.1% and 99.5% respectively, and the removal rates of CODCr and SS were 99.3% and 96.0%, respectively after the preserved wastewater was treated by the tertiary treatment technology, which both reached the primary standard of “The Integrated Wastewater Discharge Standard” (GB8978-1996.

  4. Organic preservation of fossil musculature with ultracellular detail.

    Science.gov (United States)

    McNamara, Maria; Orr, Patrick J; Kearns, Stuart L; Alcalá, Luis; Anadón, Pere; Peñalver-Mollá, Enrique

    2010-02-07

    The very labile (decay-prone), non-biomineralized, tissues of organisms are rarely fossilized. Occurrences thereof are invaluable supplements to a body fossil record dominated by biomineralized tissues, which alone are extremely unrepresentative of diversity in modern and ancient ecosystems. Fossil examples of extremely labile tissues (e.g. muscle) that exhibit a high degree of morphological fidelity are almost invariably replicated by inorganic compounds such as calcium phosphate. There is no consensus as to whether such tissues can be preserved with similar morphological fidelity as organic remains, except when enclosed inside amber. Here, we report fossilized musculature from an approximately 18 Myr old salamander from lacustrine sediments of Ribesalbes, Spain. The muscle is preserved organically, in three dimensions, and with the highest fidelity of morphological preservation yet documented from the fossil record. Preserved ultrastructural details include myofilaments, endomysium, layering within the sarcolemma, and endomysial circulatory vessels infilled with blood. Slight differences between the fossil tissues and their counterparts in extant amphibians reflect limited degradation during fossilization. Our results provide unequivocal evidence that high-fidelity organic preservation of extremely labile tissues is not only feasible, but likely to be common. This is supported by the discovery of similarly preserved tissues in the Eocene Grube Messel biota.

  5. The force, power and energy of the 100 meter sprint

    OpenAIRE

    Helene, O.; Yamashita, M. T.

    2009-01-01

    At the 2008 Summer Olympics in Beijing, Usain Bolt broke the world record for the 100 m sprint. Just one year later, at the 2009 World Championships in Athletics in Berlin he broke it again. A few months after Beijing, Eriksen [Am. J. Phys. 77, 224-228 (2009)] studied Bolt's performance and predicted that Bolt could have run about one-tenth of a second faster, which was confirmed in Berlin. In this paper we extend the analysis of Eriksen to model Bolt's velocity time dependence for the Beijin...

  6. 7 CFR 501.3 - Preservation of property.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Preservation of property. 501.3 Section 501.3 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL RESEARCH SERVICE, DEPARTMENT... Preservation of property. It is unlawful to willfully destroy, damage, or remove property or any part thereof...

  7. 7 CFR 503.3 - Preservation of property.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Preservation of property. 503.3 Section 503.3 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL RESEARCH SERVICE, DEPARTMENT OF AGRICULTURE CONDUCT ON PLUM ISLAND ANIMAL DISEASE CENTER § 503.3 Preservation of property. The...

  8. 44 CFR 15.5 - Preservation of property.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Preservation of property. 15.5 Section 15.5 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT... NATIONAL EMERGENCY TRAINING CENTER § 15.5 Preservation of property. At both Mt. Weather and NETC we...

  9. 7 CFR 502.3 - Preservation of property.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Preservation of property. 502.3 Section 502.3 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL RESEARCH SERVICE, DEPARTMENT....3 Preservation of property. It is unlawful to willfully destroy, damage, or remove property or any...

  10. Survey of postharvest handling, preservation and processing ...

    African Journals Online (AJOL)

    Survey of postharvest handling, preservation and processing practices along the camel milk chain in Isiolo district, Kenya. ... Despite the important contribution of camel milk to food security for pastoralists in Kenya, little is known about the postharvest handling, preservation and processing practices. In this study, existing ...

  11. Selective vulnerability related to aging in large-scale resting brain networks.

    Science.gov (United States)

    Zhang, Hong-Ying; Chen, Wen-Xin; Jiao, Yun; Xu, Yao; Zhang, Xiang-Rong; Wu, Jing-Tao

    2014-01-01

    Normal aging is associated with cognitive decline. Evidence indicates that large-scale brain networks are affected by aging; however, it has not been established whether aging has equivalent effects on specific large-scale networks. In the present study, 40 healthy subjects including 22 older (aged 60-80 years) and 18 younger (aged 22-33 years) adults underwent resting-state functional MRI scanning. Four canonical resting-state networks, including the default mode network (DMN), executive control network (ECN), dorsal attention network (DAN) and salience network, were extracted, and the functional connectivities in these canonical networks were compared between the younger and older groups. We found distinct, disruptive alterations present in the large-scale aging-related resting brain networks: the ECN was affected the most, followed by the DAN. However, the DMN and salience networks showed limited functional connectivity disruption. The visual network served as a control and was similarly preserved in both groups. Our findings suggest that the aged brain is characterized by selective vulnerability in large-scale brain networks. These results could help improve our understanding of the mechanism of degeneration in the aging brain. Additional work is warranted to determine whether selective alterations in the intrinsic networks are related to impairments in behavioral performance.

  12. Polyquaternium-1-Preserved Travoprost 0.003% or Benzalkonium Chloride-Preserved Travoprost 0.004% for Glaucoma and Ocular Hypertension.

    Science.gov (United States)

    Peace, James H; Ahlberg, Peter; Wagner, Mathias; Lim, John M; Wirta, David; Branch, James D

    2015-08-01

    To demonstrate equivalence of polyquaternium-1-preserved travoprost 0.003% with benzalkonium chloride-preserved travoprost 0.004% in patients with open-angle glaucoma or ocular hypertension. Double-masked, randomized, 2-treatment, equivalence clinical trial. setting: Multicenter clinical trial conducted in 60 centers in the United States and Europe. Adult patients with open-angle glaucoma or ocular hypertension. One eye per patient was analyzed. Patients were randomized 1:1 to receive polyquaternium-1-preserved travoprost 0.003% (n = 442) or benzalkonium chloride-preserved travoprost 0.004% (n = 422) once daily for 3 months. Mean intraocular pressure (IOP) was assessed at 8 AM, 10 AM, and 4 PM at week 2, week 6, and month 3. Supportive outcomes were mean and percent IOP change, percentage of patients achieving IOP reduction, and adverse events. Mean IOP was similar between groups at all study visits (travoprost 0.003% range, 17.5-18.9 mm Hg; travoprost 0.004% range, 17.4-19.0 mm Hg). Mean change (least squares mean differences, -0.1 to 0.3 mm Hg; 95% confidence interval, -0.5 to 0.7 mm Hg) and percentage change (travoprost 0.003%, 28.4%-30.7%; travoprost 0.004%, 28.5%-31.0%) from baseline were comparable. The percentages of patients with IOP reduction of IOP were also similar. Hyperemia was the most frequent treatment-related adverse event with both formulations (travoprost 0.003%, 11.8%; travoprost 0.004%, 14.5%). In patients with open-angle glaucoma or ocular hypertension, polyquaternium-1-preserved travoprost 0.003% solution provided equivalent IOP-lowering efficacy to that of benzalkonium chloride-preserved travoprost 0.004%. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  13. Planets: Integrated Services for Digital Preservation

    OpenAIRE

    Farquhar, Adam; Hockx-Yu, Helen

    2007-01-01

    The Planets Project is developing services and technology to address core challenges in digital preservation. This article introduces the motivation for this work, describes the extensible technical architecture and places the Planets approach into the context of the Open Archival Information System (OAIS) Reference Model. It also provides a scenario demonstrating Planets’ usefulness in solving real-life digital preservation problems and an overview of the project’s progress to date.

  14. Preservation Health Check: Monitoring Threats to Digital Repository Content

    Science.gov (United States)

    Kool, Wouter; van der Werf, Titia; Lavoie, Brian

    2014-01-01

    The Preservation Health Check (PHC) project, undertaken as a joint effort by Open Planets Foundation (OPF) and OCLC Research, aims to evaluate the usefulness of the preservation metadata created and maintained by operational repositories for assessing basic preservation properties. The PHC project seeks to develop an implementable logic to support…

  15. Digital preservation initiatives in the United States: a summary

    OpenAIRE

    Marcum, Deanna

    2003-01-01

    General presentation on how digital preservation issues are being faced in the United States of America. Special reference to the National Digital Information Infrastructure and Preservation Program, that is found at the Library of Congress, and aims to implement a national strategy for the long-term preservation of digital content.

  16. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  17. 4 CFR 25.4 - Preservation of property.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Preservation of property. 25.4 Section 25.4 Accounts GOVERNMENT ACCOUNTABILITY OFFICE GENERAL PROCEDURES CONDUCT IN THE GOVERNMENT ACCOUNTABILITY OFFICE BUILDING AND ON ITS GROUNDS § 25.4 Preservation of property. The improper disposal of rubbish in the GAO...

  18. Subscribe to the Preserve America E-Newsletter

    Science.gov (United States)

    ; the U.S. Departments of Defense, Interior, Agriculture, Commerce, Housing and Urban Development . Department of Commerce seal U.S. Department of Housing and Urban Development logo U.S. Department of the Interior seal Subscribe to the Preserve America E-Newsletter Sign up for the periodical Preserve America e

  19. Tensor network decompositions in the presence of a global symmetry

    International Nuclear Information System (INIS)

    Singh, Sukhwinder; Pfeifer, Robert N. C.; Vidal, Guifre

    2010-01-01

    Tensor network decompositions offer an efficient description of certain many-body states of a lattice system and are the basis of a wealth of numerical simulation algorithms. We discuss how to incorporate a global symmetry, given by a compact, completely reducible group G, in tensor network decompositions and algorithms. This is achieved by considering tensors that are invariant under the action of the group G. Each symmetric tensor decomposes into two types of tensors: degeneracy tensors, containing all the degrees of freedom, and structural tensors, which only depend on the symmetry group. In numerical calculations, the use of symmetric tensors ensures the preservation of the symmetry, allows selection of a specific symmetry sector, and significantly reduces computational costs. On the other hand, the resulting tensor network can be interpreted as a superposition of exponentially many spin networks. Spin networks are used extensively in loop quantum gravity, where they represent states of quantum geometry. Our work highlights their importance in the context of tensor network algorithms as well, thus setting the stage for cross-fertilization between these two areas of research.

  20. Radiation preservation of maize

    International Nuclear Information System (INIS)

    Wasito.

    1980-01-01

    Radiation preservation of maize was carried out. Radiation doses and sources, shielding materials, packaging materials, chemical radiation effects, biological radiation effects, were discussed. Experimental methods, samples and accessories were also presented. (SMN)

  1. Locality-preserving logical operators in topological stabilizer codes

    Science.gov (United States)

    Webster, Paul; Bartlett, Stephen D.

    2018-01-01

    Locality-preserving logical operators in topological codes are naturally fault tolerant, since they preserve the correctability of local errors. Using a correspondence between such operators and gapped domain walls, we describe a procedure for finding all locality-preserving logical operators admitted by a large and important class of topological stabilizer codes. In particular, we focus on those equivalent to a stack of a finite number of surface codes of any spatial dimension, where our procedure fully specifies the group of locality-preserving logical operators. We also present examples of how our procedure applies to codes with different boundary conditions, including color codes and toric codes, as well as more general codes such as Abelian quantum double models and codes with fermionic excitations in more than two dimensions.

  2. Numerical Simulation of Non-Thermal Food Preservation

    Science.gov (United States)

    Rauh, C.; Krauss, J.; Ertunc, Ö.; Delgado, a.

    2010-09-01

    Food preservation is an important process step in food technology regarding product safety and product quality. Novel preservation techniques are currently developed, that aim at improved sensory and nutritional value but comparable safety than in conventional thermal preservation techniques. These novel non-thermal food preservation techniques are based for example on high pressures up to one GPa or pulsed electric fields. in literature studies the high potential of high pressures (HP) and of pulsed electric fields (PEF) is shown due to their high retention of valuable food components as vitamins and flavour and selective inactivation of spoiling enzymes and microorganisms. for the design of preservation processes based on the non-thermal techniques it is crucial to predict the effect of high pressure and pulsed electric fields on the food components and on the spoiling enzymes and microorganisms locally and time-dependent in the treated product. Homogenous process conditions (especially of temperature fields in HP and PEF processing and of electric fields in PEF) are aimed at to avoid the need of over-processing and the connected quality loss and to minimize safety risks due to under-processing. the present contribution presents numerical simulations of thermofluiddynamical phenomena inside of high pressure autoclaves and pulsed electric field treatment chambers. in PEF processing additionally the electric fields are considered. Implementing kinetics of occurring (bio-) chemical reactions in the numerical simulations of the temperature, flow and electric fields enables the evaluation of the process homogeneity and efficiency connected to different process parameters of the preservation techniques. Suggestions to achieve safe and high quality products are concluded out of the numerical results.

  3. Exponential stability of continuous-time and discrete-time bidirectional associative memory networks with delays

    International Nuclear Information System (INIS)

    Liang Jinling; Cao Jinde

    2004-01-01

    First, convergence of continuous-time Bidirectional Associative Memory (BAM) neural networks are studied. By using Lyapunov functionals and some analysis technique, the delay-independent sufficient conditions are obtained for the networks to converge exponentially toward the equilibrium associated with the constant input sources. Second, discrete-time analogues of the continuous-time BAM networks are formulated and studied. It is shown that the convergence characteristics of the continuous-time systems are preserved by the discrete-time analogues without any restriction imposed on the uniform discretionary step size. An illustrative example is given to demonstrate the effectiveness of the obtained results

  4. Minimal Camera Networks for 3D Image Based Modeling of Cultural Heritage Objects

    Science.gov (United States)

    Alsadik, Bashar; Gerke, Markus; Vosselman, George; Daham, Afrah; Jasim, Luma

    2014-01-01

    3D modeling of cultural heritage objects like artifacts, statues and buildings is nowadays an important tool for virtual museums, preservation and restoration. In this paper, we introduce a method to automatically design a minimal imaging network for the 3D modeling of cultural heritage objects. This becomes important for reducing the image capture time and processing when documenting large and complex sites. Moreover, such a minimal camera network design is desirable for imaging non-digitally documented artifacts in museums and other archeological sites to avoid disturbing the visitors for a long time and/or moving delicate precious objects to complete the documentation task. The developed method is tested on the Iraqi famous statue “Lamassu”. Lamassu is a human-headed winged bull of over 4.25 m in height from the era of Ashurnasirpal II (883–859 BC). Close-range photogrammetry is used for the 3D modeling task where a dense ordered imaging network of 45 high resolution images were captured around Lamassu with an object sample distance of 1 mm. These images constitute a dense network and the aim of our study was to apply our method to reduce the number of images for the 3D modeling and at the same time preserve pre-defined point accuracy. Temporary control points were fixed evenly on the body of Lamassu and measured by using a total station for the external validation and scaling purpose. Two network filtering methods are implemented and three different software packages are used to investigate the efficiency of the image orientation and modeling of the statue in the filtered (reduced) image networks. Internal and external validation results prove that minimal image networks can provide highly accurate records and efficiency in terms of visualization, completeness, processing time (>60% reduction) and the final accuracy of 1 mm. PMID:24670718

  5. Minimal camera networks for 3D image based modeling of cultural heritage objects.

    Science.gov (United States)

    Alsadik, Bashar; Gerke, Markus; Vosselman, George; Daham, Afrah; Jasim, Luma

    2014-03-25

    3D modeling of cultural heritage objects like artifacts, statues and buildings is nowadays an important tool for virtual museums, preservation and restoration. In this paper, we introduce a method to automatically design a minimal imaging network for the 3D modeling of cultural heritage objects. This becomes important for reducing the image capture time and processing when documenting large and complex sites. Moreover, such a minimal camera network design is desirable for imaging non-digitally documented artifacts in museums and other archeological sites to avoid disturbing the visitors for a long time and/or moving delicate precious objects to complete the documentation task. The developed method is tested on the Iraqi famous statue "Lamassu". Lamassu is a human-headed winged bull of over 4.25 m in height from the era of Ashurnasirpal II (883-859 BC). Close-range photogrammetry is used for the 3D modeling task where a dense ordered imaging network of 45 high resolution images were captured around Lamassu with an object sample distance of 1 mm. These images constitute a dense network and the aim of our study was to apply our method to reduce the number of images for the 3D modeling and at the same time preserve pre-defined point accuracy. Temporary control points were fixed evenly on the body of Lamassu and measured by using a total station for the external validation and scaling purpose. Two network filtering methods are implemented and three different software packages are used to investigate the efficiency of the image orientation and modeling of the statue in the filtered (reduced) image networks. Internal and external validation results prove that minimal image networks can provide highly accurate records and efficiency in terms of visualization, completeness, processing time (>60% reduction) and the final accuracy of 1 mm.

  6. Information transmission and signal permutation in active flow networks

    Science.gov (United States)

    Woodhouse, Francis G.; Fawcett, Joanna B.; Dunkel, Jörn

    2018-03-01

    Recent experiments show that both natural and artificial microswimmers in narrow channel-like geometries will self-organise to form steady, directed flows. This suggests that networks of flowing active matter could function as novel autonomous microfluidic devices. However, little is known about how information propagates through these far-from-equilibrium systems. Through a mathematical analogy with spin-ice vertex models, we investigate here the input–output characteristics of generic incompressible active flow networks (AFNs). Our analysis shows that information transport through an AFN is inherently different from conventional pressure or voltage driven networks. Active flows on hexagonal arrays preserve input information over longer distances than their passive counterparts and are highly sensitive to bulk topological defects, whose presence can be inferred from marginal input–output distributions alone. This sensitivity further allows controlled permutations on parallel inputs, revealing an unexpected link between active matter and group theory that can guide new microfluidic mixing strategies facilitated by active matter and aid the design of generic autonomous information transport networks.

  7. Triple M-brane configurations and preserved supersymmetries

    Energy Technology Data Exchange (ETDEWEB)

    Golubtsova, A.A., E-mail: siedhe@gmail.com [Institute of Gravitation and Cosmology, Peoples' Friendship University of Russia, 6 Miklukho-Maklaya Str., Moscow 117198 (Russian Federation); Laboratoire de Univers et Théories (LUTh), Observatoire de Paris, Place Jules Janssen 5, 92190 Meudon (France); Ivashchuk, V.D., E-mail: ivashchuk@mail.ru [Center for Gravitation and Fundamental Metrology, VNIIMS, 46 Ozyornaya Str., Moscow 119361 (Russian Federation); Institute of Gravitation and Cosmology, Peoples' Friendship University of Russia, 6 Miklukho-Maklaya Str., Moscow 117198 (Russian Federation)

    2013-07-21

    We investigate all standard triple composite M-brane intersections defined on products of Ricci-flat manifolds for preserving supersymmetries in eleven-dimensional N=1 supergravity. The explicit formulae for computing the numbers of preserved supersymmetries are obtained, which generalize the relations for topologically trivial flat factor spaces presented in the classification by Bergshoeff et al. We obtain certain examples of configurations preserving some fractions of supersymmetries, e.g. containing such factor spaces as K3, C{sub ⁎}{sup 2}/Z{sub 2}, a four-dimensional pp-wave manifold and the two-dimensional pseudo-Euclidean manifold R{sub ⁎}{sup 1,1}/Z{sub 2}.

  8. Corn, alfalfa and grass silage preservation principles

    Science.gov (United States)

    Ensiling is the primary means of preserving moist forages for feeding livestock. In ensiling, the crop is stored anaerobically, and sugars in the crop are fermented by lactic acid bacteria naturally on the crop. The crop is preserved by the combination of the acids produced by the lactic acid bacter...

  9. Home Food Preservation Training for Extension Educators

    Science.gov (United States)

    Goard, Linnette Mizer; Hill, Melinda; Shumaker, Katharine; Warrix, Marisa

    2013-01-01

    During times of economic downturn, there has been an increased interest in home food preservation. As the primary resource for current research-based recommendations, a team of Extension Family and Consumer Sciences educators with specialization in food safety and food preservation responded to this demand by developing a standardized food…

  10. Renormalization in area-preserving maps

    CERN Document Server

    MacKay, R S

    1993-01-01

    This book is adapted and revised from the author's seminal PhD thesis, in which two forms of asymptotically universal structure were presented and explained for area-preserving maps. Area-preserving maps are the discrete-time analogue of two degree-of-freedom Hamiltonian systems. How they work and much of their dynamics are described in this book. The asymptotically universal structure is found on small scales in phase-space and long time-scales. The key to understanding it is renormalisation, that is, looking at a system on successively smaller phase-space and longer time scales. Having prese

  11. Active preservation - otherwise no archives

    International Nuclear Information System (INIS)

    Norberg, E.

    1996-01-01

    The role and history of national and regional archives in Sweden is discussed. It is noted that large portions of our cultural heritage can not be set aside for long-term preservation due to several facts: Some events are never documented, Important records are never set aside, Important information is stored on media that are not suitable for long-term preservation, Information can not be accessed due to inadequate search aids, Eliminations are made due to lack of space. Strategies for an action plan to save valuable material are briefly outlined, and the importance of international cooperation is stressed

  12. Preserving high-purity 233U

    International Nuclear Information System (INIS)

    Krichinsky, Alan; Giaquinto, Joe; Canaan, Doug

    2016-01-01

    The MARC X Conference hosted a workshop for the scientific community to communicate needs for high-purity 233 U and its by-products in order to preserve critical items otherwise slated for downblending and disposal. Currently, only small portions of the U.S. holdings of separated 233 U are being preserved. However, many additional kilograms of 233 U (>97 % pure) still are destined to be disposed, and it is unlikely that this material will ever be replaced due to a lack of operating production capability. Summaries of information conveyed at the workshop and feedback obtained from the scientific community are presented herein. (author)

  13. Active preservation - otherwise no archives

    Energy Technology Data Exchange (ETDEWEB)

    Norberg, E [National Swedish Archives, Stockholm (Sweden)

    1996-12-01

    The role and history of national and regional archives in Sweden is discussed. It is noted that large portions of our cultural heritage can not be set aside for long-term preservation due to several facts: Some events are never documented, Important records are never set aside, Important information is stored on media that are not suitable for long-term preservation, Information can not be accessed due to inadequate search aids, Eliminations are made due to lack of space. Strategies for an action plan to save valuable material are briefly outlined, and the importance of international cooperation is stressed.

  14. Feedback control stabilization of critical dynamics via resource transport on multilayer networks: How glia enable learning dynamics in the brain

    Science.gov (United States)

    Virkar, Yogesh S.; Shew, Woodrow L.; Restrepo, Juan G.; Ott, Edward

    2016-10-01

    Learning and memory are acquired through long-lasting changes in synapses. In the simplest models, such synaptic potentiation typically leads to runaway excitation, but in reality there must exist processes that robustly preserve overall stability of the neural system dynamics. How is this accomplished? Various approaches to this basic question have been considered. Here we propose a particularly compelling and natural mechanism for preserving stability of learning neural systems. This mechanism is based on the global processes by which metabolic resources are distributed to the neurons by glial cells. Specifically, we introduce and study a model composed of two interacting networks: a model neural network interconnected by synapses that undergo spike-timing-dependent plasticity; and a model glial network interconnected by gap junctions that diffusively transport metabolic resources among the glia and, ultimately, to neural synapses where they are consumed. Our main result is that the biophysical constraints imposed by diffusive transport of metabolic resources through the glial network can prevent runaway growth of synaptic strength, both during ongoing activity and during learning. Our findings suggest a previously unappreciated role for glial transport of metabolites in the feedback control stabilization of neural network dynamics during learning.

  15. Effect of Hurdle Technology in Food Preservation: A Review.

    Science.gov (United States)

    Singh, Shiv; Shalini, Rachana

    2016-01-01

    Hurdle technology is used in industrialized as well as in developing countries for the gentle but effective preservation of foods. Hurdle technology was developed several years ago as a new concept for the production of safe, stable, nutritious, tasty, and economical foods. Previously hurdle technology, i.e., a combination of preservation methods, was used empirically without much knowledge of the governing principles. The intelligent application of hurdle technology has become more prevalent now, because the principles of major preservative factors for foods (e.g., temperature, pH, aw, Eh, competitive flora), and their interactions, became better known. Recently, the influence of food preservation methods on the physiology and behavior of microorganisms in foods, i.e. their homeostasis, metabolic exhaustion, stress reactions, are taken into account, and the novel concept of multi-target food preservation emerged. The present contribution reviews the concept of the potential hurdles for foods, the hurdle effect, and the hurdle technology for the prospects of the future goal of a multi-target preservation of foods.

  16. 76 FR 7869 - Notice of Meeting; Advisory Council on Historic Preservation

    Science.gov (United States)

    2011-02-11

    ... ADVISORY COUNCIL ON HISTORIC PRESERVATION Notice of Meeting; Advisory Council on Historic Preservation AGENCY: Advisory Council on Historic Preservation. ACTION: Notice of Meeting. Summary: Notice is hereby given that the Advisory Council on Historic Preservation (ACHP) will meet Thursday, February 17...

  17. 75 FR 71135 - Notice of Meeting; Advisory Council on Historic Preservation

    Science.gov (United States)

    2010-11-22

    ... ADVISORY COUNCIL ON HISTORIC PRESERVATION Notice of Meeting; Advisory Council on Historic Preservation AGENCY: Advisory Council on Historic Preservation. ACTION: Notice of meeting. SUMMARY: Notice is hereby given that the Advisory Council on Historic Preservation (ACHP) will meet Thursday, December 2...

  18. Planets: Integrated Services for Digital Preservation

    Directory of Open Access Journals (Sweden)

    Adam Farquhar

    2007-12-01

    Full Text Available The Planets Project is developing services and technology to address core challenges in digital preservation. This article introduces the motivation for this work, describes the extensible technical architecture and places the Planets approach into the context of the Open Archival Information System (OAIS Reference Model. It also provides a scenario demonstrating Planets’ usefulness in solving real-life digital preservation problems and an overview of the project’s progress to date.

  19. Cancer and fertility: strategies to preserve fertility.

    Science.gov (United States)

    Diedrich, K; Fauser, B C J M; Devroey, P

    2011-03-01

    Fertility preservation is a key component of cancer management in young people. The Fourth Evian Annual Reproduction Workshop Meeting was held in April 2009 to discuss cancer and fertility in young adults. Specialists in oncology, assisted reproduction, embryology and clinical genetics presented published data and ongoing research on cancer and fertility, with particular focus on strategies to preserve fertility. This report is based on the expert presentations and group discussions, supplemented with publications from literature searches and the authors' knowledge. Fertility preservation should be considered for all young people undergoing potentially gonadotoxic cancer treatment. A variety of options are required to facilitate safe and effective fertility preservation for individual patients. Sperm banking is a simple and low-cost intervention. Embryo cryopreservation is the only established method of female fertility preservation. Oocyte cryopreservation offers a useful option for women without a male partner. Emergency ovarian stimulation and cryopreservation of ovarian tissue (followed by tissue transplantation or in-vitro maturation of oocytes) are experimental techniques for women who require urgent cancer treatment. Further prospective studies are required to validate cryopreservation of oocytes and ovarian tissue, in-vitro maturation of oocytes and new vitrification techniques and to identify any long-term sequelae of slow freezing of embryos. Copyright © 2010 Reproductive Healthcare Ltd. Published by Elsevier Ltd. All rights reserved.

  20. Preserve America News

    Science.gov (United States)

    phone number. Whether or not you're able to let us know ahead of time, however, we hope you can join us Amache Preservation Society in Colorado and the Friends of Mount Hope Cemetery in New York. This brings Places: Breathing New Life into Our Communities." Read about this informative session. National

  1. Wood preservative testing

    Science.gov (United States)

    Rebecca Ibach; Stan T. Lebow

    2012-01-01

    Most wood species used in commercial and residential construction have little natural biological durability and will suffer from biodeterioration when exposed to moisture. Historically, this problem has been overcome by treating wood for outdoor use with toxic wood preservatives. As societal acceptance of chemical use changes, there is continual pressure to develop and...

  2. Design of Early Warning System Based on Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Gan Bo

    2018-01-01

    Full Text Available In order to solve the shortcomings of the landslide monitoring technology method, a set of landslides monitoring and early warning system is designed. It can achieve real-time sensor data acquisition, remote transmission and query display. In addition, aiming at the harsh environment of landslide monitoring and the performance requirements of the monitoring system, an improved minimum hop routing protocol is proposed. It can reduce network energy consumption, enhance network robustness, and improve node layout and networking flexibility. In order to realize the remote transmission of data, GPRS wireless communication is used to transmit monitoring data. Combined with remote monitoring center, real-time data display, query, preservation and landslide warning and prediction are realized. The results show that the sensor data acquisition system is accurate, the system is stable, and the node network is flexible. Therefore, the monitoring system has a good use value.

  3. Development of the IAEA’s Knowledge Preservation Portals for Fast Reactors and Gas-Cooled Reactors Knowledge Preservation

    International Nuclear Information System (INIS)

    Batra, C.; Menahem, D. Beraha; Kriventsev, V.; Monti, S.; Reitsma, F.; Grosbois, J. de; Khoroshev, M.; Gladyshev, M.

    2016-01-01

    Full text: The IAEA has been carrying out a dedicated initiative on fast reactor knowledge preservation since 2003. The main objectives of the Fast Reactor Knowledge Portal (FRKP) initiative are to, a) halt the on-going loss of information related to fast reactors (FR), and b) collect, retrieve, preserve and make accessible existing data and information on FR. This portal will help in knowledge sharing, development, search and discovery, collaboration and communication of fast reactor related information. On similar lines a Gas Cooled Fast Reactor Knowledge Preservation portal project also started in 2013. Knowledge portals are capable to control and manage both publicly available as well as controlled information. The portals will not only incorporate existing set of knowledge and information, but will also provide a systemic platform for further preservation of new developments. It will include fast reactor and gas cooled reactor document repositories, project workspaces for the IAEA’s Coordinated Research Projects (CRPs), Technical Meetings (TMs), forums for discussion, etc. The portal will also integrate a taxonomy based search tool, which will help using new semantic search capabilities for improved conceptual retrieve of documents. The taxonomy complies with international web standards as defined by the W3C (World Wide Web Consortium). (author

  4. Cross-border trading and transmission networks: a model for competition in natural gas and electricity grids

    International Nuclear Information System (INIS)

    Hogan, W.W.

    1992-01-01

    Cross border energy trading, for which transmission networks are a vital policy, is expanding. Within an environment of competition and open access, reform of transmission pricing, access and investment is needed. A theoretical framework for such reform is outlined. The design objectives advocated are to maintain a reliable service; to provide economic efficiency; to allow for long-term transmission contracts; to arrange compensation through a settlements system; to allow decomposition by region and company and to preserve administrative feasibility. A ''contract network'' model for transmission rights in a network is discussed. (UK)

  5. Analysis Preservation and Systematic Reinterpretation within the ATLAS experiment

    CERN Document Server

    Heinrich, Lukas; The ATLAS collaboration

    2017-01-01

    The LHC data analysis software used in order to derive and publish experimental results is an important asset that is necessary to preserve in order to fully exploit the scientific potential of a given measurement. An important use-case is the re-usability of the analysis procedure in the context of new scientific studies such as the reinterpretation of searches for new Physics in terms of signal models that not studied in the original publication (RECAST). We present the usage of the graph-based workflow description language yadage to drive the reinterpretation of preserved HEP analyses. The analysis software is preserved using Docker containers, while the workflow structure is preserved using plain JSON documents. This allows the re-execution of complex analysis workflows on modern distributed container orchestration systems and enables a systematic reinterpretation service based on such preserved analysis.

  6. Title: Microbiological quality and preservative capacity of commonly ...

    African Journals Online (AJOL)

    Dr. Mwambete

    in self-pressurized containers, are usually self- preserved and are ... preparations were not included in the study. Due to limited time ... Determination of preservative capacity by cup- plate technique ..... [12] Cosmetic handbook-US. Food and.

  7. [Preservation of live eggs of Schistosoma japonicum].

    Science.gov (United States)

    Lan, Wei-ming; Xie, Shu-ying; Wang, Qin; Jiang, Wei-sheng; Hu, Ren-mei; Ge, Jun; Zeng, Xiao-jun

    2015-10-01

    To observe the preservation time and activity of miracidium hatching from schistosome eggs preserved in different solutions, so as to obtain the optimal preservation conditions and then provide quality control products for field application. The rectum stool of rabbits infected with Schistosoma japonicum was collected and the coarse fecal residue was removed with a series of sample sieves of 80, 100, 160 and 200 meshes respectively, and then the schistosome eggs were concentrated with the sample sieve of 260 meshes. The concentrated eggs were preserved in 0.9% sodium chloride solution, 1.2% sodium chloride solution, phosphate buffered saline solution (PBS, PH 7.2), 1.0% sucrose solution, and Mili-Q water, respectively, and then were conserved in a 4 °C refrigerator and 15 °C constant temperature incubator, respectively. The preserved eggs were hatched in different time (7-day interval) , the vitality and quantity of the miracidia were observed, and the hatching rates were calculated. Under the condition of 4 °C, the hatching rates of eggs dropped to 0 in 1.0% sucrose solution and 1.2% sodium chloride solution at the 49th and 126th day, respectively, and the hatching rates of eggs in the 0.9% sodium chloride solution and PBS solution dropped to 10% at the 112th day, and the activity of miracidium was weakened since 140th. In the Mili-Q water, the hatching rate dropped less than 10% at the 196th day and the activity of miracidia was weakened since the 280th day. Under the condition of 15 °C, the hatching rate of eggs in different solutions gradually dropped to 0 from the 49th day to 105th day. The eggs preserved in Mili-Q water at the temperature of 4 °C can be used as the positive reference for hatching tests within 196 days.

  8. Highly preserved consensus gene modules in human papilloma virus 16 positive cervical cancer and head and neck cancers.

    Science.gov (United States)

    Zhang, Xianglan; Cha, In-Ho; Kim, Ki-Yeol

    2017-12-26

    In this study, we investigated the consensus gene modules in head and neck cancer (HNC) and cervical cancer (CC). We used a publicly available gene expression dataset, GSE6791, which included 42 HNC, 14 normal head and neck, 20 CC and 8 normal cervical tissue samples. To exclude bias because of different human papilloma virus (HPV) types, we analyzed HPV16-positive samples only. We identified 3824 genes common to HNC and CC samples. Among these, 977 genes showed high connectivity and were used to construct consensus modules. We demonstrated eight consensus gene modules for HNC and CC using the dissimilarity measure and average linkage hierarchical clustering methods. These consensus modules included genes with significant biological functions, including ATP binding and extracellular exosome. Eigengen network analysis revealed the consensus modules were highly preserved with high connectivity. These findings demonstrate that HPV16-positive head and neck and cervical cancers share highly preserved consensus gene modules with common potentially therapeutic targets.

  9. 31 CFR 91.4 - Preservation of property.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Preservation of property. 91.4 Section 91.4 Money and Finance: Treasury Regulations Relating to Money and Finance REGULATIONS GOVERNING CONDUCT IN OR ON THE BUREAU OF THE MINT BUILDINGS AND GROUNDS § 91.4 Preservation of property. It shall be...

  10. [ARTHROSCOPIC STUDY OF REMNANT-PRESERVED RECONSTRUCTION OF ANTERIOR CRUCIATE LIGAMENT].

    Science.gov (United States)

    Lu, Daifeng; Xiao, Mochao; Zhang, Yunpeng; Yan, Shi; Dong, Feng; Lian, Yongyun

    2015-08-01

    To investigate the value of ligament remnant preservation during anterior cruciate ligament (ACL) reconstruction by observing the integrity, the tension, the synovial membrane covering, and the color of the reconstructed ligament under arthroscopy. Between January 2011 and December 2013, 122 patients who underwent ACL reconstruction and arthroscopic internal fixation removal at 1 year after reconstruction were included in this study. Of these cases, 61 cases underwent ACL reconstruction using the remnant-preserved technique (preservation group); the other 61 cases underwent ACL reconstruction using non remnant-preserved technique (non preservation group). There was no significant difference in gender, age, injury side, body mass index, type of injury, the time from injury to reconstruction, and the result of KT-2000 examination between 2 groups (P > 0.05). The reconstructed ACL were observed under arthroscopy when internal fixation was removed, and the effectiveness was evaluated according to the criteria of AO Yingfang. In preservation group, the results were excellent in 34 cases, good in 22 cases, fair in 4 cases, and poor in 1 case; and in non preservation group, the results were excellent in 29 cases, good in 20 cases, fair in 10 cases, and poor in 2 cases; and there was no significant difference between 2 groups (Z= -1.320, P=0.187). In ACL reconstruction, the remnant-preserved technique is not obviously better than non remnant-preserved technique in the integrity, tension, membrane covering, and color.

  11. An FPGA bridge preserving traffing quality of service for on-chip network-based systems

    NARCIS (Netherlands)

    Nejad, A.B.; Escudero Martinez, M.; Goossens, K.G.W.

    2011-01-01

    FPGA prototyping of recent large Systems on Chip (SoCs) is very challenging due to the resource limitation of a single FPGA. Moreover, having external access to SoCs for verification and debug purposes is essential. In this paper, we suggest to partition a network-on-chip (NoC) based system into

  12. Preservation vs Innovation. Sustainable rehabilitation in architectural preservation contexts: knowledge, techniques, languages

    Directory of Open Access Journals (Sweden)

    Riccardo Gulli

    2012-12-01

    Full Text Available The theme of the preservation of the characteristics of protected architectural heritage must nowadays be correlated to new requirements for the adaptation of existing buildings to performance standards. This subject raises new questions about the theoretical assumptions and tools to be adopted to coherently answer that request. Focusing on the theme of energy requalification of heritage buildings - the primary focus of interest for the reduction of pollution emissions, according to Horizon 2020 objectives - the preservation of the meanings of an architecture work and of its linguistic, typological and material characteristics proofs to be essential for protection interventions on buildings. However this can’t be considered exhaustive, as the raised issue necessarily requires to be further addressed within the speculative domain of Technique, or rather to open out to the contribution that innovation processes and methods belonging to the field of scientific knowledge could offer.

  13. Compressibility-aware media retargeting with structure preserving.

    Science.gov (United States)

    Wang, Shu-Fan; Lai, Shang-Hong

    2011-03-01

    A number of algorithms have been proposed for intelligent image/video retargeting with image content retained as much as possible. However, they usually suffer from some artifacts in the results, such as ridge or structure twist. In this paper, we present a structure-preserving media retargeting technique that preserves the content and image structure as best as possible. Different from the previous pixel or grid based methods, we estimate the image content saliency from the structure of the content. A block structure energy is introduced with a top-down strategy to constrain the image structure inside to deform uniformly in either x or y direction. However, the flexibilities for retargeting are quite different for different images. To cope with this problem, we propose a compressibility assessment scheme for media retargeting by combining the entropies of image gradient magnitude and orientation distributions. Thus, the resized media is produced to preserve the image content and structure as best as possible. Our experiments demonstrate that the proposed method provides resized images/videos with better preservation of content and structure than those by the previous methods.

  14. Recent developments in persufflation for organ preservation.

    Science.gov (United States)

    Min, Catherine G; Papas, Klearchos K

    2018-06-01

    To summarize current literature and recent findings on the potential of humidified oxygenated gas perfusion (persufflation) as an alternative method for improved organ preservation. Although there are some conflicting data, the majority of the evidence suggests that persufflation, by enhancing oxygenation, can improve preservation and even rescue organs, including organs with prior exposure to warm ischemia. In some cases, persufflation produced better results than hypothermic machine perfusion. The timing of persufflation is of importance; benefits of persufflation appear to increase as the timing of its administration postprocurement decreases. This may be particularly true for tissues that are more sensitive to ischemia, such as the pancreas prior to islet isolation. Combining oxygen persufflation with nitric oxide and addition of pulsatile flow may provide further benefits and amplify its effects on improving transplant outcomes. Persufflation is a promising, relatively simple, preservation technique that enables improved oxygenation, which provides protection and improvement in the graft condition during preservation and prior to transplantation. More detailed studies are needed to optimize persufflation and evaluate its short and long-term effects in vivo.

  15. Knowledge preservation for the future - Phase 1

    International Nuclear Information System (INIS)

    Bowen-Schrire, Monica; Jander, Hans; Waniewska, Katarina

    2007-12-01

    This report summarises the work done in the field of knowledge preservation regarding a repository for spent nuclear fuel in Sweden and in other selected countries. The purpose of the report is to provide a basis for a proposal for an action plan for knowledge preservation regarding a repository for spent nuclear fuel. The report is based upon identified key documents, interviews with key persons, and other relevant sources of information identified throughout the working process. To preserve information and knowledge regarding the repository of spent nuclear fuel for future generations is no simple task. The report covers the basic principles and methods for information preservation and transfer, and describes their advantages and disadvantages. The report also covers topics such as the time perspective, target groups, context, and discusses the difference between the concepts information and knowledge. The conclusions of the report include a number of recommendations for how SKB can continue the work to produce a proposal for an action plan for how the knowledge about a repository for spent nuclear fuel can be kept for future generations

  16. CERN Services for Long Term Data Preservation

    CERN Document Server

    Shiers, Jamie; Blomer, Jakob; Ganis, Gerardo; Dallmeier-Tiessen, Sunje; Simko, Tibor; Cancio Melia, German; CERN. Geneva. IT Department

    2016-01-01

    In this paper we describe the services that are offered by CERN for Long Term preservation of High Energy Physics (HEP) data, with the Large Hadron Collider (LHC) as a key use case. Data preservation is a strategic goal for European High Energy Physics (HEP), as well as for the HEP community worldwide and we position our work in this global content. Specifically, we target the preservation of the scientific data, together with the software, documentation and computing environment needed to process, (re-)analyse or otherwise (re-)use the data. The target data volumes range from hundreds of petabytes (PB – 10^15 bytes) to hundreds of exabytes (EB – 10^18 bytes) for a target duration of several decades. The Use Cases driving data preservation are presented together with metrics that allow us to measure how close we are to meeting our goals, including the possibility for formal certification for at least part of this work. Almost all of the services that we describe are fully generic – the exception being A...

  17. New methods of museum objects preservation

    International Nuclear Information System (INIS)

    Justa, P.

    1988-01-01

    The proceedings contains 22 papers of which four discuss the use of ionizing radiation in the preservation and restoration of cultural objects, this namely: radiation methods used for the impregnation of wooden cultural objects, a mobile irradiation robot and its uses for the preservation of museum objects, X-ray fluorescence analysis as an auxiliary scientific discipline for restorers, and the use of neutron activation analysis for expertise of paintings. Some 230 participants attended the seminar. (J.B.)

  18. Application of preservatives for residual fuels

    International Nuclear Information System (INIS)

    Gorozpe y Munoz, Tomas

    2000-01-01

    Due to the high costs of the combust oils (fuel oil 6) used in generators of vapor and in other treatments, makes important consider the use of preservatives that improve the operation of the units from the operative point of view and of environmental control. The author enumerates several of the problems of corrosion, of efficiency in the combustion and of thermal efficiency; in a same way it enumerates several useful preservatives, to be used in residual fuel

  19. Information-preserving structures: A general framework for quantum zero-error information

    International Nuclear Information System (INIS)

    Blume-Kohout, Robin; Ng, Hui Khoon; Poulin, David; Viola, Lorenza

    2010-01-01

    Quantum systems carry information. Quantum theory supports at least two distinct kinds of information (classical and quantum), and a variety of different ways to encode and preserve information in physical systems. A system's ability to carry information is constrained and defined by the noise in its dynamics. This paper introduces an operational framework, using information-preserving structures, to classify all the kinds of information that can be perfectly (i.e., with zero error) preserved by quantum dynamics. We prove that every perfectly preserved code has the same structure as a matrix algebra, and that preserved information can always be corrected. We also classify distinct operational criteria for preservation (e.g., 'noiseless','unitarily correctible', etc.) and introduce two natural criteria for measurement-stabilized and unconditionally preserved codes. Finally, for several of these operational criteria, we present efficient (polynomial in the state-space dimension) algorithms to find all of a channel's information-preserving structures.

  20. [The health preserving behavior in adolescents].

    Science.gov (United States)

    Al'bitskii, V Iu; Makeev, N I

    2010-01-01

    The article deals with the results of study of health preserving behavior of 310 students of senior classes of high schools of town of Jukovsky of Moskovskaya oblast. The higher level of prevalence of harmful habits among adolescents is revealed. It is emphasized that among girls the prevalence of harmful habits is not at large lower than among boys. The lower level of medical activities of respondents is explained by mistrusting physicians of curative preventive establishments, fear of queues, self-confidence in one's own knowledge and low level of medical awareness. The priority of physical culture and sport in the life of adolescents is reducing. The reorientation of trends in modern fashion to the behavior stereotypes with motional activities restriction occurs. The making of conditions to develop consistent health preserving behavior can become the most important reserve of preservation and enhancement of adolescents' health.

  1. Salvage Stories, Preserving Narratives, and Museum Ships

    Directory of Open Access Journals (Sweden)

    Andrew Sawyer

    2013-11-01

    Full Text Available Preserved ships and other vessels are associated with a historiography, in Europe at least, which is still marked by parochialism, antiquarianism, and celebratory narrative. Many evidence difficult histories, and they are also extremely expensive to preserve. Yet, they are clearly valued, as nations in Europe invest heavily in them. This survey examines a range of European examples as sites of cultural, political and national identity. An analytical framework foregrounding the role of narrative and story reveals three aspects to these exhibits: explicit stories connected with specific nations, often reinforcing broader, sometimes implicit, national narratives; and a teleological sequence of loss, recovery and preservation, influenced by nationality, but very similar in form across Europe

  2. Perception of library staff on the preservation and conservation of ...

    African Journals Online (AJOL)

    Perception of library staff on the preservation and conservation of library resources in the Federal ... Journal Home > Vol 48, No 1-2 (2015) > ... of preservation policy as well as lack of funding to purchase preservation equipment in the library.

  3. Salamander occupancy in headwater stream networks

    Science.gov (United States)

    Grant, E.H.C.; Green, L.E.; Lowe, W.H.

    2009-01-01

    1. Stream ecosystems exhibit a highly consistent dendritic geometry in which linear habitat units intersect to create a hierarchical network of connected branches. 2. Ecological and life history traits of species living in streams, such as the potential for overland movement, may interact with this architecture to shape patterns of occupancy and response to disturbance. Specifically, large-scale habitat alteration that fragments stream networks and reduces connectivity may reduce the probability a stream is occupied by sensitive species, such as stream salamanders. 3. We collected habitat occupancy data on four species of stream salamanders in first-order (i.e. headwater) streams in undeveloped and urbanised regions of the eastern U.S.A. We then used an information-theoretic approach to test alternative models of salamander occupancy based on a priori predictions of the effects of network configuration, region and salamander life history. 4. Across all four species, we found that streams connected to other first-order streams had higher occupancy than those flowing directly into larger streams and rivers. For three of the four species, occupancy was lower in the urbanised region than in the undeveloped region. 5. These results demonstrate that the spatial configuration of stream networks within protected areas affects the occurrences of stream salamander species. We strongly encourage preservation of network connections between first-order streams in conservation planning and management decisions that may affect stream species.

  4. Alternative food-preservation technologies: efficacy and mechanisms.

    Science.gov (United States)

    Lado, Beatrice H; Yousef, Ahmed E

    2002-04-01

    High-pressure processing, ionizing radiation, pulsed electric field and ultraviolet radiation are emerging preservation technologies designed to produce safe food, while maintaining its nutritional and sensory qualities. A sigmoid inactivation pattern is observed in most kinetic studies. Damage to cell membranes, enzymes or DNA is the most commonly cited cause of death of microorganisms by alternative preservation technologies.

  5. Effect of melatonin on kidney cold ischemic preservation injury

    Science.gov (United States)

    Aslaner, Arif; Gunal, Omer; Turgut, Hamdi Taner; Celik, Erdal; Yildirim, Umran; Demirci, Rojbin Karakoyun; Gunduz, Umut Riza; Calis, Hasan; Dogan, Sami

    2013-01-01

    Melatonin is a potent free radical scavenger of reactive oxygen species, nitric oxide synthase inhibitor and a well-known antioxidant secreted from pineal gland. This hormone has been reported to protect tissue from oxidative damage. In this study, we aim to investigate the effect of melatonin on kidney cold ischemia time when added to preservation solution. Thirty male Wistar albino rats were divided equally into three groups; Ringer Lactate (RL) solution, University of Wisconsin (UW) solution with and without melatonin. The serum Lactate Dehydrogenase (LDH) activities of the preservation solutions at 2nd, 24th, 36th, and 48th hours were determined. Tissue malondialdehyde (MDA) levels were also measured and a histological examination was performed at 48th hour. Melatonin that added to preservation solution prevented enzyme elevation and decreased lipid peroxidation in preservation solution when compared to the control group (p<0.05). The histological examination revealed that UW solution containing melatonin significantly prevented the kidney from pathological injury (p<0.05). Melatonin added to preservation solutions such as UW solution seemed to protect the tissue preserved effectively from cold ischemic injury for up to 48 hour. PMID:24179573

  6. Preserving Stability and Rights Protection: Conflict or Coherence?

    Directory of Open Access Journals (Sweden)

    Chongyi Feng

    2013-01-01

    Full Text Available The creation of a new administrative institution known as the “Stability Preservation Office” at the central level, which is overseen by the Chinese Communist Party (CCP Central Committee and has branches at every local level, from streets and townships to enterprises, and has extraordinary powers to override other regular institutions and branches of government, is a clear indication that the Chinese government’s efforts to preserve stability are not limited to the conventional business of crime control or public security. This paper traces the origin of the discourse and practice of preserving stability and the rights defence movement in China, investigating the interplay or interaction between the two. It examines the end and the means of stability preservation, explores whether the measures taken by the government to preserve stability or the rights protection actions taken by citizens are the root cause of social unrest, and whether the suppression of discontent or the improvement of human rights and social justice is the better way to achieve social stability in contemporary China. It contributes to our understanding of emerging state-society relations and the latest social and political trends in China.

  7. Preservative loss from silicone tubing during filling processes.

    Science.gov (United States)

    Saller, Verena; Matilainen, Julia; Rothkopf, Christian; Serafin, Daniel; Bechtold-Peters, Karoline; Mahler, Hanns-Christian; Friess, Wolfgang

    2017-03-01

    Significant loss of preservative was observed during filling of drug products during filling line stops. This study evaluated the losses of three commonly used preservatives in protein drugs, i.e. benzyl alcohol, phenol, and m-cresol. Concentration losses during static incubation were quantified and interpreted with regard to the potential driving forces for the underlying sorption, diffusion, and desorption steps. Partitioning from the solution into the silicone polymer was identified as the most decisive parameter for the extent of preservative loss. Additionally, the influence of tubing inner diameter, starting concentration as well as silicone tubing type was evaluated. Theoretical calculations assuming equilibrium between solution and tubing inner surface and one-directional diffusion following Fick's first law were used to approximate experimental data. Since significant losses were found already after few minutes, adequate measures must be taken to avoid deviations during filling of preservative-containing protein solutions that may impact product quality or antimicrobial efficacy. As a possible alternative to the highly permeable silicone tubing, a specific make of fluoropolymer tubing was identified being suitable for peristaltic pumps and not showing any preservative losses. Copyright © 2016 Elsevier B.V. All rights reserved.

  8. Bacteriocins as food preservatives: Challenges and emerging horizons.

    Science.gov (United States)

    Johnson, Eldin Maliyakkal; Jung, Dr Yong-Gyun; Jin, Dr Ying-Yu; Jayabalan, Dr Rasu; Yang, Dr Seung Hwan; Suh, Joo Won

    2017-09-07

    The increasing demand for fresh-like food products and the potential health hazards of chemically preserved and processed food products have led to the advent of alternative technologies for the preservation and maintenance of the freshness of the food products. One such preservation strategy is the usage of bacteriocins or bacteriocins producing starter cultures for the preservation of the intended food matrixes. Bacteriocins are ribosomally synthesized smaller polypeptide molecules that exert antagonistic activity against closely related and unrelated group of bacteria. This review is aimed at bringing to lime light the various class of bacteriocins mainly from gram positive bacteria. The desirable characteristics of the bacteriocins which earn them a place in food preservation technology, the success story of the same in various food systems, the various challenges and the strategies employed to put them to work efficiently in various food systems has been discussed in this review. From the industrial point of view various aspects like the improvement of the producer strains, downstream processing and purification of the bacteriocins and recent trends in engineered bacteriocins has also been briefly discussed in this review.

  9. Privacy-Preserving Restricted Boltzmann Machine

    Directory of Open Access Journals (Sweden)

    Yu Li

    2014-01-01

    Full Text Available With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM. The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model.

  10. Subretinal electrical stimulation preserves inner retinal function in RCS rat retina.

    Science.gov (United States)

    Ciavatta, Vincent T; Mocko, Julie A; Kim, Moon K; Pardue, Machelle T

    2013-01-01

    did not increase with IR light. The larger post-receptoral responses (Vmax), greater post-receptoral sensitivity (logσ), and larger oscillatory potentials suggest SES-treated eyes maintained better inner retinal function than the opposite, untreated eyes. This suggests that in addition to preserving photoreceptors in RCS rats, SES may also promote more robust signal transmission through the retinal network compared to the control eyes. These studies suggest that the protective effects of SES on RCS retinal function cannot be improved with additional subretinal current induction from the MPA, or the charge injection provided by ERG Ganzfeld flashes was not adequately mimicked by the flashing IR light used in this study.

  11. Development of Domestic Cat Embryo Produced by Preserved Sperms

    Directory of Open Access Journals (Sweden)

    KARTINI ERIANI

    2008-12-01

    Full Text Available The ability to mature and fertilize oocytes of endangered species may allow us to sustain genetic and global biodiversity. Epididymis sperms may be the last chance to ensure preservation of genetic materials after injury or death of a valuable animal. Studies have been conducted to determine wether both epididymis sperms and oocytes can be used to produce viable embryos and offspring. The purpose of this study was to determine how long cats sperms contained in epididymis were remain motile and had intact membranes when preserved at 4 ° C, and to determine whether such those preserved sperms are able to fertilize oocytes. Epididymis was preserved immediately in phosphate buffer saline at 4 ° C for 1, 3, and 6 days. The observation of sperm quality and viability after preservation was performed by vital staining acrosom and Hoechst-Propidium Iodine. Biological functions of sperms were evaluated by in vitro culture technique for fertilization, micro fertilization and embryonic development rate in CR1aa medium. The results showed that average motility of sperms collected from ductus deferens, cauda and corpus epididymis decreased not significantly (P > 0.05 from 0, 1, 3, and 6 days of preservation times (from 83.0%, 80.2%, 79.0%; 80.9%, 75.0%, 75.5%; 52.0%, 63.2%, 55.0% to 34.6%, 34.6%, 33.3%, respectively. The general results showed that sperms from epididymis preserved for 1, 3, and 6 days can be used for IVF. The rate of embryonal cleavage produced by IVF technique using sperms collected from epididymis preserved for 1-, 3- and 6-days were 33.3, 26.7, and 20.0%, respectively and significantly different (p < 0.05 from that of controll (50.0%. In conclusion, sperms contained in epididyimis preserved at 4 ° C in PBS (Phospate Buffer Saline for 1-6 days can be used to IVF and in vitro production of cat embryos.

  12. Default mode network connectivity during task execution.

    Science.gov (United States)

    Vatansever, D; Menon, D K; Manktelow, A E; Sahakian, B J; Stamatakis, E A

    2015-11-15

    Initially described as task-induced deactivations during goal-directed paradigms of high attentional load, the unresolved functionality of default mode regions has long been assumed to interfere with task performance. However, recent evidence suggests a potential default mode network involvement in fulfilling cognitive demands. We tested this hypothesis in a finger opposition paradigm with task and fixation periods which we compared with an independent resting state scan using functional magnetic resonance imaging and a comprehensive analysis pipeline including activation, functional connectivity, behavioural and graph theoretical assessments. The results indicate task specific changes in the default mode network topography. Behaviourally, we show that increased connectivity of the posterior cingulate cortex with the left superior frontal gyrus predicts faster reaction times. Moreover, interactive and dynamic reconfiguration of the default mode network regions' functional connections illustrates their involvement with the task at hand with higher-level global parallel processing power, yet preserved small-world architecture in comparison with rest. These findings demonstrate that the default mode network does not disengage during this paradigm, but instead may be involved in task relevant processing. Copyright © 2015 Elsevier Inc. All rights reserved.

  13. A multiscale network analysis of protected-area connectivity for mammals in the United States.

    Science.gov (United States)

    Minor, Emily S; Lookingbill, Todd R

    2010-12-01

    Protected areas must be close, or connected, enough to allow for the preservation of large-scale ecological and evolutionary processes, such as gene flow, migration, and range shifts in response to climate change. Nevertheless, it is unknown whether the network of protected areas in the United States is connected in a way that will preserve biodiversity over large temporal and spatial scales. It is also unclear whether protected-area networks that function for larger species will function for smaller species. We assessed the connectivity of protected areas in the three largest biomes in the United States. With methods from graph theory--a branch of mathematics that deals with connectivity and flow--we identified and measured networks of protected areas for three different groups of mammals. We also examined the value of using umbrella species (typically large-bodied, far-ranging mammals) in designing large-scale networks of protected areas. Although the total amount of protected land varied greatly among biomes in the United States, overall connectivity did not. In general, protected-area networks were well connected for large mammals but not for smaller mammals. Additionally, it was not possible to predict connectivity for small mammals on the basis of connectivity for large mammals, which suggests the umbrella species approach may not be an appropriate design strategy for conservation networks intended to protect many species. Our findings indicate different strategies should be used to increase the likelihood of persistence for different groups of species. Strategic linkages of existing lands should be a conservation priority for smaller mammals, whereas conservation of larger mammals would benefit most from the protection of more land. © 2010 Society for Conservation Biology.

  14. A Feedback-Based Secure Path Approach for Wireless Sensor Network Data Collection

    Science.gov (United States)

    Mao, Yuxin; Wei, Guiyi

    2010-01-01

    The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use of the routing functionality of wireless sensor networks, to improve the quality of data collection. The major advantage of the approach is that the secure paths are constructed as a by-product of data collection. The process of secure routing causes little overhead to the sensor nodes in the network. Compared with existing works, the algorithms of the proposed approach are easy to implement and execute in resource-constrained wireless sensor networks. According to the result of a simulation experiment, the performance of the approach is better than the recent approaches with a similar purpose. PMID:22163424

  15. A feedback-based secure path approach for wireless sensor network data collection.

    Science.gov (United States)

    Mao, Yuxin; Wei, Guiyi

    2010-01-01

    The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use of the routing functionality of wireless sensor networks, to improve the quality of data collection. The major advantage of the approach is that the secure paths are constructed as a by-product of data collection. The process of secure routing causes little overhead to the sensor nodes in the network. Compared with existing works, the algorithms of the proposed approach are easy to implement and execute in resource-constrained wireless sensor networks. According to the result of a simulation experiment, the performance of the approach is better than the recent approaches with a similar purpose.

  16. A Feedback-Based Secure Path Approach for Wireless Sensor Network Data Collection

    Directory of Open Access Journals (Sweden)

    Guiyi Wei

    2010-10-01

    Full Text Available The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use of the routing functionality of wireless sensor networks, to improve the quality of data collection. The major advantage of the approach is that the secure paths are constructed as a by-product of data collection. The process of secure routing causes little overhead to the sensor nodes in the network. Compared with existing works, the algorithms of the proposed approach are easy to implement and execute in resource-constrained wireless sensor networks. According to the result of a simulation experiment, the performance of the approach is better than the recent approaches with a similar purpose.

  17. Effects of the bipartite structure of a network on performance of recommenders

    Science.gov (United States)

    Wang, Qing-Xian; Li, Jian; Luo, Xin; Xu, Jian-Jun; Shang, Ming-Sheng

    2018-02-01

    Recommender systems aim to predict people's preferences for online items by analyzing their historical behaviors. A recommender can be modeled as a high-dimensional and sparse bipartite network, where the key issue is to understand the relation between the network structure and a recommender's performance. To address this issue, we choose three network characteristics, clustering coefficient, network density and user-item ratio, as the analyzing targets. For the cluster coefficient, we adopt the Degree-preserving rewiring algorithm to obtain a series of bipartite network with varying cluster coefficient, while the degree of user and item keep unchanged. Furthermore, five state-of-the-art recommenders are applied on two real datasets. The performances of recommenders are measured by both numerical and physical metrics. These results show that a recommender's performance is positively related to the clustering coefficient of a bipartite network. Meanwhile, higher density of a bipartite network can provide more accurate but less diverse or novel recommendations. Furthermore, the user-item ratio is positively correlated with the accuracy metrics but negatively correlated with the diverse and novel metrics.

  18. Toward privacy-preserving JPEG image retrieval

    Science.gov (United States)

    Cheng, Hang; Wang, Jingyue; Wang, Meiqing; Zhong, Shangping

    2017-07-01

    This paper proposes a privacy-preserving retrieval scheme for JPEG images based on local variance. Three parties are involved in the scheme: the content owner, the server, and the authorized user. The content owner encrypts JPEG images for privacy protection by jointly using permutation cipher and stream cipher, and then, the encrypted versions are uploaded to the server. With an encrypted query image provided by an authorized user, the server may extract blockwise local variances in different directions without knowing the plaintext content. After that, it can calculate the similarity between the encrypted query image and each encrypted database image by a local variance-based feature comparison mechanism. The authorized user with the encryption key can decrypt the returned encrypted images with plaintext content similar to the query image. The experimental results show that the proposed scheme not only provides effective privacy-preserving retrieval service but also ensures both format compliance and file size preservation for encrypted JPEG images.

  19. Organizational prerequisites for the preservation of library collections in monastery libraries

    Directory of Open Access Journals (Sweden)

    Maja Krtalić

    2012-02-01

    Full Text Available The aim of the paper is to investigate the preservation of written heritage in monastery libraries from legislative, institutional and organizational perspectives, and establish the necessary organizational prerequisites for improvement. Setting off from the presupposition that the library collections of monastery libraries are of immense cultural value, and can therefore be considered cultural good and part of Croatian written heritage, the paper discussed the need for a systematic approach to its protection, both on the operative level, in libraries themselves, and on the strategic level, by the authorities and other relevant institutions in the Republic of Croatia. In addition to the analysis of the legal and institutional frameworks and library collections preservation projects, three case studies were conducted in Franciscan monasteries in Mostar, Požega and Zadar, including interviews with their managers and one subject from the Croatian Institute of Librarianship. The case study aimed to investigate the context of the preservation of library collections in monastery libraries and provide answers to the following questions: how is the preservation in monastery libraries defined; how does it differ from the preservation in other libraries, and how is the preservation of collections in these libraries organized on institutional, local, and national levels? The research sets off from several core presuppositions: monastery libraries have valuable collections of Croatian and European written heritage; the heritage collections in monastery libraries are not investigated, organized, protected or presented at an adequate level; the responsibility for its preservation is not clearly assigned, there is not enough staff trained for preservation; the improvements in preservation and availability of library collections in monastery libraries should result from a better organization and management of the heritage preservation system in monastery

  20. Contact allergy to preservatives in patients with occupational contact dermatitis and exposure analysis of preservatives in registered chemical products for occupational use

    DEFF Research Database (Denmark)

    Schwensen, Jakob Ferløv; Friis, Ulrik Fischer; Menné, Torkil

    2017-01-01

    PURPOSE: The aim of the study is to investigate risk factors for sensitization to preservatives and to examine to which extent different preservatives are registered in chemical products for occupational use in Denmark. METHODS: A retrospective epidemiological observational analysis of data from...... a university hospital was conducted. All patients had occupational contact dermatitis and were consecutively patch tested with 11 preservatives from the European baseline series and extended patch test series during a 5-year period: 2009-2013. Information regarding the same preservatives in chemical products...... in several product categories, e.g., 'paints and varnishes', 'cleaning agents', 'cooling agents', and 'polishing agents'. Formaldehyde and isothiazolinones were extensively registered in PROBAS. CONCLUSIONS: The extensive use of formaldehyde and isothiazolinones in chemical products for occupational use may...

  1. Integrating Space Communication Network Capabilities via Web Portal Technologies

    Science.gov (United States)

    Johnston, Mark D.; Lee, Carlyn-Ann; Lau, Chi-Wung; Cheung, Kar-Ming; Levesque, Michael; Carruth, Butch; Coffman, Adam; Wallace, Mike

    2014-01-01

    We have developed a service portal prototype as part of an investigation into the feasibility of using Java portlet technology as a means of providing integrated access to NASA communications network services. Portal servers provide an attractive platform for this role due to the various built-in collaboration applications they can provide, combined with the possibility to develop custom inter-operating portlets to extent their functionality while preserving common presentation and behavior. This paper describes various options for integration of network services related to planning and scheduling, and results based on use of a popular open-source portal framework. Plans are underway to develop an operational SCaN Service Portal, building on the experiences reported here.

  2. Foodstuffs preservation by ionization

    International Nuclear Information System (INIS)

    1991-12-01

    This document contains all the papers presented at the meeting on foodstuffs preservation by ionization. These papers deal especially with the food ionization process, its development and the view of the food industry on ionization. Refs and figs (F.M.)

  3. Analysis Preservation and Systematic Reinterpretation within the ATLAS Experiment

    CERN Document Server

    Heinrich, Lukas; The ATLAS collaboration

    2017-01-01

    The LHC data analysis software used in order to derive and publish experimental results is an important asset that is necessary to preserve in order to fully exploit the scientific potential of a given measurement. Among others, important use cases of analysis preservation are the reproducibility of the original results and the reusability of the analysis procedure in the context of new scientific studies. A prominent use-case for the latter is the systematic reinterpretation of searches for new Physics in terms of signal models that not studied in the original publication (RECAST). This paper presents the usage of the graph-based workflow description language yadage to drive the reinterpretation of preserved HEP analyses. The analysis software for individual states in the analysis is preserved using Docker containers, while the workflow structure is preserved using plain JSON documents. This allows the re-execution of complex analysis workflows on industry standard container-based distributed computing clust...

  4. ACHP | Working Together to Build a More Inclusive Preservation Program

    Science.gov (United States)

    do you think historic preservation matters? Historic preservation, long touted as an economic . Preservation is also an essential component of placemaking, as the National Trust's Main Street and Places that , one of the region's most visited tourism sites, an essential engine of the local economy, and a

  5. 46 CFR 160.001-2 - General characteristics of life preservers.

    Science.gov (United States)

    2010-10-01

    ... Section 160.001-2 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT....001-2 General characteristics of life preservers. (a) A life preserver must be of such construction... which may be expected in the normal usage of the life preserver. All components used in the construction...

  6. A comparative study of a preservative-free latanoprost cationic emulsion (Catioprost) and a BAK-preserved latanoprost solution in animal models.

    Science.gov (United States)

    Daull, Philippe; Buggage, Ronald; Lambert, Grégory; Faure, Marie-Odile; Serle, Janet; Wang, Rong-Fang; Garrigue, Jean-Sébastien

    2012-10-01

    Benzalkonium chloride (BAK), a common preservative in eye drops, can induce ocular surface toxicity that may decrease glaucoma therapy compliance. The ocular hypotensive effect, pharmacokinetic (PK) profiles, and local tolerance of a preservative-free latanoprost 0.005% cationic emulsion (Catioprost(®)), and a BAK-preserved latanoprost 0.005% solution (Xalatan(®)), were compared. The ocular hypotensive effect was evaluated in monkeys with elevated intraocular pressure (IOP) induced by laser photocoagulation of the trabecular meshwork. Each monkey (n=8) received both latanoprost formulations once daily for 5 consecutive treatment days in a crossover design with at least a 2-week washout period between treatments. IOP was measured at baseline (on day 1, no instillation), on vehicle treatment day (day 0), and on treatment days 1, 3, and 5 before drug instillation and then hourly for 6 h. In rabbits, the ocular and systemic concentrations of latanoprost free acid were determined following a single instillation and the local tolerance of twice daily instillations over 28 days was assessed. Both the preservative-free and BAK-preserved latanoprost formulations shared the same efficacy profile with the maximum IOP reduction occurring 2 h after each morning dose (-15%, -20%, and -26%; -15%, -23%, and -23% on days 1, 3, and 5, respectively) and lasting through 24 h. The equivalence in efficacy was confirmed by the PK data demonstrating similar area under the curves (AUCs). While both formulations were well tolerated, the incidence of conjunctival hyperemia was reduced by 42% with the BAK-free latanoprost cationic emulsion. In animal models, a preservative-free latanoprost cationic emulsion was as effective as Xalatan(®) for lowering IOP with an improved ocular tolerance profile.

  7. Cancer, Fertility Preservation, and Future Pregnancy: A Comprehensive Review

    OpenAIRE

    Matthews, Michelle L.; Hurst, Bradley S.; Marshburn, Paul B.; Usadi, Rebecca S.; Papadakis, Margaret A.; Sarantou, Terry

    2012-01-01

    Given the increases in 5-year cancer survival and recent advances in fertility preserving technologies, an increasing number of women with cancer are presenting for discussion of fertility preserving options. This review will summarize the risk of infertility secondary to cancer treatment, available treatment options for fertility preservation, and techniques to reduce future risks for patients. Concerns that will be addressed include the risk of the medications and procedures, the potential ...

  8. Integral-preserving integrators

    International Nuclear Information System (INIS)

    McLaren, D I; Quispel, G R W

    2004-01-01

    Ordinary differential equations having a first integral may be solved numerically using one of several methods, with the integral preserved to machine accuracy. One such method is the discrete gradient method. It is shown here that the order of the method can be bootstrapped repeatedly to higher orders of accuracy. The method is illustrated using the Henon-Heiles system. (letter to the editor)

  9. Mechanism for Burgess Shale-type preservation

    DEFF Research Database (Denmark)

    Gaines, Robert R.; Hammarlund, Emma U.; Hou, Xianguang

    2012-01-01

    Exceptionally preserved fossil biotas of the Burgess Shale and a handful of other similar Cambrian deposits provide rare but critical insights into the early diversification of animals. The extraordinary preservation of labile tissues in these geographically widespread but temporally restricted......-oxygen bottom water conditions at the sites of deposition resulted in reduced oxidant availability. Subsequently, rapid entombment of fossils in fine-grained sediments and early sealing of sediments by pervasive carbonate cements at bed tops restricted oxidant flux into the sediments. A permeability barrier...

  10. Data Preservation in High Energy Physics

    CERN Document Server

    Mount, Richard; Le Diberder, Francois; Dubois-Felsmann, Gregory; Neal, Homer; Bellis, Matt; Boehnlein, Amber; Votava, Margaret; White, Vicky; Wolbers, Stephen; Konigsberg, Jacobo; Roser, Robert; Snider, Rick; Lucchesi, Donatella; Denisov, Dmitri; Soldner-Rembold, Stefan; Li, Qizhong; Varnes, Erich; Jonckheere, Alan; Gasthuber, Martin; Gülzow, Volker; Kemp, Yves; Ozerov, Dmitri; Diaconu, Cristinel; South, David; Lobodzinski, Bogdan; Olsson, Jan; Haas, Tobias; Wrona, Krzysztof; Szuba, Janusz; Schnell, Gunar; Sasaki, Takashi; Katayama, Nobu; Hernandez, Fabio; Mele, Salvatore; Holzner, Andre; Hemmer, Frederic; Schroeder, Matthias; Barring, Olof; Brun, Rene; Maggi, Marcello; Igo-Kemenes, Peter; Van Wezel, Jos; Heiss, Andreas; Chen, Gang; Wang, Yifang; Asner, David; Riley, Daniel; Corney, David; Gordon, John

    2009-01-01

    Data from high-energy physics (HEP) experiments are collected with significant financial and human effort and are mostly unique. At the same time, HEP has no coherent strategy for data preservation and re-use. An inter-experimental Study Group on HEP data preservation and long-term analysis was convened at the end of 2008 and held two workshops, at DESY (January 2009) and SLAC (May 2009). This document is an intermediate report to the International Committee for Future Accelerators (ICFA) of the reflections of this Study Group.

  11. Pricing policy for declining demand using item preservation technology.

    Science.gov (United States)

    Khedlekar, Uttam Kumar; Shukla, Diwakar; Namdeo, Anubhav

    2016-01-01

    We have designed an inventory model for seasonal products in which deterioration can be controlled by item preservation technology investment. Demand for the product is considered price sensitive and decreases linearly. This study has shown that the profit is a concave function of optimal selling price, replenishment time and preservation cost parameter. We simultaneously determined the optimal selling price of the product, the replenishment cycle and the cost of item preservation technology. Additionally, this study has shown that there exists an optimal selling price and optimal preservation investment to maximize the profit for every business set-up. Finally, the model is illustrated by numerical examples and sensitive analysis of the optimal solution with respect to major parameters.

  12. Convolutional networks for fast, energy-efficient neuromorphic computing.

    Science.gov (United States)

    Esser, Steven K; Merolla, Paul A; Arthur, John V; Cassidy, Andrew S; Appuswamy, Rathinakumar; Andreopoulos, Alexander; Berg, David J; McKinstry, Jeffrey L; Melano, Timothy; Barch, Davis R; di Nolfo, Carmelo; Datta, Pallab; Amir, Arnon; Taba, Brian; Flickner, Myron D; Modha, Dharmendra S

    2016-10-11

    Deep networks are now able to achieve human-level performance on a broad spectrum of recognition tasks. Independently, neuromorphic computing has now demonstrated unprecedented energy-efficiency through a new chip architecture based on spiking neurons, low precision synapses, and a scalable communication network. Here, we demonstrate that neuromorphic computing, despite its novel architectural primitives, can implement deep convolution networks that (i) approach state-of-the-art classification accuracy across eight standard datasets encompassing vision and speech, (ii) perform inference while preserving the hardware's underlying energy-efficiency and high throughput, running on the aforementioned datasets at between 1,200 and 2,600 frames/s and using between 25 and 275 mW (effectively >6,000 frames/s per Watt), and (iii) can be specified and trained using backpropagation with the same ease-of-use as contemporary deep learning. This approach allows the algorithmic power of deep learning to be merged with the efficiency of neuromorphic processors, bringing the promise of embedded, intelligent, brain-inspired computing one step closer.

  13. Axon diodes for the reconstruction of oriented neuronal networks in microfluidic chambers

    DEFF Research Database (Denmark)

    Peyrin, Jean Michel; Deleglise, Bérangère; Saias, Laure

    2011-01-01

    Various experimental models are used to study brain development and degeneration. They range from whole animal models, which preserve anatomical structures but strongly limit investigations at the cellular level, to dissociated cell culture systems that allow detailed observation of cell phenotypes...... and neurodegenerative disorder such as Alzheimer and Parkinson diseases at the sub-cellular, cellular and network levels....

  14. Preservation of autophagy should not direct nutritional therapy

    NARCIS (Netherlands)

    McClave, S.A.; Weijs, P.J.M.

    2015-01-01

    PURPOSE OF REVIEW: Recent reports in the literature have proposed that forced mandatory feeding should be avoided in the first week of critical illness to preserve autophagy, in order to maximize responses to oxidative stress, preserve organ function, and improve outcomes. RECENT FINDINGS: Autophagy

  15. Improved multi-microphone noise reduction preserving binaural cues

    NARCIS (Netherlands)

    Koutrouvelis, A.; Hendriks, R.C.; Jensen, J; Heusdens, R.; Dong, Min; Zheng, Thomas Fang

    2016-01-01

    We propose a new multi-microphone noise reduction technique for binaural cue preservation of the desired source and the interferers. This method is based on the linearly constrained minimum variance (LCMV) framework, where the constraints are used for the binaural cue preservation of the desired

  16. 5 CFR 2411.14 - Record retention and preservation.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Record retention and preservation. 2411.14 Section 2411.14 Administrative Personnel FEDERAL LABOR RELATIONS AUTHORITY, GENERAL COUNSEL OF THE... OFFICIAL INFORMATION § 2411.14 Record retention and preservation. The Authority, the General Counsel, the...

  17. POLARISATION PRESERVING OPTICAL FIBRE

    DEFF Research Database (Denmark)

    2000-01-01

    . This cladding structure provides polarisation preserving properties to the optical fibre. Optical fibres using this technology may have claddings with elements placed non-periodically as well as in a two-dimensional periodic lattice - such as cladding providing Photonic Band Gap (PBG) effects....

  18. Preserved speech abilities and compensation following prefrontal damage.

    Science.gov (United States)

    Buckner, R L; Corbetta, M; Schatz, J; Raichle, M E; Petersen, S E

    1996-02-06

    Lesions to left frontal cortex in humans produce speech production impairments (nonfluent aphasia). These impairments vary from subject to subject and performance on certain speech production tasks can be relatively preserved in some patients. A possible explanation for preservation of function under these circumstances is that areas outside left prefrontal cortex are used to compensate for the injured brain area. We report here a direct demonstration of preserved language function in a stroke patient (LF1) apparently due to the activation of a compensatory brain pathway. We used functional brain imaging with positron emission tomography (PET) as a basis for this study.

  19. Orbital preservation in a maxillectomy

    Energy Technology Data Exchange (ETDEWEB)

    Tanaka, Katsuhiko; Nishikawa, Hitomi; Kumagai, Masahiko; Dosaka, Yoshihiro; Kuroda, Toru; Atago, Yoshihiro; Nishio, Masamichi [Sapporo National Hospital (Japan)

    1999-07-01

    In the past 9 years, 38 patients of the maxillary cancer were treated by a combination of radiation and surgery. Sixteen patients showed the orbital involvement as confirmed by a CT scan and/or MRI. An orbital excenteration was necessary in 6 patients, due mainly to deep intraorbital invasion, while in 10, the orbital contents were preserved despite the involvement of the orbital capsule. The local rate of the orbital region in the latter patients evaluated at 48 months after the initial surgery was 44%. For the treatment of the recurrence at the orbital capsule. The application of gold grain (Au{sup 198}) thus appeared to be a useful tool for further preserving the eye. (author)

  20. Orbital preservation in a maxillectomy

    International Nuclear Information System (INIS)

    Tanaka, Katsuhiko; Nishikawa, Hitomi; Kumagai, Masahiko; Dosaka, Yoshihiro; Kuroda, Toru; Atago, Yoshihiro; Nishio, Masamichi

    1999-01-01

    In the past 9 years, 38 patients of the maxillary cancer were treated by a combination of radiation and surgery. Sixteen patients showed the orbital involvement as confirmed by a CT scan and/or MRI. An orbital excenteration was necessary in 6 patients, due mainly to deep intraorbital invasion, while in 10, the orbital contents were preserved despite the involvement of the orbital capsule. The local rate of the orbital region in the latter patients evaluated at 48 months after the initial surgery was 44%. For the treatment of the recurrence at the orbital capsule. The application of gold grain (Au 198 ) thus appeared to be a useful tool for further preserving the eye. (author)

  1. Preserved entropy and fragile magnetism.

    Science.gov (United States)

    Canfield, Paul C; Bud'ko, Sergey L

    2016-08-01

    A large swath of quantum critical and strongly correlated electron systems can be associated with the phenomena of preserved entropy and fragile magnetism. In this overview we present our thoughts and plans for the discovery and development of lanthanide and transition metal based, strongly correlated systems that are revealed by suppressed, fragile magnetism, quantum criticality, or grow out of preserved entropy. We will present and discuss current examples such as YbBiPt, YbAgGe, YbFe2Zn20, PrAg2In, BaFe2As2, CaFe2As2, LaCrSb3 and LaCrGe3 as part of our motivation and to provide illustrative examples.

  2. Food preservation by irradiation

    International Nuclear Information System (INIS)

    Kooij, J. van

    1981-01-01

    Twenty-five years of development work on the preservation of food by irradiation have shown that this technology has the potential to reduce post-harvest losses and to produce safe foods. The technological feasibility has been established but general acceptance of food irradiation by national regulatory bodies and consumers requires attention. The positive aspects of food preservation by irradiation include: the food keeps its freshness and its physical state, agents which cause spoilage (bacteria, etc.) are eliminated, recontamination does not take place, provided packaging materials are impermeable to bacteria and insects. It inhibits sprouting of root crops, kills insects and parasites, inactivates bacteria, spores and moulds, delays ripening of fruit, improves the technological properties of food. It makes foods biologically safe, allows the production of shelf-stable foods and is excellent for quarantine treatment, and generally improves food hygiene. The dose ranges needed for effective treatment are given

  3. Opportunistic Adaptive Transmission for Network Coding Using Nonbinary LDPC Codes

    Directory of Open Access Journals (Sweden)

    Cocco Giuseppe

    2010-01-01

    Full Text Available Network coding allows to exploit spatial diversity naturally present in mobile wireless networks and can be seen as an example of cooperative communication at the link layer and above. Such promising technique needs to rely on a suitable physical layer in order to achieve its best performance. In this paper, we present an opportunistic packet scheduling method based on physical layer considerations. We extend channel adaptation proposed for the broadcast phase of asymmetric two-way bidirectional relaying to a generic number of sinks and apply it to a network context. The method consists of adapting the information rate for each receiving node according to its channel status and independently of the other nodes. In this way, a higher network throughput can be achieved at the expense of a slightly higher complexity at the transmitter. This configuration allows to perform rate adaptation while fully preserving the benefits of channel and network coding. We carry out an information theoretical analysis of such approach and of that typically used in network coding. Numerical results based on nonbinary LDPC codes confirm the effectiveness of our approach with respect to previously proposed opportunistic scheduling techniques.

  4. Preservation of methane hydrate at 1 atm

    Science.gov (United States)

    Stern, L.A.; Circone, S.; Kirby, S.H.; Durham, W.B.

    2001-01-01

    A "pressure-release" method that enables reproducible bulk preservation of pure, porous, methane hydrate at conditions 50 to 75 K above its equilibrium T (193 K) at 1 atm is refined. The amount of hydrate preserved by this method appears to be greatly in excess of that reported in the previous citations, and is likely the result of a mechanism different from ice shielding.

  5. Biopolymers for Sample Collection, Protection, and Preservation

    Science.gov (United States)

    2015-05-19

    knowledge of sample collection from various matrices is crucial. Recovery and preservation of microorganisms prior to analysis are important...Another method for encapsulating bacteria for use in biodegradation of gasoline involves a complex process using gellan gum (Moslemy et al. 2002). Many...use of acacia gum in preserving microorganisms for extended periods of time without refrigeration (Krumnow et al. 2009; Sorokulova et al. 2008, 2012

  6. Central structure preservation of the reversal sign

    International Nuclear Information System (INIS)

    Chen, C.J.

    1999-01-01

    We report serial changes of central structure preservation of the reversal sign in a case of child abuse. The serial CT images show that the relatively spared attenuation at the basal ganglia, thalami, and posterior fossa develops before the occurrence of transtentorial herniation. This finding makes the theory that central preservation of the reversal sign is due to pressure relief after transtentorial herniation less convincible. (orig.)

  7. Central structure preservation of the reversal sign

    Energy Technology Data Exchange (ETDEWEB)

    Chen, C.J. [Dept. of Diagnostic Radiology, Chang Gung Memorial Hospital, Taipei (Taiwan)

    1999-12-01

    We report serial changes of central structure preservation of the reversal sign in a case of child abuse. The serial CT images show that the relatively spared attenuation at the basal ganglia, thalami, and posterior fossa develops before the occurrence of transtentorial herniation. This finding makes the theory that central preservation of the reversal sign is due to pressure relief after transtentorial herniation less convincible. (orig.)

  8. 2015 Site Environmental Report Fernald Preserve

    Energy Technology Data Exchange (ETDEWEB)

    Hertel, Bill [Navarro Research and Engineering, Oak Ridge, TN (United States); Hooten, Gwen [US Department of Energy, Washington, DC (United States)

    2016-05-01

    The Fernald Preserve 2015 Site Environmental Report provides stakeholders with the results from the Fernald, Ohio, Site’s environmental monitoring programs for 2015; a summary of the U.S. Department of Energy’s (DOE’s) activities conducted onsite; and a summary of the Fernald Preserve’s compliance with the various environmental regulations, compliance agreements, and DOE policies that govern site activities. This report has been prepared in accordance with the “Integrated Environmental Monitoring Plan,” which is Attachment D of the Comprehensive Legacy Management and Institutional Controls Plan (LMICP) (DOE 2016). Remediation of the Fernald Preserve has been successfully completed with the exception of the groundwater. During 2015, activities at the Fernald Preserve included: environmental monitoring activities related to direct radiation, groundwater, and surface water; ecological restoration monitoring and maintenance as well as inspections, care, and monitoring of the site and the OSDF to ensure that provisions of the LMICP are fully implemented; OSDF leak detection monitoring and collection, monitoring, and treatment of leachate from the OSDF; extraction, monitoring, and treatment of contaminated groundwater from the Great Miami Aquifer (Operable Unit 5); ongoing operation of the Fernald Preserve Visitors Center, associated outreach, and educational activities; and monitoring as specified in the site’s National Pollutant Discharge Elimination System (NPDES) permit. Environmental monitoring programs were developed to ensure that the remedy remains protective of the environment. The requirements of these programs are described in detail in the LMICP and reported in this Site Environmental Report.

  9. Ordinary differential equations and Boolean networks in application to modelling of 6-mercaptopurine metabolism.

    Science.gov (United States)

    Lavrova, Anastasia I; Postnikov, Eugene B; Zyubin, Andrey Yu; Babak, Svetlana V

    2017-04-01

    We consider two approaches to modelling the cell metabolism of 6-mercaptopurine, one of the important chemotherapy drugs used for treating acute lymphocytic leukaemia: kinetic ordinary differential equations, and Boolean networks supplied with one controlling node, which takes continual values. We analyse their interplay with respect to taking into account ATP concentration as a key parameter of switching between different pathways. It is shown that the Boolean networks, which allow avoiding the complexity of general kinetic modelling, preserve the possibility of reproducing the principal switching mechanism.

  10. How preservation time changes the linear viscoelastic properties of porcine liver.

    Science.gov (United States)

    Wex, C; Stoll, A; Fröhlich, M; Arndt, S; Lippert, H

    2013-01-01

    The preservation time of a liver graft is one of the crucial factors for the success of a liver transplantation. Grafts are kept in a preservation solution to delay cell destruction and cellular edema and to maximize organ function after transplantation. However, longer preservation times are not always avoidable. In this paper we focus on the mechanical changes of porcine liver with increasing preservation time, in order to establish an indicator for the quality of a liver graft dependent on preservation time. A time interval of 26 h was covered and the rheological properties of liver tissue studied using a stress-controlled rheometer. For samples of 1 h preservation time 0.8% strain was found as the limit of linear viscoelasticity. With increasing preservation time a decrease in the complex shear modulus as an indicator for stiffness was observed for the frequency range from 0.1 to 10 Hz. A simple fractional derivative representation of the Kelvin Voigt model was applied to gain further information about the changes of the mechanical properties of liver with increasing preservation time. Within the small shear rate interval of 0.0001-0.01 s⁻¹ the liver showed Newtonian-like flow behavior.

  11. Privacy-Preserving Data Publishing An Overview

    CERN Document Server

    Wong, Raymond Chi-Wing

    2010-01-01

    Privacy preservation has become a major issue in many data analysis applications. When a data set is released to other parties for data analysis, privacy-preserving techniques are often required to reduce the possibility of identifying sensitive information about individuals. For example, in medical data, sensitive information can be the fact that a particular patient suffers from HIV. In spatial data, sensitive information can be a specific location of an individual. In web surfing data, the information that a user browses certain websites may be considered sensitive. Consider a dataset conta

  12. Preservation of RNA and DNA from mammal samples under field conditions.

    Science.gov (United States)

    Camacho-Sanchez, Miguel; Burraco, Pablo; Gomez-Mestre, Ivan; Leonard, Jennifer A

    2013-07-01

    Ecological and conservation genetics require sampling of organisms in the wild. Appropriate preservation of the collected samples, usually by cryostorage, is key to the quality of the genetic data obtained. Nevertheless, cryopreservation in the field to ensure RNA and DNA stability is not always possible. We compared several nucleic acid preservation solutions appropriate for field sampling and tested them on rat (Rattus rattus) blood, ear and tail tip, liver, brain and muscle. We compared the efficacy of a nucleic acid preservation (NAP) buffer for DNA preservation against 95% ethanol and Longmire buffer, and for RNA preservation against RNAlater (Qiagen) and Longmire buffer, under simulated field conditions. For DNA, the NAP buffer was slightly better than cryopreservation or 95% ethanol, but high molecular weight DNA was preserved in all conditions. The NAP buffer preserved RNA as well as RNAlater. Liver yielded the best RNA and DNA quantity and quality; thus, liver should be the tissue preferentially collected from euthanized animals. We also show that DNA persists in nonpreserved muscle tissue for at least 1 week at ambient temperature, although degradation is noticeable in a matter of hours. When cryopreservation is not possible, the NAP buffer is an economical alternative for RNA preservation at ambient temperature for at least 2 months and DNA preservation for at least 10 months. © 2013 John Wiley & Sons Ltd.

  13. Fertility preservation: a pilot study to assess previsit patient knowledge quantitatively.

    Science.gov (United States)

    Balthazar, Ursula; Fritz, Marc A; Mersereau, Jennifer E

    2011-05-01

    To provide a quantitative assessment of patient knowledge about fertility and fertility preservation treatment options before the initial fertility preservation consultation at a university-based fertility preservation center. Prospective pilot survey containing 13 items assessing patient knowledge about fertility preservation, including the available treatment options and their requirements, success rates, and associated risks. University-based IVF center. Women aged 18 to 41 years with illnesses requiring treatments posing a serious threat to future fertility who were referred for fertility preservation consultation between April 2009 and June 2010. None. Knowledge score. Forty-one eligible patients were identified, and all completed surveys before their consultation. A knowledge score was generated for each patient with 1 point awarded for each correct answer. Overall, patients had poor previsit fertility preservation knowledge (mean score 5.9±2.7). Higher knowledge scores were correlated with personal experience with infertility and previous exposure to fertility preservation treatment information. There was no correlation between knowledge score and age, relationship status, pregnancy history, education, or income. Patients seen for fertility preservation consultation at our university-based center generally tend to be in their early 30s, white, well educated, and married. Previsit knowledge about fertility preservation treatment options was poor and did not correlate with age, education, and relationship status. Copyright © 2011 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  14. Preservation of Electronic Scholarly Publishing: An Analysis of Three Approaches

    Science.gov (United States)

    Honey, Sadie L.

    2005-01-01

    Scholars publish in journals to preserve their work and to make sure that it is available for current and future researchers. More and more of this publishing is done in electronic format. Libraries, the institutions that have traditionally overseen the preservation of print publications, are now struggling with the preservation of digital…

  15. Glycerol and microwave preservation of annual statice (Limonium sinuatum Mill.)

    International Nuclear Information System (INIS)

    Paparozzi, E.T.; McCallister, D.E.

    1988-01-01

    Stems of annual statice (Limonium sinuatum Mill.) were harvested from the field in 1982 and soaked in varying concentrations of glycerol: water solutions for 24 and 48 h and then microwaved for 0, 1, 3 or 5 min. Half of the branch stems were measured for flexibility, with the remainder being assessed 1 year later. Stems harvested in 1983 were wet- and dry-stored at 3°C for varying lengths of time and then preserved. Preservation was best when statice was preserved immediately. Cold storage decreased preserved statice flexibility, but was better than air-drying. Fresh cut statice stems, up to 34 cm long, should be preserved by soaking in a 1:2 or 1:3 glycerol: water solution for 48 h followed by microwaving for 1 min at medium-high (34°C)

  16. Thermodynamic investigation of the interaction between cyclodextrins and preservatives - Application and verification in a mathematical model to determine the needed preservative surplus in aqueous cyclodextrin formulations

    DEFF Research Database (Denmark)

    Holm, René; Olesen, Niels Erik; Alexandersen, Signe Dalgaard

    2016-01-01

    Preservatives are inactivated when added to conserve aqueous cyclodextrin (CD) formulations due to complex formation between CDs and the preservative. To maintain the desired conservation effect the preservative needs to be added in apparent surplus to account for this inactivation. The purpose o...

  17. An Efficient Context-Aware Privacy Preserving Approach for Smartphones

    Directory of Open Access Journals (Sweden)

    Lichen Zhang

    2017-01-01

    Full Text Available With the proliferation of smartphones and the usage of the smartphone apps, privacy preservation has become an important issue. The existing privacy preservation approaches for smartphones usually have less efficiency due to the absent consideration of the active defense policies and temporal correlations between contexts related to users. In this paper, through modeling the temporal correlations among contexts, we formalize the privacy preservation problem to an optimization problem and prove its correctness and the optimality through theoretical analysis. To further speed up the running time, we transform the original optimization problem to an approximate optimal problem, a linear programming problem. By resolving the linear programming problem, an efficient context-aware privacy preserving algorithm (CAPP is designed, which adopts active defense policy and decides how to release the current context of a user to maximize the level of quality of service (QoS of context-aware apps with privacy preservation. The conducted extensive simulations on real dataset demonstrate the improved performance of CAPP over other traditional approaches.

  18. Prevention of ischemia-reperfusion lung injury during static cold preservation by supplementation of standard preservation solution with HEMO2life® in pig lung transplantation model.

    Science.gov (United States)

    Glorion, M; Polard, V; Favereau, F; Hauet, T; Zal, F; Fadel, E; Sage, E

    2017-10-25

    We describe the results of adding a new biological agent HEMO 2 life ® to a standard preservation solution for hypothermic static lung preservation aiming to improve early functional parameters after lung transplantation. HEMO 2 life ® is a natural oxygen carrier extracted from Arenicola marina with high oxygen affinity developed as an additive to standard organ preservation solutions. Standard preservation solution (Perfadex ® ) was compared with Perfadex ® associated with HEMO 2 life ® and with sham animals after 24 h of hypothermic preservation followed by lung transplantation. During five hours of lung reperfusion, functional parameters and biomarkers expression in serum and in bronchoalveolar lavage fluid (BALF) were measured. After five hours of reperfusion, HEMO 2 life ® group led to significant improvement in functional parameters: reduction of graft vascular resistance (p preservation improves early graft function after prolonged cold ischemia in lung transplantation.

  19. Quality-on-Demand Compression of EEG Signals for Telemedicine Applications Using Neural Network Predictors

    Directory of Open Access Journals (Sweden)

    N. Sriraam

    2011-01-01

    Full Text Available A telemedicine system using communication and information technology to deliver medical signals such as ECG, EEG for long distance medical services has become reality. In either the urgent treatment or ordinary healthcare, it is necessary to compress these signals for the efficient use of bandwidth. This paper discusses a quality on demand compression of EEG signals using neural network predictors for telemedicine applications. The objective is to obtain a greater compression gains at a low bit rate while preserving the clinical information content. A two-stage compression scheme with a predictor and an entropy encoder is used. The residue signals obtained after prediction is first thresholded using various levels of thresholds and are further quantized and then encoded using an arithmetic encoder. Three neural network models, single-layer and multi-layer perceptrons and Elman network are used and the results are compared with linear predictors such as FIR filters and AR modeling. The fidelity of the reconstructed EEG signal is assessed quantitatively using parameters such as PRD, SNR, cross correlation and power spectral density. It is found from the results that the quality of the reconstructed signal is preserved at a low PRD thereby yielding better compression results compared to results obtained using lossless scheme.

  20. Status, Antimicrobial Mechanism, and Regulation of Natural Preservatives in Livestock Food Systems.

    Science.gov (United States)

    Lee, Na-Kyoung; Paik, Hyun-Dong

    2016-01-01

    This review discusses the status, antimicrobial mechanisms, application, and regulation of natural preservatives in livestock food systems. Conventional preservatives are synthetic chemical substances including nitrates/nitrites, sulfites, sodium benzoate, propyl gallate, and potassium sorbate. The use of artificial preservatives is being reconsidered because of concerns relating to headache, allergies, and cancer. As the demand for biopreservation in food systems has increased, new natural antimicrobial compounds of various origins are being developed, including plant-derived products (polyphenolics, essential oils, plant antimicrobial peptides (pAMPs)), animal-derived products (lysozymes, lactoperoxidase, lactoferrin, ovotransferrin, antimicrobial peptide (AMP), chitosan and others), and microbial metabolites (nisin, natamycin, pullulan, ε-polylysine, organic acid, and others). These natural preservatives act by inhibiting microbial cell walls/membranes, DNA/RNA replication and transcription, protein synthesis, and metabolism. Natural preservatives have been recognized for their safety; however, these substances can influence color, smell, and toxicity in large amounts while being effective as a food preservative. Therefore, to evaluate the safety and toxicity of natural preservatives, various trials including combinations of other substances or different food preservation systems, and capsulation have been performed. Natamycin and nisin are currently the only natural preservatives being regulated, and other natural preservatives will have to be legally regulated before their widespread use.