WorldWideScience

Sample records for network usain preservation

  1. Chronopolis Digital Preservation Network

    Directory of Open Access Journals (Sweden)

    David Minor

    2010-07-01

    Full Text Available The Chronopolis Digital Preservation Initiative, one of the Library of Congress’ latest efforts to collect and preserve at-risk digital information, has completed its first year of service as a multi-member partnership to meet the archival needs of a wide range of domains.Chronopolis is a digital preservation data grid framework developed by the San Diego Supercomputer Center (SDSC at UC San Diego, the UC San Diego Libraries (UCSDL, and their partners at the National Center for Atmospheric Research (NCAR in Colorado and the University of Maryland's Institute for Advanced Computer Studies (UMIACS.Chronopolis addresses a critical problem by providing a comprehensive model for the cyberinfrastructure of collection management, in which preserved intellectual capital is easily accessible, and research results, education material, and new knowledge can be incorporated smoothly over the long term. Integrating digital library, data grid, and persistent archive technologies, Chronopolis has created trusted environments that span academic institutions and research projects, with the goal of long-term digital preservation.A key goal of the Chronopolis project is to provide cross-domain collection sharing for long-term preservation. Using existing high-speed educational and research networks and mass-scale storage infrastructure investments, the partnership is leveraging the data storage capabilities at SDSC, NCAR, and UMIACS to provide a preservation data grid that emphasizes heterogeneous and highly redundant data storage systems.In this paper we will explore the major themes within Chronopolis, including:a The philosophy and theory behind a nationally federated data grid for preservation. b The core tools and technologies used in Chronopolis. c The metadata schema that is being developed within Chronopolis for all of the data elements. d Lessons learned from the first year of the project.e Next steps in digital preservation using Chronopolis: how we

  2. Preserved Network Metrics across Translated Texts

    Science.gov (United States)

    Cabatbat, Josephine Jill T.; Monsanto, Jica P.; Tapang, Giovanni A.

    2014-09-01

    Co-occurrence language networks based on Bible translations and the Universal Declaration of Human Rights (UDHR) translations in different languages were constructed and compared with random text networks. Among the considered network metrics, the network size, N, the normalized betweenness centrality (BC), and the average k-nearest neighbors, knn, were found to be the most preserved across translations. Moreover, similar frequency distributions of co-occurring network motifs were observed for translated texts networks.

  3. What Makes Usain Bolt Unique as a Sprinter?

    Science.gov (United States)

    Shinabargar, A. J.; Hellrich, Matt; Baker, Blane

    2010-01-01

    For both casual and avid fans alike, Olympic and other sporting events can provide a wealth of data for simple physics analyses. One of the most impressive performances in recent Olympic history is that of Usain Bolt in the track-and-field sprinting events during the 2008 Summer Games. Over a seven-day span, Bolt set world records in the 100-m and…

  4. Privacy Preservation over Untrusted Mobile Networks

    Science.gov (United States)

    Ardagna, Claudio A.; Jajodia, Sushil; Samarati, Pierangela; Stavrou, Angelos

    The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile network operators. These operators are typically assumed to be trusted and to manage the information they collect in a privacy-preserving way. Such information, however, is extremely sensitive and coveted by many companies, which may use it to improve their business. In this context, safeguarding the users’ privacy against the prying eyes of the network operators is an emerging requirement.

  5. Improving the Robustness of Complex Networks with Preserving Community Structure

    Science.gov (United States)

    Yang, Yang; Li, Zhoujun; Chen, Yan; Zhang, Xiaoming; Wang, Senzhang

    2015-01-01

    Complex networks are everywhere, such as the power grid network, the airline network, the protein-protein interaction network, and the road network. The networks are ‘robust yet fragile’, which means that the networks are robust against random failures but fragile under malicious attacks. The cascading failures, system-wide disasters and intentional attacks on these networks are deserving of in-depth study. Researchers have proposed many solutions to improve the robustness of these networks. However whilst many solutions preserve the degree distribution of the networks, little attention is paid to the community structure of these networks. We argue that the community structure of a network is a defining characteristic of a network which identifies its functionality and thus should be preserved. In this paper, we discuss the relationship between robustness and the community structure. Then we propose a 3-step strategy to improve the robustness of a network, while retaining its community structure, and also its degree distribution. With extensive experimentation on representative real-world networks, we demonstrate that our method is effective and can greatly improve the robustness of networks, while preserving community structure and degree distribution. Finally, we give a description of a robust network, which is useful not only for improving robustness, but also for designing robust networks and integrating networks. PMID:25674786

  6. How fast could Usain Bolt have run? A dynamical study

    Science.gov (United States)

    Eriksen, H. K.; Kristiansen, J. R.; Langangen, Ø.; Wehus, I. K.

    2009-03-01

    Since that memorable day at the Beijing 2008 Olympics, a big question has been, ``What would the 100 m dash world record have been had Usain Bolt not celebrated at the end of his race?'' Bolt's coach suggested that the time could have been 9.52 s or better. We consider this question by measuring Bolt's position as a function of time using footage of the run, and then extrapolate the last 2 s with two different assumptions. First, we conservatively assume that Bolt could have maintained the runner-up's acceleration during the end of the race. Second, based on the race development prior to the celebration, we assume that Bolt could have kept an acceleration of 0.5 m/s2 greater than the runner-up. We find that the new world record in these two cases would have been 9.61+/-0.04 and 9.55+/-0.04 s, respectively, where the uncertainties denote 95% statistical errors.

  7. Privacy-Preserving Relationship Path Discovery in Social Networks

    Science.gov (United States)

    Mezzour, Ghita; Perrig, Adrian; Gligor, Virgil; Papadimitratos, Panos

    As social networks sites continue to proliferate and are being used for an increasing variety of purposes, the privacy risks raised by the full access of social networking sites over user data become uncomfortable. A decentralized social network would help alleviate this problem, but offering the functionalities of social networking sites is a distributed manner is a challenging problem. In this paper, we provide techniques to instantiate one of the core functionalities of social networks: discovery of paths between individuals. Our algorithm preserves the privacy of relationship information, and can operate offline during the path discovery phase. We simulate our algorithm on real social network topologies.

  8. Professor Usain Bolt Welcomes You to the Schoolyard: Physics for Champions

    Science.gov (United States)

    Vourlias, Kostas; Seroglou, Fanny

    2016-01-01

    Could Usain Bolt achieve what teachers often fail to do? Could this famous Olympic winner challenge and motivate students to study mechanics and introduce them to the principles of physics in a fun way, outside of the classroom? In order to answer these questions, we "invited" for one semester the world record holder to visit our Greek…

  9. Size reduction of complex networks preserving modularity

    Energy Technology Data Exchange (ETDEWEB)

    Arenas, A.; Duch, J.; Fernandez, A.; Gomez, S.

    2008-12-24

    The ubiquity of modular structure in real-world complex networks is being the focus of attention in many trials to understand the interplay between network topology and functionality. The best approaches to the identification of modular structure are based on the optimization of a quality function known as modularity. However this optimization is a hard task provided that the computational complexity of the problem is in the NP-hard class. Here we propose an exact method for reducing the size of weighted (directed and undirected) complex networks while maintaining invariant its modularity. This size reduction allows the heuristic algorithms that optimize modularity for a better exploration of the modularity landscape. We compare the modularity obtained in several real complex-networks by using the Extremal Optimization algorithm, before and after the size reduction, showing the improvement obtained. We speculate that the proposed analytical size reduction could be extended to an exact coarse graining of the network in the scope of real-space renormalization.

  10. Security and privacy preserving in social networks

    CERN Document Server

    Chbeir, Richard

    2013-01-01

    This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. It provides the reader with an overview of the state-of-the art techniques, studies, and approaches as well as outlining future directions in this field. A wide range of interdisciplinary contributions from various research groups ensures for a balanced and complete perspective.

  11. Reduction of Second-Order Network Systems with Structure Preservation

    NARCIS (Netherlands)

    Cheng, Xiaodong; Kawano, Yu; Scherpen, Jacquelien M.A.

    2017-01-01

    This paper proposes a general framework for structure-preserving model reduction of a second-order network system based on graph clustering. In this approach, vertex dynamics are captured by the transfer functions from inputs to individual states, and the dissimilarities of vertices are quantified

  12. Improved-Coverage Preserving Clustering Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Manju

    2016-01-01

    Full Text Available Coverage maintenance for longer period is crucial problem in wireless sensor network (WSNs due to limited inbuilt battery in sensors. Coverage maintenance can be prolonged by using the network energy efficiently, which can be done by keeping sufficient number of sensors in sensor covers. There has been discussed a Coverage-Preserving Clustering Protocol (CPCP to increase the network lifetime in clustered WSNs. It selects sensors for various roles such as cluster heads and sensor cover members by considering various coverage aware cost metrics. In this paper, we propose a new heuristic called Improved-Coverage-Preserving Clustering Protocol (I-CPCP to maximize the total network lifetime. In our proposed method, minimal numbers of sensor are selected to construct a sensor covers based on various coverage aware cost metrics. These cost metrics are evaluated by using residual energy of a sensor and their coverage. The simulation results show that our method has longer network lifetime as compared to generic CPCP.

  13. Privacy-preserving schemes for Ad Hoc Social Networks: A survey

    OpenAIRE

    Ferrag, Mohamed Amine; Maglaras, Leandros; Ahmim, Ahmed

    2016-01-01

    In this paper, we review the state of the art of privacy-preserving schemes for ad hoc social networks, including, mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically, we select and in-detail examine thirty-three privacy preserving schemes developed for or applied in the context of ad hoc social networks. These schemes are published between 2008 and 2016. Based on this existing privacy preservation schemes, we survey privacy preservation models, including location...

  14. Velocity dispersions in a cluster of stars: How fast could Usain Bolt have run?

    OpenAIRE

    Eriksen, H. K.; Kristiansen, J. R.; Langangen, O.; Wehus, I. K.

    2008-01-01

    Since that very memorable day at the Beijing 2008 Olympics, a big question on every sports commentator's mind has been "What would the 100 meter dash world record have been, had Usain Bolt not celebrated at the end of his race?" Glen Mills, Bolt's coach suggested at a recent press conference that the time could have been 9.52 seconds or better. We revisit this question by measuring Bolt's position as a function of time using footage of the run, and then extrapolate into the last two seconds b...

  15. On the performance of Usain Bolt in the 100 metre sprint

    OpenAIRE

    Gómez, J. J. Hernández; Marquina, V.; Gómez, R. W.

    2013-01-01

    Many university texts on Mechanics deal with the problem of the effect of the air drag force, using as example the slowing down of a parachute. Hardly no one discuss what happens when the drag force is proportional to both $u$ and $u^2$. In this paper we deal with a real problem to illustrate the effect of both terms in the speed of a runner: a theoretical model of the performance of the 100 m world record sprint of Usain Bolt during the 2009 World Championships at Berlin is developed, assumi...

  16. Preserved modular network organization in the sedated rat brain.

    Directory of Open Access Journals (Sweden)

    Dany V D'Souza

    Full Text Available Translation of resting-state functional connectivity (FC magnetic resonance imaging (rs-fMRI applications from human to rodents has experienced growing interest, and bears a great potential in pre-clinical imaging as it enables assessing non-invasively the topological organization of complex FC networks (FCNs in rodent models under normal and various pathophysiological conditions. However, to date, little is known about the organizational architecture of FCNs in rodents in a mentally healthy state, although an understanding of the same is of paramount importance before investigating networks under compromised states. In this study, we characterized the properties of resting-state FCN in an extensive number of Sprague-Dawley rats (n = 40 under medetomidine sedation by evaluating its modular organization and centrality of brain regions and tested for reproducibility. Fully-connected large-scale complex networks of positively and negatively weighted connections were constructed based on Pearson partial correlation analysis between the time courses of 36 brain regions encompassing almost the entire brain. Applying recently proposed complex network analysis measures, we show that the rat FCN exhibits a modular architecture, comprising six modules with a high between subject reproducibility. In addition, we identified network hubs with strong connections to diverse brain regions. Overall our results obtained under a straight medetomidine protocol show for the first time that the community structure of the rat brain is preserved under pharmacologically induced sedation with a network modularity contrasting from the one reported for deep anesthesia but closely resembles the organization described for the rat in conscious state.

  17. On the performance of Usain Bolt in the 100 m sprint

    Science.gov (United States)

    Hernández Gómez, J. J.; Marquina, V.; Gómez, R. W.

    2013-09-01

    Many university texts on mechanics consider the effect of air drag force, using the slowing down of a parachute as an example. Very few discuss what happens when the drag force is proportional to both u and u2. In this paper we deal with a real problem to illustrate the effect of both terms on the speed of a runner: a theoretical model of the world-record 100 m sprint of Usain Bolt during the 2009 World Championships in Berlin is developed, assuming a drag force proportional to u and to u2. The resulting equation of motion is solved and fitted to the experimental data obtained from the International Association of Athletics Federations, which recorded Bolt's position with a laser velocity guard device. It is worth noting that our model works only for short sprints.

  18. A Novel, Privacy Preserving, Architecture for Online Social Networks

    Directory of Open Access Journals (Sweden)

    Zhe Wang

    2015-12-01

    Full Text Available The centralized nature of conventional OSNs poses serious risks to the privacy and security of information exchanged between their members. These risks prompted several attempts to create decentralized OSNs, or DOSNs. The basic idea underlying these attempts, is that each member of a social network keeps its data under its own control, instead of surrendering it to a central host, providing access to it to other members according to its own access-control policy. Unfortunately all existing versions of DOSNs have a very serious limitation. Namely, they are unable to subject the membership of a DOSN, and the interaction between its members, to any global policy—which is essential for many social communities. Moreover, the DOSN architecture is unable to support useful capabilities such as narrowcasting and profile based search. This paper describes a novel architecture of decentralized OSNs—called DOSC, for “online social community”. DOSC adopts the decentralization idea underlying DOSNs, but it is able to subject the membership of a DOSC-community, and the interaction between its members, to a wide range of policies, including privacy-preserving narrowcasting and profile-sensitive search.

  19. What would be Usain Bolt's 100-meter sprint world record without Tyson Gay? Unintentional interpersonal synchronization between the two sprinters.

    Science.gov (United States)

    Varlet, Manuel; Richardson, Michael J

    2015-02-01

    Despite the desire of athletes to separate themselves from their competitors, to be faster or better, their performance is often influenced by those they are competing with. Here we show that the unintentional or spontaneous interpersonal synchronization of athletes' movements may partially account for such performance modifications. We examined the 100-m final of Usain Bolt in the 12th IAAF World Championship in Athletics (Berlin, 2009) in which he broke the world record, and demonstrate that Usain Bolt and Tyson Gay who ran side-by-side throughout the race spontaneously and intermittently synchronized their steps. This finding demonstrates that even the most optimized individual motor skills can be modulated by the simple presence of another individual via interpersonal coordination processes. It extends previous research by showing that the hard constraints of individual motor performance do not overwhelm the occurrence of spontaneous interpersonal synchronization and open promising new research directions for better understanding and improving athletic performance.

  20. Velocity dispersions in a cluster of stars: How fast could Usain Bolt have run?

    CERN Document Server

    Eriksen, H K; Langangen, O; Wehus, I K

    2008-01-01

    Since that very memorable day at the Beijing 2008 Olympics, a big question on every sports commentator's mind has been "What would the 100 meter dash world record have been, had Usain Bolt not celebrated at the end of his race?" Glen Mills, Bolt's coach suggested at a recent press conference that the time could have been 9.52 seconds or better. We revisit this question by measuring Bolt's position as a function of time using footage of the run, and then extrapolate into the last two seconds based on two different assumptions. First, we conservatively assume that Bolt could have maintained Richard Thompson's, the runner-up, acceleration during the end of the race. Second, based on the race development prior to the celebration, we assume that he could also have kept an acceleration of 0.5 m/s^2 higher than Thompson. In these two cases, we find that the new world record would have been 9.61 +/- 0.04 and 9.55 +/- 0.04 seconds, respectively, where the uncertainties denote 95% statistical errors.

  1. Privacy-preserving data aggregation protocols for wireless sensor networks: a survey.

    Science.gov (United States)

    Bista, Rabindra; Chang, Jae-Woo

    2010-01-01

    Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.

  2. Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Rabindra Bista

    2010-05-01

    Full Text Available Many wireless sensor network (WSN applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.

  3. Cooperative Exploration and Networking While Preserving Collision Avoidance.

    Science.gov (United States)

    Kim, Jonghoek

    2017-12-01

    Monitoring of large complex environments, such as underwater environments, is an important task in surveillance. An information (sensor) network can be built to achieve the task. To build an information network in an unknown workspace, we use multiple robots deploying information nodes. While robots build the network, they localize themselves as well as deployed nodes in the global coordinate system. Our multirobot networking strategy is as follows: each robot iteratively visits a frontier, which borders an unsensed area, until all areas are explored. As multiple robots explore the workspace, a robot must avoid colliding with another robot as well as with an obstacle. Hence, we introduce collision avoidance control laws and integrate the control laws with our cooperative networking strategy. Using MATLAB simulations, we verify the scalability and effectiveness of both our networking strategy and the collision avoidance control laws.

  4. Security and Privacy Preservation in Human-Involved Networks

    Science.gov (United States)

    Asher, Craig; Aumasson, Jean-Philippe; Phan, Raphael C.-W.

    This paper discusses security within human-involved networks, with a focus on social networking services (SNS). We argue that more secure networks could be designed using semi-formal security models inspired from cryptography, as well as notions like that of ceremony, which exploits human-specific abilities and psychology to assist creating more secure protocols. We illustrate some of our ideas with the example of the SNS Facebook.

  5. Privacy-preserving user clustering in a social network

    NARCIS (Netherlands)

    Erkin, Z.; Veugen, P.J.M.; Toft, T.; Lagendijk, R.L.

    2009-01-01

    In a ubiquitously connected world, social networks are playing an important role on the Internet by allowing users to find groups of people with similar interests. The data needed to construct such networks may be considered sensitive personal information by the users, which raises privacy concerns.

  6. Improving human resource capacity for road network preservation

    CSIR Research Space (South Africa)

    Nxumalo, M

    2010-10-01

    Full Text Available There is compelling evidence that a significant factor contributing to the poor condition of much of Africa's rural road network is inadequate human resource capacity. This shortage of professional skills in road engineering inhibits proper...

  7. Towards Secure and Privacy-Preserving Online Social Networking Services

    OpenAIRE

    Gong, Zhenqiang

    2015-01-01

    Online social networking services (e.g., Facebook, Twitter, and Blogger) bring new benefits to almost all aspects of our lives. They have completely transformed how we communicate with each other, how we process information, and how we diffuse social influence. However, these social networking services are also plagued by both conventional and emerging threats to security and privacy. For instance, two fundamental security risks are 1) users’ accounts are compromised by attackers or get lost ...

  8. Preserving Reliability to Heterogeneous Ultra-Dense Distributed Networks in Unlicensed Spectrum

    OpenAIRE

    Cui, Qimei; Gu, Yu; Ni, Wei; Zhang, Xuefei; Tao, Xiaofeng; Zhang, Ping; Liu, Ren Ping

    2017-01-01

    This article investigates the prominent dilemma between capacity and reliability in heterogeneous ultra-dense distributed networks, and advocates a new measure of effective capacity to quantify the maximum sustainable data rate of a link while preserving the quality-of-service (QoS) of the link in such networks. Recent breakthroughs are brought forth in developing the theory of the effective capacity in heterogeneous ultra-dense distributed networks. Potential applications of the effective ca...

  9. A Differentiated Anonymity Algorithm for Social Network Privacy Preservation

    Directory of Open Access Journals (Sweden)

    Yuqin Xie

    2016-12-01

    Full Text Available Devising methods to publish social network data in a form that affords utility without compromising privacy remains a longstanding challenge, while many existing methods based on k-anonymity algorithms on social networks may result in nontrivial utility loss without analyzing the social network topological structure and without considering the attributes of sparse distribution. Toward this objective, we explore the impact of the attributes of sparse distribution on data utility. Firstly, we propose a new utility metric that emphasizes network structure distortion and attribute value loss. Furthermore, we design and implement a differentiated k-anonymity l-diversity social network anonymity algorithm, which seeks to protect users’ privacy in social networks and increase the usability of the published anonymized data. Its key idea is that it divides a node into two child nodes and only anonymizes sensitive values to satisfy anonymity requirements. The evaluation results show that our method can effectively improve the data utility as compared to generalized anonymizing algorithms.

  10. Evolving a Network of Networks: The Experience of Partnerships in the National Digital Information Infrastructure and Preservation Program

    Directory of Open Access Journals (Sweden)

    Martha Anderson

    2008-08-01

    Full Text Available The National Digital Information Infrastructure and Preservation Program (NDIIPP was initiated in December 2000 when the U.S. Congress authorized the Library of Congress to work with a broad range of institutions to develop a national strategy for the preservation of at-risk digital content. Guided by a strategy of collaboration and iteration, the Library of Congress began the formation of a national network of partners dedicated to collecting and preserving important born-digital information. Over the last six years, the Library and its partners have been engaged in learning through action that has resulted in an evolving understanding of the most appropriate roles and functions for a national network of diverse stakeholders. The emerging network is complex and inclusive of a variety of stakeholders; content producers, content stewards and service providers from the public and private sectors. Lessons learned indicate that interoperability is a challenge in all aspects of collaborative work.

  11. Impact of mass gain, tailwind and age on the performance of Usain Bolt from Beijing 2008 to Rio 2016

    Science.gov (United States)

    Hernández-Gómez, JJ; Gómez, RW; Couder-Castañeda, C.

    2017-09-01

    Despite the impressiveness of the sprints run by Usain Bolt, the question naturally arises of why he has not been able to break the 100 m sprint world record he set in Berlin (2009). In this paper, we address such a query by considering Bolt’s condition and the prevailing circumstances during the sprints that took place in Beijing 2008, Berlin 2009, London 2012, Moscow 2013, Beijing 2015 and Rio 20163. Using the analytical mechanical model by Hernández-Gómez et al (2013), we analyse all the events, equating what we thought were the principal factors a priori: tailwind, weight gain and age. Despite what one might expect about the role of age in such a high-performance athlete as Usain Bolt, our results show that his performance has been essentially constant from Beijing 2009 to Rio 2016, with the mass gain and tailwind conditions making the difference in the run times he has achieved since Berlin 2009. Actually, our analysis suggests that in equal mass and tailwind conditions, his world record could actually have been set at Beijing 2015.

  12. Preserving Location and Absence Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Freni, Dario; Vicente, Carmen Ruiz; Mascetti, Sergio

    2010-01-01

    Online social networks often involve very large numbers of users who share very large volumes of content. This content is increasingly being tagged with geo-spatial and temporal coordinates that may then be used in services. For example, a service may retrieve photos taken in a certain region....... The resulting geo-aware social networks (GeoSNs) pose privacy threats beyond those found in location-based services. Con- tent published in a GeoSN is often associated with references to multiple users, without the publisher being aware of the privacy preferences of those users. Moreover, this content is often...... accessible to multiple users. This renders it dicult for GeoSN users to control which information about them is available and to whom it is available. This paper addresses two privacy threats that occur in GeoSNs: location privacy and absence privacy. The former concerns the availability of information about...

  13. Metabolic network visualization eliminating node redundance and preserving metabolic pathways

    Directory of Open Access Journals (Sweden)

    Sagot Marie-France

    2007-07-01

    Full Text Available Abstract Background The tools that are available to draw and to manipulate the representations of metabolism are usually restricted to metabolic pathways. This limitation becomes problematic when studying processes that span several pathways. The various attempts that have been made to draw genome-scale metabolic networks are confronted with two shortcomings: 1- they do not use contextual information which leads to dense, hard to interpret drawings, 2- they impose to fit to very constrained standards, which implies, in particular, duplicating nodes making topological analysis considerably more difficult. Results We propose a method, called MetaViz, which enables to draw a genome-scale metabolic network and that also takes into account its structuration into pathways. This method consists in two steps: a clustering step which addresses the pathway overlapping problem and a drawing step which consists in drawing the clustered graph and each cluster. Conclusion The method we propose is original and addresses new drawing issues arising from the no-duplication constraint. We do not propose a single drawing but rather several alternative ways of presenting metabolism depending on the pathway on which one wishes to focus. We believe that this provides a valuable tool to explore the pathway structure of metabolism.

  14. Efficient randomization of biological networks while preserving functional characterization of individual nodes.

    Science.gov (United States)

    Iorio, Francesco; Bernardo-Faura, Marti; Gobbi, Andrea; Cokelaer, Thomas; Jurman, Giuseppe; Saez-Rodriguez, Julio

    2016-12-20

    Networks are popular and powerful tools to describe and model biological processes. Many computational methods have been developed to infer biological networks from literature, high-throughput experiments, and combinations of both. Additionally, a wide range of tools has been developed to map experimental data onto reference biological networks, in order to extract meaningful modules. Many of these methods assess results' significance against null distributions of randomized networks. However, these standard unconstrained randomizations do not preserve the functional characterization of the nodes in the reference networks (i.e. their degrees and connection signs), hence including potential biases in the assessment. Building on our previous work about rewiring bipartite networks, we propose a method for rewiring any type of unweighted networks. In particular we formally demonstrate that the problem of rewiring a signed and directed network preserving its functional connectivity (F-rewiring) reduces to the problem of rewiring two induced bipartite networks. Additionally, we reformulate the lower bound to the iterations' number of the switching-algorithm to make it suitable for the F-rewiring of networks of any size. Finally, we present BiRewire3, an open-source Bioconductor package enabling the F-rewiring of any type of unweighted network. We illustrate its application to a case study about the identification of modules from gene expression data mapped on protein interaction networks, and a second one focused on building logic models from more complex signed-directed reference signaling networks and phosphoproteomic data. BiRewire3 it is freely available at https://www.bioconductor.org/packages/BiRewire/ , and it should have a broad application as it allows an efficient and analytically derived statistical assessment of results from any network biology tool.

  15. A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing

    DEFF Research Database (Denmark)

    Wang, Yu; Xie, Lin; Li, Wenjuan

    2017-01-01

    sensitive information to others for privacy concerns, even to the cloud side. For this sake, privacy-preserving technology has been applied to IDSs, while it still lacks of proper solutions for a collaborative intrusion detection network (CIDN) due to geographical distribution. A CIDN enables a set...

  16. A Novel Nonlinear Multitarget k-Degree Coverage Preservation Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zeyu Sun

    2016-01-01

    Full Text Available Due to the existence of a large number of redundant data in the process of covering multiple targets, the effective coverage of monitored region decreases, causing the network to consume more energy. To solve this problem, this paper proposes a multitarget k-degree coverage preservation protocol. Firstly, the affiliation between the sensor nodes and target nodes is established in the network model; meanwhile the method used to calculate the coverage expectation value of the monitored region is put forward; secondly, in the aspect of the network energy conversion, use scheduling mechanisms on the sensor nodes to balance the network energy and achieve different network coverage quality with energy conversion between different nodes. Finally, simulation results show that NMCP can improve the network lifetime by effectively reducing the number of active nodes to meet certain coverage requirements.

  17. Privacy‐Preserving Friend Matching Protocol approach for Pre‐match in Social Networks

    DEFF Research Database (Denmark)

    Ople, Shubhangi S.; Deshmukh, Aaradhana A.; Mihovska, Albena Dimitrova

    2016-01-01

    that a secure match can achieve at least one order of accuracy and better computational performance than the techniques that use homomorphic encryption.It can handle and tackle new characteristics and an environment for a particular application in a mobile social network....... for use in social networks due to its data sharing problems and information leakage. In this paper, we propose a novel framework for privacy–preserving profile matching. We implement both the client and server portion of the secure match and evaluate its performance network dataset. The results show...

  18. Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoying Zhang

    2014-12-01

    Full Text Available Wireless sensor networks (WSNs are indispensable building blocks for the Internet of Things (IoT. With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromisedmaster nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals.

  19. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks.

    Science.gov (United States)

    Meganathan, Navamani Thandava; Palanichamy, Yogesh

    2015-01-01

    Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR) mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR) protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols.

  20. Multiorder Fusion Data Privacy-Preserving Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mingshan Xie

    2017-01-01

    Full Text Available Privacy-preserving in wireless sensor networks is one of the key problems to be solved in practical applications. It is of great significance to solve the problem of data privacy protection for large-scale applications of wireless sensor networks. The characteristics of wireless sensor networks make data privacy protection technology face serious challenges. At present, the technology of data privacy protection in wireless sensor networks has become a hot research topic, mainly for data aggregation, data query, and access control of data privacy protection. In this paper, multiorder fusion data privacy-preserving scheme (MOFDAP is proposed. Random interference code, random decomposition of function library, and cryptographic vector are introduced for our proposed scheme. In multiple stages and multiple aspects, the difficulty of cracking and crack costs are increased. The simulation results demonstrate that, compared with the typical Slice-Mix-AggRegaTe (SMART algorithm, the algorithm proposed in this paper has a better data privacy-preserving ability when the traffic load is not very heavy.

  1. Sync or separate? No compelling evidence for unintentional interpersonal coordination between Usain Bolt and Tyson Gay on the 100-meter world record race

    OpenAIRE

    Blikslager, Frank; De Poel, Harjo

    2017-01-01

    In a recent observation article in Journal of Experimental Psychology: Human Perception and Performance (JEP:HPP; Varlet & Richardson, 2015) the 100-m sprint final of the World Championship in Athletics in Berlin of 2009 (i.e., the current world record race) was analyzed. That study reported occurrence of spontaneous, unintentional interpersonal synchronization between Usain Bolt and Tyson Gay, the respective winner and runner-up of that race. In the present commentary article, however, we ar...

  2. Introducing network Gramians to undirected network systems for structure-preserving model reduction

    NARCIS (Netherlands)

    Cheng, Xiaodong; Scherpen, Jacquelien M.A.

    2016-01-01

    In this paper, we propose the notion of controllability Gramian for linear network systems. In contrast to the conventional Gramians defined for asymptotically stable systems, the new Gramian is generalized to semi-stable systems and can be computed for network systems with imaginary axis poles. We

  3. A Privacy Preservation Model for Health-Related Social Networking Sites.

    Science.gov (United States)

    Li, Jingquan

    2015-07-08

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS.

  4. A Privacy Preservation Model for Health-Related Social Networking Sites

    Science.gov (United States)

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS. PMID:26155953

  5. Practical recommendations for fertility preservation in women by the FertiPROTEKT network. Part II: fertility preservation techniques.

    Science.gov (United States)

    von Wolff, Michael; Germeyer, A; Liebenthron, J; Korell, M; Nawroth, F

    2018-01-01

    In addition to guidelines focusing on scientific evidence, practical recommendations on fertility preservation are also needed. A selective literature search was performed based on the clinical and scientific experience of the authors. This article (Part II) focuses on fertility preservation techniques. Part I, also published in this journal, provides information on disease prognosis, disease-specific therapy, and risks for loss of fertility. Ovarian stimulation including double stimulation and freezing of oocytes is the best-established therapy providing live birth chances in women good ovarian, if spontaneous conception is favoured and if preservation in women provides realistic chances of becoming pregnant. The choice of technique needs to be based on the time required, the woman's age, its risks and efficacy, and the individual preference of the patient.

  6. Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2017-01-01

    Full Text Available With cloud computing being integrated with wireless body area networks, the digital ecosystem called cloud-assisted WBAN was proposed. In cloud-assisted medical systems, the integrity of the stored data is important. Recently, based on certificateless public key cryptography, He et al. proposed a certificateless public auditing scheme for cloud-assisted WBANs. But He et al.’s scheme is not a scheme with privacy preserving. After many checks on some of the same data blocks, the auditor can derive these data blocks. In this paper, we propose a certificateless public auditing scheme with privacy preserving for cloud-assisted WBANs. In the proof phase of the proposed scheme, the proof information is protected from being directly exposed to the auditor. So, the curious auditor could not derive the data blocks. We also prove that the proposed scheme is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard, and we give a comparison of the proposed scheme with He et al.’s scheme in terms of security and computation cost.

  7. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    Directory of Open Access Journals (Sweden)

    Weirong Cui

    Full Text Available Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched, and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  8. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    Science.gov (United States)

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  9. Preservation of structural brain network hubs is associated with less severe post-stroke aphasia.

    Science.gov (United States)

    Gleichgerrcht, Ezequiel; Kocher, Madison; Nesland, Travis; Rorden, Chris; Fridriksson, Julius; Bonilha, Leonardo

    2015-01-01

    Post-stroke aphasia is typically associated with ischemic damage to cortical areas or with loss of connectivity among spared brain regions. It remains unclear whether the participation of spared brain regions as networks hubs affects the severity of aphasia. We evaluated language performance and magnetic resonance imaging from 44 participants with chronic aphasia post-stroke. The individual structural brain connectomes were constructed from diffusion tensor. Hub regions were defined in accordance with the rich club classification and studied in relation with language performance. Number of remaining left hemisphere rich club nodes was associated with aphasia, including comprehension, repetition and naming sub-scores. Importantly, among participants with relative preservation of regions of interest for language, aphasia severity was lessened if the region was not only spared, but also participated in the remaining network as a rich club node: Brodmann area (BA) 44/45 - repetition (p = 0.009), BA 39 - repetition (p = 0.045) and naming (p aphasia severity after stroke.

  10. Youthful Brains in Older Adults: Preserved Neuroanatomy in the Default Mode and Salience Networks Contributes to Youthful Memory in Superaging.

    Science.gov (United States)

    Sun, Felicia W; Stepanovic, Michael R; Andreano, Joseph; Barrett, Lisa Feldman; Touroutoglou, Alexandra; Dickerson, Bradford C

    2016-09-14

    Decline in cognitive skills, especially in memory, is often viewed as part of "normal" aging. Yet some individuals "age better" than others. Building on prior research showing that cortical thickness in one brain region, the anterior midcingulate cortex, is preserved in older adults with memory performance abilities equal to or better than those of people 20-30 years younger (i.e., "superagers"), we examined the structural integrity of two large-scale intrinsic brain networks in superaging: the default mode network, typically engaged during memory encoding and retrieval tasks, and the salience network, typically engaged during attention, motivation, and executive function tasks. We predicted that superagers would have preserved cortical thickness in critical nodes in these networks. We defined superagers (60-80 years old) based on their performance compared to young adults (18-32 years old) on the California Verbal Learning Test Long Delay Free Recall test. We found regions within the networks of interest where the cerebral cortex of superagers was thicker than that of typical older adults, and where superagers were anatomically indistinguishable from young adults; hippocampal volume was also preserved in superagers. Within the full group of older adults, thickness of a number of regions, including the anterior temporal cortex, rostral medial prefrontal cortex, and anterior midcingulate cortex, correlated with memory performance, as did the volume of the hippocampus. These results indicate older adults with youthful memory abilities have youthful brain regions in key paralimbic and limbic nodes of the default mode and salience networks that support attentional, executive, and mnemonic processes subserving memory function. Memory performance typically declines with age, as does cortical structural integrity, yet some older adults maintain youthful memory. We tested the hypothesis that superagers (older individuals with youthful memory performance) would exhibit

  11. A transportation network for human ovarian tissue is indispensable to success for fertility preservation.

    Science.gov (United States)

    Kyono, K; Hashimoto, T; Toya, M; Koizumi, M; Sasaki, C; Shibasaki, S; Aono, N; Nakamura, Y; Obata, R; Okuyama, N; Ogura, Y; Igarashi, H

    2017-09-02

    The purpose of this study was to examine the efficacy of an ovarian tissue transportation network for fertility preservation (FP) for cancer patients in Japan. PubMed was searched for papers on transportation of human ovarian tissue for FP. We analyzed population, area, number of cancer patients for ovarian tissue cryopreservation (OTC), quality control/assessment and safety, cost of a cryopreservation center for the building for 30 years, and medical fees of cancer patients (operation, cryopreservation, and storage of ovarian tissue). More than twenty babies have been born in Denmark and Germany through a transportation system. Up to 400 new patients a year need OTC. The fees for removal, cryopreservation, and storage for 5 years, and transplantation of ovarian tissue are around €5,000, €4,000, and €5,000, respectively. It costs more than €5 million to establish and maintain one cryopreservation center for 30 years. If we have a few cryopreservation centers in Japan, we can cryopreserve 400 patients' ovarian tissue per year by safer slow freezing and maintain quality control/assessment. We need to lighten the patients' burden for easy to use FP by a government subsidy and medical insurance coverage. This model has been termed the Danish model ("the woman stays - the tissue moves"). This is truly patient-centered medicine. We can have maximum effects with the minimum burden. A transportation network like those of Denmark and Germany is the best strategy for FP in Japan. It may be the best system for cancer patients, medical staff, and the Ministry of Health, Labor, and Welfare.

  12. Low-Latency and Energy-Efficient Data Preservation Mechanism in Low-Duty-Cycle Sensor Networks.

    Science.gov (United States)

    Jiang, Chan; Li, Tao-Shen; Liang, Jun-Bin; Wu, Heng

    2017-05-06

    Similar to traditional wireless sensor networks (WSN), the nodes only have limited memory and energy in low-duty-cycle sensor networks (LDC-WSN). However, different from WSN, the nodes in LDC-WSN often sleep most of their time to preserve their energies. The sleeping feature causes serious data transmission delay. However, each source node that has sensed data needs to quickly disseminate its data to other nodes in the network for redundant storage. Otherwise, data would be lost due to its source node possibly being destroyed by outer forces in a harsh environment. The quick dissemination requirement produces a contradiction with the sleeping delay in the network. How to quickly disseminate all the source data to all the nodes with limited memory in the network for effective preservation is a challenging issue. In this paper, a low-latency and energy-efficient data preservation mechanism in LDC-WSN is proposed. The mechanism is totally distributed. The data can be disseminated to the network with low latency by using a revised probabilistic broadcasting mechanism, and then stored by the nodes with LT (Luby Transform) codes, which are a famous rateless erasure code. After the process of data dissemination and storage completes, some nodes may die due to being destroyed by outer forces. If a mobile sink enters the network at any time and from any place to collect the data, it can recover all of the source data by visiting a small portion of survived nodes in the network. Theoretical analyses and simulation results show that our mechanism outperforms existing mechanisms in the performances of data dissemination delay and energy efficiency.

  13. Privacy-Preserved Behavior Analysis and Fall Detection by an Infrared Ceiling Sensor Network

    Directory of Open Access Journals (Sweden)

    Mineichi Kudo

    2012-12-01

    Full Text Available An infrared ceiling sensor network system is reported in this study to realize behavior analysis and fall detection of a single person in the home environment. The sensors output multiple binary sequences from which we know the existence/non-existence of persons under the sensors. The short duration averages of the binary responses are shown to be able to be regarded as pixel values of a top-view camera, but more advantageous in the sense of preserving privacy. Using the “pixel values” as features, support vector machine classifiers succeeded in recognizing eight activities (walking, reading, etc. performed by five subjects at an average recognition rate of 80.65%. In addition, we proposed a martingale framework for detecting falls in this system. The experimental results showed that we attained the best performance of 95.14% (F1 value, the FAR of 7.5% and the FRR of 2.0%. This accuracy is not sufficient in general but surprisingly high with such low-level information. In summary, it is shown that this system has the potential to be used in the home environment to provide personalized services and to detect abnormalities of elders who live alone.

  14. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    Directory of Open Access Journals (Sweden)

    Shunrong Jiang

    2015-09-01

    Full Text Available Mobile healthcare social networks (MHSNs have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE. Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  15. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  16. The U.S. Culture Collection Network Lays the Foundation for Progress in Preservation of Valuable Microbial Resources.

    Science.gov (United States)

    McCluskey, Kevin; Alvarez, Anne; Bennett, Rick; Bokati, Deepak; Boundy-Mills, Kyria; Brown, Daniel; Bull, Carolee T; Coffey, Michael; Dreaden, Tyler; Duke, Clifford; Dye, Greg; Ehmke, Erin; Eversole, Kellye; Fenstermacher, Kristi; Geiser, David; Glaeser, Jessie A; Greene, Stephanie; Gribble, Lisa; Griffith, M Patrick; Hanser, Kathryn; Humber, Richard; Johnson, Barbara W; Kermode, Anthony; Krichevsky, Micah; Laudon, Matt; Leach, Jan; Leslie, John; May, Meghan; Melcher, Ulrich; Nobles, David; Fonseca, Natalia Risso; Robinson, Sara; Ryan, Matthew; Scott, James; Silflow, Carolyn; Vidaver, Anne; Webb, Kimberly M; Wertz, John E; Yentsch, Sara; Zehr, Sarah

    2016-06-01

    The U.S. Culture Collection Network was formed in 2012 by a group of culture collection scientists and stakeholders in order to continue the progress established previously through efforts of an ad hoc group. The network is supported by a Research Coordination Network grant from the U.S. National Science Foundation (NSF) and has the goals of promoting interaction among collections, encouraging the adoption of best practices, and protecting endangered or orphaned collections. After prior meetings to discuss best practices, shared data, and synergy with genome programs, the network held a meeting at the U.S. Department of Agriculture (USDA)-Agricultural Research Service (ARS) National Center for Genetic Resources Preservation (NCGRP) in Fort Collins, Colorado in October 2015 specifically to discuss collections that are vulnerable because of changes in funding programs, or are at risk of loss because of retirement or lack of funding. The meeting allowed collection curators who had already backed up their resources at the USDA NCGRP to visit the site, and brought collection owners, managers, and stakeholders together. Eight formal collections have established off-site backups with the USDA-ARS, ensuring that key material will be preserved for future research. All of the collections with backup at the NCGRP are public distributing collections including U.S. NSF-supported genetic stock centers, USDA-ARS collections, and university-supported collections. Facing the retirement of several pioneering researchers, the community discussed the value of preserving personal research collections and agreed that a mechanism to preserve these valuable collections was essential to any future national culture collection system. Additional input from curators of plant and animal collections emphasized that collections of every kind face similar challenges in developing long-range plans for sustainability.

  17. Ranking of critical species to preserve the functionality of mutualistic networks using the k-core decomposition.

    Science.gov (United States)

    García-Algarra, Javier; Pastor, Juan Manuel; Iriondo, José María; Galeano, Javier

    2017-01-01

    Network analysis has become a relevant approach to analyze cascading species extinctions resulting from perturbations on mutualistic interactions as a result of environmental change. In this context, it is essential to be able to point out key species, whose stability would prevent cascading extinctions, and the consequent loss of ecosystem function. In this study, we aim to explain how the k-core decomposition sheds light on the understanding the robustness of bipartite mutualistic networks. We defined three k-magnitudes based on the k-core decomposition: k-radius, k-degree, and k-risk. The first one, k-radius, quantifies the distance from a node to the innermost shell of the partner guild, while k-degree provides a measure of centrality in the k-shell based decomposition. k-risk is a way to measure the vulnerability of a network to the loss of a particular species. Using these magnitudes we analyzed 89 mutualistic networks involving plant pollinators or seed dispersers. Two static extinction procedures were implemented in which k-degree and k-risk were compared against other commonly used ranking indexes, as for example MusRank, explained in detail in Material and Methods. When extinctions take place in both guilds, k-risk is the best ranking index if the goal is to identify the key species to preserve the giant component. When species are removed only in the primary class and cascading extinctions are measured in the secondary class, the most effective ranking index to identify the key species to preserve the giant component is k-degree. However, MusRank index was more effective when the goal is to identify the key species to preserve the greatest species richness in the second class. The k-core decomposition offers a new topological view of the structure of mutualistic networks. The new k-radius, k-degree and k-risk magnitudes take advantage of its properties and provide new insight into the structure of mutualistic networks. The k-risk and k-degree ranking

  18. Ranking of critical species to preserve the functionality of mutualistic networks using the k-core decomposition

    Directory of Open Access Journals (Sweden)

    Javier García-Algarra

    2017-05-01

    Full Text Available Background Network analysis has become a relevant approach to analyze cascading species extinctions resulting from perturbations on mutualistic interactions as a result of environmental change. In this context, it is essential to be able to point out key species, whose stability would prevent cascading extinctions, and the consequent loss of ecosystem function. In this study, we aim to explain how the k-core decomposition sheds light on the understanding the robustness of bipartite mutualistic networks. Methods We defined three k-magnitudes based on the k-core decomposition: k-radius, k-degree, and k-risk. The first one, k-radius, quantifies the distance from a node to the innermost shell of the partner guild, while k-degree provides a measure of centrality in the k-shell based decomposition. k-risk is a way to measure the vulnerability of a network to the loss of a particular species. Using these magnitudes we analyzed 89 mutualistic networks involving plant pollinators or seed dispersers. Two static extinction procedures were implemented in which k-degree and k-risk were compared against other commonly used ranking indexes, as for example MusRank, explained in detail in Material and Methods. Results When extinctions take place in both guilds, k-risk is the best ranking index if the goal is to identify the key species to preserve the giant component. When species are removed only in the primary class and cascading extinctions are measured in the secondary class, the most effective ranking index to identify the key species to preserve the giant component is k-degree. However, MusRank index was more effective when the goal is to identify the key species to preserve the greatest species richness in the second class. Discussion The k-core decomposition offers a new topological view of the structure of mutualistic networks. The new k-radius, k-degree and k-risk magnitudes take advantage of its properties and provide new insight into the structure of

  19. A Local Asynchronous Distributed Privacy Preserving Feature Selection Algorithm for Large Peer-to-Peer Networks

    Data.gov (United States)

    National Aeronautics and Space Administration — In this paper we develop a local distributed privacy preserving algorithm for feature selection in a large peer-to-peer environment. Feature selection is often used...

  20. Multi-objective optimization based privacy preserving distributed data mining in Peer-to-Peer networks

    Data.gov (United States)

    National Aeronautics and Space Administration — This paper proposes a scalable, local privacy preserving algorithm for distributed Peer-to-Peer (P2P) data aggregation useful for many advanced data mining/analysis...

  1. Connectivity-Preserving Approach for Distributed Adaptive Synchronized Tracking of Networked Uncertain Nonholonomic Mobile Robots.

    Science.gov (United States)

    Yoo, Sung Jin; Park, Bong Seok

    2017-09-06

    This paper addresses a distributed connectivity-preserving synchronized tracking problem of multiple uncertain nonholonomic mobile robots with limited communication ranges. The information of the time-varying leader robot is assumed to be accessible to only a small fraction of follower robots. The main contribution of this paper is to introduce a new distributed nonlinear error surface for dealing with both the synchronized tracking and the preservation of the initial connectivity patterns among nonholonomic robots. Based on this nonlinear error surface, the recursive design methodology is presented to construct the approximation-based local adaptive tracking scheme at the robot dynamic level. Furthermore, a technical lemma is established to analyze the stability and the connectivity preservation of the total closed-loop control system in the Lyapunov sense. An example is provided to illustrate the effectiveness of the proposed methodology.

  2. Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yi Sun

    2014-01-01

    Full Text Available With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients’ health information and doctors’ diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions.

  3. Language in the aging brain: the network dynamics of cognitive decline and preservation.

    Science.gov (United States)

    Shafto, Meredith A; Tyler, Lorraine K

    2014-10-31

    Language is a crucial and complex lifelong faculty, underpinned by dynamic interactions within and between specialized brain networks. Whereas normal aging impairs specific aspects of language production, most core language processes are robust to brain aging. We review recent behavioral and neuroimaging evidence showing that language systems remain largely stable across the life span and that both younger and older adults depend on dynamic neural responses to linguistic demands. Although some aspects of network dynamics change with age, there is no consistent evidence that core language processes are underpinned by different neural networks in younger and older adults. Copyright © 2014, American Association for the Advancement of Science.

  4. CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles

    KAUST Repository

    Li, Lun

    2018-01-23

    The vehicular announcement network is one of the most promising utilities in the communications of smart vehicles and in the smart transportation systems. In general, there are two major issues in building an effective vehicular announcement network. First, it is difficult to forward reliable announcements without revealing users\\' identities. Second, users usually lack the motivation to forward announcements. In this paper, we endeavor to resolve these two issues through proposing an effective announcement network called CreditCoin, a novel privacy-preserving incentive announcement network based on Blockchain via an efficient anonymous vehicular announcement aggregation protocol. On the one hand, CreditCoin allows nondeterministic different signers (i.e., users) to generate the signatures and to send announcements anonymously in the nonfully trusted environment. On the other hand, with Blockchain, CreditCoin motivates users with incentives to share traffic information. In addition, transactions and account information in CreditCoin are tamper-resistant. CreditCoin also achieves conditional privacy since Trace manager in CreditCoin traces malicious users\\' identities in anonymous announcements with related transactions. CreditCoin thus is able to motivate users to forward announcements anonymously and reliably. Extensive experimental results show that CreditCoin is efficient and practical in simulations of smart transportation.

  5. Whole-brain structural topology in adult attention-deficit/hyperactivity disorder: Preserved global – disturbed local network organization

    Directory of Open Access Journals (Sweden)

    Justina Sidlauskaite

    2015-01-01

    Full Text Available Prior studies demonstrate altered organization of functional brain networks in attention-deficit/hyperactivity disorder (ADHD. However, the structural underpinnings of these functional disturbances are poorly understood. In the current study, we applied a graph-theoretic approach to whole-brain diffusion magnetic resonance imaging data to investigate the organization of structural brain networks in adults with ADHD and unaffected controls using deterministic fiber tractography. Groups did not differ in terms of global network metrics — small-worldness, global efficiency and clustering coefficient. However, there were widespread ADHD-related effects at the nodal level in relation to local efficiency and clustering. The affected nodes included superior occipital, supramarginal, superior temporal, inferior parietal, angular and inferior frontal gyri, as well as putamen, thalamus and posterior cerebellum. Lower local efficiency of left superior temporal and supramarginal gyri was associated with higher ADHD symptom scores. Also greater local clustering of right putamen and lower local clustering of left supramarginal gyrus correlated with ADHD symptom severity. Overall, the findings indicate preserved global but altered local network organization in adult ADHD implicating regions underpinning putative ADHD-related neuropsychological deficits.

  6. Sync or separate? No compelling evidence for unintentional interpersonal coordination between Usain Bolt and Tyson Gay on the 100-meter world record race.

    Science.gov (United States)

    Blikslager, Frank; de Poel, Harjo J

    2017-07-01

    In a recent observation article in Journal of Experimental Psychology: Human Perception and Performance (JEP:HPP; Varlet & Richardson, 2015) the 100-m sprint final of the World Championship in Athletics in Berlin of 2009 (i.e., the current world record race) was analyzed. That study reported occurrence of spontaneous, unintentional interpersonal synchronization between Usain Bolt and Tyson Gay, the respective winner and runner-up of that race. In the present commentary article, however, we argue that the results and conclusion of that study cannot be warranted because of methodological shortcomings. We addressed the same research question and reassessed the same race using an alternative data analysis method. These results revealed that as yet there is no sufficient ground to conclude that in the 100-m world record race synchronization occurred between Bolt and Gay. Yet, our reanalysis suggested that even at this very elite level the individual movement frequencies did seem to vary to such an extent that synchronization would theoretically still be possible, thereby providing incentives for further examination of potential unintentional synchronization in coactive sports. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  7. Towards Preserving the Confidentiality of Information in a Local Area Network (LAN Messaging System

    Directory of Open Access Journals (Sweden)

    Aderonke Favour-Bethy THOMPSON

    2013-01-01

    Full Text Available Messaging system remains preeminent as themedium of official communication. The fear of confidentialitybeing breached has led many organizations in developingvarious ways in checking the excesses of unwanted users. In themessaging system designed, users are allowed to send andreceive messages with the options of either encrypting the dataor not. The Substitution Permutation Network (SPN, an AESencryption algorithm, implemented in the messaging systemmakes information sent over the network ‘useless’ whencompromised so as to reduce the damage done wheneversensitive and classified information gets to the wrong hands. Theapplication was implemented and tested and was found to be effective.

  8. Data collection framework for energy efficient privacy preservation in wireless sensor networks having many-to-many structures.

    Science.gov (United States)

    Bahşi, Hayretdin; Levi, Albert

    2010-01-01

    Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-to-many structures evolved due to the need for conveying collected event information to multiple sinks. Privacy preserved data collection models in the literature do not solve the problems of WSN applications in which network has multiple un-trusted sinks with different level of privacy requirements. This study proposes a data collection framework bases on k-anonymity for preventing record disclosure of collected event information in WSNs. Proposed method takes the anonymity requirements of multiple sinks into consideration by providing different levels of privacy for each destination sink. Attributes, which may identify an event owner, are generalized or encrypted in order to meet the different anonymity requirements of sinks at the same anonymized output. If the same output is formed, it can be multicasted to all sinks. The other trivial solution is to produce different anonymized outputs for each sink and send them to related sinks. Multicasting is an energy efficient data sending alternative for some sensor nodes. Since minimization of energy consumption is an important design criteria for WSNs, multicasting the same event information to multiple sinks reduces the energy consumption of overall network.

  9. Data Collection Framework for Energy Efficient Privacy Preservation in Wireless Sensor Networks Having Many-to-Many Structures

    Directory of Open Access Journals (Sweden)

    Hayretdin Bahsi

    2010-09-01

    Full Text Available Wireless sensor networks (WSNs generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-to-many structures evolved due to the need for conveying collected event information to multiple sinks. Privacy preserved data collection models in the literature do not solve the problems of WSN applications in which network has multiple un-trusted sinks with different level of privacy requirements. This study proposes a data collection framework bases on k-anonymity for preventing record disclosure of collected event information in WSNs. Proposed method takes the anonymity requirements of multiple sinks into consideration by providing different levels of privacy for each destination sink. Attributes, which may identify an event owner, are generalized or encrypted in order to meet the different anonymity requirements of sinks at the same anonymized output. If the same output is formed, it can be multicasted to all sinks. The other trivial solution is to produce different anonymized outputs for each sink and send them to related sinks. Multicasting is an energy efficient data sending alternative for some sensor nodes. Since minimization of energy consumption is an important design criteria for WSNs, multicasting the same event information to multiple sinks reduces the energy consumption of overall network.

  10. POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks

    NARCIS (Netherlands)

    Jeckmans, Arjan; Tang, Qiang; Hartel, Pieter H.

    2011-01-01

    Currently, none of the existing online social networks (OSNs) enables its users to make new friends without revealing their private information. This leaves the users in a vulnerable position when searching for new friends. We propose a solution which enables a user to compute her profile similarity

  11. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    OpenAIRE

    Yanrong Lu; Lixiang Li; Haipeng Peng; Yixian Yang

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas?s currently scheme and demonstrate the major securit...

  12. DECENTRALIZED SOCIAL NETWORK SERVICE USING THE WEB HOSTING SERVER FOR PRIVACY PRESERVATION

    Directory of Open Access Journals (Sweden)

    Yoonho Nam

    2013-10-01

    Full Text Available In recent years, the number of subscribers of the social network services such as Facebook and Twitter has increased rapidly. In accordance with the increasing popularity of social network services, concerns about user privacy are also growing. Existing social network services have a centralized structure that a service provider collects all the user’s profile and logs until the end of the connection. The information collected typically useful for commercial purposes, but may lead to a serious user privacy violation. The user’s profile can be compromised for malicious purposes, and even may be a tool of surveillance extremely. In this paper, we remove a centralized structure to prevent the service provider from collecting all users’ information indiscriminately, and present a decentralized structure using the web hosting server. The service provider provides only the service applications to web hosting companies, and the user should select a web hosting company that he trusts. Thus, the user’s information is distributed, and the user’s privacy is guaranteed from the service provider.

  13. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.

    Science.gov (United States)

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-06-20

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.

  14. A Neural-Network Clustering-Based Algorithm for Privacy Preserving Data Mining

    Science.gov (United States)

    Tsiafoulis, S.; Zorkadis, V. C.; Karras, D. A.

    The increasing use of fast and efficient data mining algorithms in huge collections of personal data, facilitated through the exponential growth of technology, in particular in the field of electronic data storage media and processing power, has raised serious ethical, philosophical and legal issues related to privacy protection. To cope with these concerns, several privacy preserving methodologies have been proposed, classified in two categories, methodologies that aim at protecting the sensitive data and those that aim at protecting the mining results. In our work, we focus on sensitive data protection and compare existing techniques according to their anonymity degree achieved, the information loss suffered and their performance characteristics. The ℓ-diversity principle is combined with k-anonymity concepts, so that background information can not be exploited to successfully attack the privacy of data subjects data refer to. Based on Kohonen Self Organizing Feature Maps (SOMs), we firstly organize data sets in subspaces according to their information theoretical distance to each other, then create the most relevant classes paying special attention to rare sensitive attribute values, and finally generalize attribute values to the minimum extend required so that both the data disclosure probability and the information loss are possibly kept negligible. Furthermore, we propose information theoretical measures for assessing the anonymity degree achieved and empirical tests to demonstrate it.

  15. A Method with Node Autonomy to Preserve QoS in Networks with Per- Route Admission

    Directory of Open Access Journals (Sweden)

    Mateos-Papis

    2013-01-01

    Full Text Available This paper presents a method called the Short Term Protection (STP which is applied to fixed networks whereflows1 are constrained to follow specific routes, where the admission-process is distributed, per-route, and wherethe traffic is sensitive to delay (like MPEG4 traffic. The share of bandwidth of any route is protected, in the shortterm,against the traffic-increment of its intersecting-routes. In the long term, in every congested link, the share ofbandwidth between the routes that intersect at that link is proportional to the average relative measured demandsof those routes. The nodes act autonomously, without central administration. This method is expected to: 1 helpnetwork administrators to have confidence, within a time-frame , about the amount of bandwidth they count on forevery route; 2 allow a simple bandwidth management in the network, with prospect to be scalable to at least tensof nodes. This paper presents the general and detailed operation of the method, the evaluation of the method, bysimulations, including a comparison with other method, a discussion of a possible scenario of application,conclusions and possible paths for further research.

  16. A network of multi-tasking proteins at the DNA replication fork preserves genome stability.

    Directory of Open Access Journals (Sweden)

    Martin E Budd

    2005-12-01

    Full Text Available To elucidate the network that maintains high fidelity genome replication, we have introduced two conditional mutant alleles of DNA2, an essential DNA replication gene, into each of the approximately 4,700 viable yeast deletion mutants and determined the fitness of the double mutants. Fifty-six DNA2-interacting genes were identified. Clustering analysis of genomic synthetic lethality profiles of each of 43 of the DNA2-interacting genes defines a network (consisting of 322 genes and 876 interactions whose topology provides clues as to how replication proteins coordinate regulation and repair to protect genome integrity. The results also shed new light on the functions of the query gene DNA2, which, despite many years of study, remain controversial, especially its proposed role in Okazaki fragment processing and the nature of its in vivo substrates. Because of the multifunctional nature of virtually all proteins at the replication fork, the meaning of any single genetic interaction is inherently ambiguous. The multiplexing nature of the current studies, however, combined with follow-up supporting experiments, reveals most if not all of the unique pathways requiring Dna2p. These include not only Okazaki fragment processing and DNA repair but also chromatin dynamics.

  17. A Network of Multi-Tasking Proteins at the DNA Replication Fork Preserves Genome Stability.

    Directory of Open Access Journals (Sweden)

    2005-12-01

    Full Text Available To elucidate the network that maintains high fidelity genome replication, we have introduced two conditional mutant alleles of DNA2, an essential DNA replication gene, into each of the approximately 4,700 viable yeast deletion mutants and determined the fitness of the double mutants. Fifty-six DNA2-interacting genes were identified. Clustering analysis of genomic synthetic lethality profiles of each of 43 of the DNA2-interacting genes defines a network (consisting of 322 genes and 876 interactions whose topology provides clues as to how replication proteins coordinate regulation and repair to protect genome integrity. The results also shed new light on the functions of the query gene DNA2, which, despite many years of study, remain controversial, especially its proposed role in Okazaki fragment processing and the nature of its in vivo substrates. Because of the multifunctional nature of virtually all proteins at the replication fork, the meaning of any single genetic interaction is inherently ambiguous. The multiplexing nature of the current studies, however, combined with follow-up supporting experiments, reveals most if not all of the unique pathways requiring Dna2p. These include not only Okazaki fragment processing and DNA repair but also chromatin dynamics.

  18. Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities

    Directory of Open Access Journals (Sweden)

    Qinlong Huang

    2017-01-01

    Full Text Available Mobile healthcare social networks (MHSN integrated with connected medical sensors and cloud-based health data storage provide preventive and curative health services in smart cities. The fusion of social data together with real-time health data facilitates a novel paradigm of healthcare big data analysis. However, the collaboration of healthcare and social network service providers may pose a series of security and privacy issues. In this paper, we propose a secure health and social data sharing and collaboration scheme in MHSN. To preserve the data privacy, we realize secure and fine-grained health data and social data sharing with attribute-based encryption and identity-based broadcast encryption techniques, respectively, which allows patients to share their private personal data securely. In order to achieve enhanced data collaboration, we allow the healthcare analyzers to access both the reencrypted health data and the social data with authorization from the data owner based on proxy reencryption. Specifically, most of the health data encryption and decryption computations are outsourced from resource-constrained mobile devices to a health cloud, and the decryption of the healthcare analyzer incurs a low cost. The security and performance analysis results show the security and efficiency of our scheme.

  19. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2016-06-01

    Full Text Available WSNs (Wireless sensor networks are nowadays viewed as a vital portion of the IoTs (Internet of Things. Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  20. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  1. Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    R Regin

    2015-12-01

    Full Text Available Location privacy measures need to be developed to prevent the opponent from determining the physical locations of source sensors and sinks. An opponent can easily intercept network traffic due to the use of a broadcast medium for routing packets and get detailed information such as packet transmission time and frequency to perform traffic analysis and infer the locations of monitored objects and data sinks. On the other hand, sensors usually have limited processing speed and energy supplies. It is very expensive to apply traditional anonymous communication techniques for hiding the communication between sensor nodes and sinks. The existing source-location privacy protects the location of monitored objects to increase the number of messages sent by the source before the object is located by the attacker. The flooding technique has the source node send each packet through numerous paths to a sink making it difficult for an opponent to trace the source. The locations of sinks can be protected from a local eavesdropper by hashing the ID field in the packet header. But opponent can track sinks by carrying out time correlation and rate monitoring attacks. Besides protection some source nodes are transferring relatively large amounts of data in existing system. As a result, these nodes run out of battery faster due to improper position of nodes and sinks. Thus in the proposed system the sinks should be located as optimally as possible to reduce traffic flow and energy consumption for sensor nodes. Hence Sink placement problem is resolved for minimizing the delay as well as maximizing the lifetime of a WSN. Thus proposed system is efficient in terms of overhead and functionality when compared to existing system.

  2. Data Preservation

    Directory of Open Access Journals (Sweden)

    Carlo Meghini

    2013-07-01

    Full Text Available Digital information is a vital resource in our knowledge economy, valuable for research and education, science and the humanities, creative and cultural activities, and public policy (The Blue Ribbon Task Force on Sustainable Digital Preservation and Access, 2010. New high-throughput instruments, telescopes, satellites, accelerators, supercomputers, sensor networks, and running simulations are generating massive amounts of data (Thanos, 2011. These data are used by decision makers for improving the quality of life of citizens. Moreover, researchers are employing sophisticated technologies to analyse these data to address questions that were unapproachable just a few years ago (Helbing & Balietti, 2011. Digital technologies have fostered a new world of research characterized by immense datasets, unprecedented levels of openness among researchers, and new connections among researchers, policy makers, and the public (The National Academy of Sciences, 2009.

  3. The U.S culture collection network lays the foundation for progress in preservation of valuable microbial resources

    Science.gov (United States)

    K. McCluskey; A. Alvarez; R. Bennett; D. Bokati; K. Boundy-Mills; D. D. Brown; C. T. Bull; M. Coffey; T. Dreaden; C. Duke; G. Dye; E. Ehmke; K. Eversole; K. Fenstermacher; D. Geiser; Jessie A. Glaeser; S. Greene; L. Gribble; M. P. Griffith; K. Hanser; R. Humber; B. W. Johnson; A. Kermode; M. Krichevsky; M. Laudon; J. Leach; J. Leslie; M. May; U. Melcher; D. Nobles; N. R. Fonseca; S. Robinson; M. Ryan; J. Scott; C. Silflow; A. Vidaver; K. M. Webb; J. E. Wertz; S. Yentsch; S. Zehr

    2016-01-01

    The U.S. Culture Collection Network was formed in 2012 by a group of culture collection scientists and stakeholders in order to continue the progress established previously through efforts of an ad hoc group. The network is supported by a Research Coordination Network grant from the U.S. National Science Foundation (NSF) and has the goals of promoting interaction among...

  4. The U.S.Culture Collection Network lays the foundation for progress in preservation of valuable microbial resources

    Science.gov (United States)

    Kevin McCluskey; Anne Alvarez; Rick Bennett; Deepak Bokati; Kyria Boundy-Mills; Daniel Brown; Carolee T. Bull; Michael Coffey; Tyler Dreaden; Clifford Duke; Greg Dye; Erin Ehmke; Kellye Eversole; Kristi Fenstermacher; David Geiser; Jessie A. Glaeser; Stephanie Greene; Lisa Gribble; M. Patrick Griffith; Kathryn Hanser; Richard Humber; Barbara W. Johnson; Anthony Kermode; Micah Krichevsky; Matt Laudon; Jan Leach; John Leslie; Meghan May; Ulrich Melcher; David Nobles; Natalia Risso Fonseca; Sara Robinson; Matthew Ryan; James Scott; Carolyn Silflow; Anne Vidaver; Kimberly M. Webb; John E. Wertz; Sara Yentsch; Sarah Zehr

    2016-01-01

    The U. S. Culture Collection Network was formed in 2012 by a group of culture collection scientists and stakeholders in order to continue the progress established previously through efforts of an ad hock group.  The network is supported by a Research Coordination Network grant from the U.S. National Science Foundation (NSF) and has the goals of promoting interaction...

  5. Communication of brain network core connections altered in behavioral variant frontotemporal dementia but possibly preserved in early-onset Alzheimer's disease

    Science.gov (United States)

    Daianu, Madelaine; Jahanshad, Neda; Mendez, Mario F.; Bartzokis, George; Jimenez, Elvira E.; Thompson, Paul M.

    2015-03-01

    Diffusion imaging and brain connectivity analyses can assess white matter deterioration in the brain, revealing the underlying patterns of how brain structure declines. Fiber tractography methods can infer neural pathways and connectivity patterns, yielding sensitive mathematical metrics of network integrity. Here, we analyzed 1.5-Tesla wholebrain diffusion-weighted images from 64 participants - 15 patients with behavioral variant frontotemporal dementia (bvFTD), 19 with early-onset Alzheimer's disease (EOAD), and 30 healthy elderly controls. Using whole-brain tractography, we reconstructed structural brain connectivity networks to map connections between cortical regions. We evaluated the brain's networks focusing on the most highly central and connected regions, also known as hubs, in each diagnostic group - specifically the "high-cost" structural backbone used in global and regional communication. The high-cost backbone of the brain, predicted by fiber density and minimally short pathways between brain regions, accounted for 81-92% of the overall brain communication metric in all diagnostic groups. Furthermore, we found that the set of pathways interconnecting high-cost and high-capacity regions of the brain's communication network are globally and regionally altered in bvFTD, compared to healthy participants; however, the overall organization of the high-cost and high-capacity networks were relatively preserved in EOAD participants, relative to controls. Disruption of the major central hubs that transfer information between brain regions may impair neural communication and functional integrity in characteristic ways typical of each subtype of dementia.

  6. Socket preservation

    Directory of Open Access Journals (Sweden)

    Caecilia Susetya Wahyu Nurhaeini

    2017-08-01

    Full Text Available Alveolar ridge will commonly decrease in volume and change morphologically, as a result of a tooth loss. These changes are usually clinically significant and can make placement of a conventional protesa  or an implant more difficult. Socket preservation after tooth extraction can minimize ridge resorption. By using socket preservation techniques, it is possible to preserve the height and width of the ridge. Socket preservation can be done by atraumatic tooth extraction, placement of bone graft material, membrane, combination of bone graft and membrane, and connective tissue graf.

  7. Optimization by experimental design and artificial neural networks of the ion-interaction reversed-phase liquid chromatographic separation of twenty cosmetic preservatives.

    Science.gov (United States)

    Marengo, E; Gianotti, V; Angioi, S; Gennaro, M C

    2004-03-12

    Particular attention are recently receiving antimicrobial agents added as preservatives in hygiene and cosmetics commercial products, since some of them are suspected to be harmful to the human health. The preservatives used belong to different classes of chemical species and are generally used in their mixtures. Multi-component methods able to simultaneously determinate species with different chemical structure are therefore highly required in quality control analysis. This paper presents an ion interaction RP-HPLC method for the simultaneous separation of the 20 typical antimicrobial agents most used in cosmetics and hygiene products, that are: benzoic acid, salicylic acid, 4-hydroxybenzoic acid, methyl-, ethyl-, propyl-, butyl-, benzyl-benzoate, methyl-, ethyl-, propyl-, butyl-, benzyl-paraben, o-phenyl-phenol, 4-chloro-m-cresol, triclocarban, dehydroacetic acid, bronopol, sodium pyrithione and chlorhexidine. For the development of the method and the optimization of the chromatographic conditions, an experimental design was planned and models were built by the use of artificial neural network to correlate the retention time of each analyte to the variables and their interactions. The neuronal models developed showed good predictive ability and were used, by a grid search algorithm, to optimize the chromatographic conditions for the separation of the mixture.

  8. Software preservation

    Directory of Open Access Journals (Sweden)

    Tadej Vodopivec

    2011-01-01

    Full Text Available Comtrade Ltd. covers a wide range of activities related to information and communication technologies; its deliverables include web applications, locally installed programs,system software, drivers, embedded software (used e.g. in medical devices, auto parts,communication switchboards. Also the extensive knowledge and practical experience about digital long-term preservation technologies have been acquired. This wide spectrum of activities puts us in the position to discuss the often overlooked aspect of the digital preservation - preservation of software programs. There are many resources dedicated to digital preservation of digital data, documents and multimedia records,but not so many about how to preserve the functionalities and features of computer programs. Exactly these functionalities - dynamic response to inputs - render the computer programs rich compared to documents or linear multimedia. The article opens the questions on the beginning of the way to the permanent digital preservation. The purpose is to find a way in the right direction, where all relevant aspects will be covered in proper balance. The following questions are asked: why at all to preserve computer programs permanently, who should do this and for whom, when we should think about permanent program preservation, what should be persevered (such as source code, screenshots, documentation, and social context of the program - e.g. media response to it ..., where and how? To illustrate the theoretic concepts given the idea of virtual national museum of electronic banking is also presented.

  9. Mammal Inventory of the Mojave Network Parks-Death Valley and Joshua Tree National Parks, Lake Mead National Recreation Area, Manzanar National Historic Site, and Mojave National Preserve

    Science.gov (United States)

    Drost, Charles A.; Hart, Jan

    2008-01-01

    This report describes the results of a mammal inventory study of National Park Service units in the Mojave Desert Network, including Death Valley National Park, Joshua Tree National Park, Lake Mead National Recreation Area, Manzanar National Historic Site, and Mojave National Preserve. Fieldwork for the inventory focused on small mammals, primarily rodents and bats. Fieldwork for terrestrial small mammals used trapping with Sherman and Tomahawk small- and medium-sized mammal traps, along with visual surveys for diurnal species. The majority of sampling for terrestrial small mammals was carried out in 2002 and 2003. Methods used in field surveys for bats included mist-netting at tanks and other water bodies, along with acoustic surveys using Anabat. Most of the bat survey work was conducted in 2003. Because of extremely dry conditions in the first two survey years (and associated low mammal numbers), we extended field sampling into 2004, following a relatively wet winter. In addition to field sampling, we also reviewed, evaluated, and summarized museum and literature records of mammal species for all of the Park units. We documented a total of 59 mammal species as present at Death Valley National Park, with an additional five species that we consider of probable occurrence. At Joshua Tree, we also documented 50 species, and an additional four 'probable' species. At Lake Mead National Recreation Area, 57 mammal species have been positively documented, with 10 additional probable species. Manzanar National Historic Site had not been previously surveyed. We documented 19 mammal species at Manzanar, with an additional 11 probable species. Mojave National Preserve had not had a comprehensive list previously, either. There are now a total of 50 mammal species documented at Mojave, with three additional probable species. Of these totals, 23 occurrences are new at individual park units (positively documented for the first time), with most of these being at Manzanar

  10. Digital preservation

    CERN Document Server

    Deegan, Marilyn

    2013-01-01

    Digital preservation is an issue of huge importance to the library and information profession right now. With the widescale adoption of the internet and the rise of the world wide web, the world has been overwhelmed by digital information. Digital data is being produced on a massive scale by individuals and institutions: some of it is born, lives and dies only in digital form, and it is the potential death of this data, with its impact on the preservation of culture, that is the concern of this book. So how can information professionals try to remedy this? Digital preservation is a complex iss

  11. Visualization of prosomes (MCP-proteasomes), intermediate filament and actin networks by "instantaneous fixation" preserving the cytoskeleton.

    Science.gov (United States)

    Arcangeletti, C; Sütterlin, R; Aebi, U; De Conto, F; Missorini, S; Chezzi, C; Scherrer, K

    1997-06-01

    A new "instantaneous" fixation/extraction procedure, yielding good preservation of intermediate filaments (IFs) and actin filaments when applied at 37 degrees C, has been explored to reexamine the relationships of the prosomes to the cytoskeleton. Prosomes are protein complexes of variable subunit composition, including occasionally a small RNA, which were originally observed as trans-acting factors in untranslated mRNPs. Constituting also the proteolytic core of the 26S proteasomes, they are also called "multicatalytic proteinase (MCP) complexes" or "20S-Proteasomes." In Triton X-100-extracted epithelial, fibroblastic, and muscle cells, prosome particles were found associated primarily with the IFs (Olink-Coux et al., 1994). Application of "instantaneous fixation" has now led to the new observation that a major fraction of prosome particles, composed of specific sets of subunits, is distributed in variable proportions between the IFs and the microfilament/ stress fiber system in PtK1 epithelial cells and human fibroblasts. Electron microscopy using gold-labeled antibodies confirms this dual localization on classical whole mounts and on cells exposed to instantaneous fixation. In contrast to the resistance of the prosome-IF association, a variable fraction of the prosome particles is released from the actin cytoskeleton by Triton X-100 when applied prior to fixation. Moreover, in vitro copolymerization of prosomes with G-actin made it possible to observe "ladder-like" filamentous structures in the electron microscope, in which the prosome particles, like the "rungs of a ladder," laterally crosslink two or more actin filaments in a regular pattern. These results demonstrate that prosomes are bound in the cell not only to IFs but also to the actin cytoskeleton and, furthermore, not only within large M(r) complexes (possibly mRNPs and/or 26S proteasomes), but also directly, as individual prosome particles.

  12. Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software codesign.

    Science.gov (United States)

    Hu, Fei; Jiang, Meng; Wagner, Mark; Dong, De-Cun

    2007-11-01

    Recently, a remote-sensing platform based on wireless interconnection of tiny ECG sensors called Telecardiology Sensor Networks (TSN) provided a promising approach to perform low-cost real-time cardiac patient monitoring at any time in community areas (such as elder nursing homes or hospitals). The contribution of this research is the design of a practical TSN hardware/software platform for a typical U.S. healthcare community scenario (such as large nursing homes with many elder patients) to perform real-time healthcare data collections. On the other hand, due to the radio broadcasting nature of MANET, a TSN has the risk of losing the privacy of patients' data. Medical privacy has been highly emphasized by U.S. Department of Health and Human Services. This research also designs a medical security scheme with low communication overhead to achieve confidential electrocardiogram data transmission in wireless medium.

  13. Effects of Aortic Valve Replacement on Severe Aortic Stenosis and Preserved Systolic Function: Systematic Review and Network Meta-analysis.

    Science.gov (United States)

    Zheng, Qishi; Djohan, Andie H; Lim, Enghow; Ding, Zee Pin; Ling, Lieng H; Shi, Luming; Chan, Edwin Shih-Yen; Chin, Calvin Woon Loong

    2017-07-11

    The survival benefits of aortic valve replacement (AVR) in the different flow-gradient states of severe aortic stenosis (AS) is not known. A comprehensive search in PubMed/MEDLINE, Embase, Cochrane Library, CNKI and OpenGrey were conducted to identify studies that investigated the prognosis of severe AS (effective orifice area ≤1.0 cm(2)) and left ventricular ejection fraction ≥50%. Severe AS was stratified by mean pressure gradient [threshold of 40 mmHg; high-gradient (HG) and low-gradient (LG)] and stroke volume index [threshold of 35 ml/m(2); normal-flow (NL) and low-flow (LF)]. Network meta-analysis was conducted to assess all-cause mortality among each AS sub-type with rate ratio (RR) reported. The effects of AVR on prognosis were examined using network meta-regression. In the pooled analysis (15 studies and 9,737 patients), LF states (both HG and LG) were associated with increased mortality rate (LFLG: RR 1.88; 95% CI: 1.43-2.46; LFHG: RR: 1.77; 95% CI: 1.16-2.70) compared to moderate AS; and NF states in both HG and LG had similar prognosis as moderate AS (NFLG: RR 1.11; 95% CI: 0.81-1.53; NFHG: RR 1.16; 95% CI: 0.82-1.64). AVR conferred different survival benefits: it was most effective in NFHG (RR with AVR /RR without AVR : 0.43; 95% CI: 0.22-0.82) and least in LFLG (RR with AVR /RR without AVR : 1.19; 95% CI: 0.74-1.94).

  14. The fossil Osmundales (Royal Ferns)—a phylogenetic network analysis, revised taxonomy, and evolutionary classification of anatomically preserved trunks and rhizomes

    Science.gov (United States)

    2017-01-01

    The Osmundales (Royal Fern order) originated in the late Paleozoic and is the most ancient surviving lineage of leptosporangiate ferns. In contrast to its low diversity today (less than 20 species in six genera), it has the richest fossil record of any extant group of ferns. The structurally preserved trunks and rhizomes alone are referable to more than 100 fossil species that are classified in up to 20 genera, four subfamilies, and two families. This diverse fossil record constitutes an exceptional source of information on the evolutionary history of the group from the Permian to the present. However, inconsistent terminology, varying formats of description, and the general lack of a uniform taxonomic concept renders this wealth of information poorly accessible. To this end, we provide a comprehensive review of the diversity of structural features of osmundalean axes under a standardized, descriptive terminology. A novel morphological character matrix with 45 anatomical characters scored for 15 extant species and for 114 fossil operational units (species or specimens) is analysed using networks in order to establish systematic relationships among fossil and extant Osmundales rooted in axis anatomy. The results lead us to propose an evolutionary classification for fossil Osmundales and a revised, standardized taxonomy for all taxa down to the rank of (sub)genus. We introduce several nomenclatural novelties: (1) a new subfamily Itopsidemoideae (Guaireaceae) is established to contain Itopsidema, Donwelliacaulis, and Tiania; (2) the thamnopteroid genera Zalesskya, Iegosigopteris, and Petcheropteris are all considered synonymous with Thamnopteris; (3) 12 species of Millerocaulis and Ashicaulis are assigned to modern genera (tribe Osmundeae); (4) the hitherto enigmatic Aurealcaulis is identified as an extinct subgenus of Plenasium; and (5) the poorly known Osmundites tuhajkulensis is assigned to Millerocaulis. In addition, we consider Millerocaulis stipabonettiorum a

  15. The fossil Osmundales (Royal Ferns—a phylogenetic network analysis, revised taxonomy, and evolutionary classification of anatomically preserved trunks and rhizomes

    Directory of Open Access Journals (Sweden)

    Benjamin Bomfleur

    2017-07-01

    Full Text Available The Osmundales (Royal Fern order originated in the late Paleozoic and is the most ancient surviving lineage of leptosporangiate ferns. In contrast to its low diversity today (less than 20 species in six genera, it has the richest fossil record of any extant group of ferns. The structurally preserved trunks and rhizomes alone are referable to more than 100 fossil species that are classified in up to 20 genera, four subfamilies, and two families. This diverse fossil record constitutes an exceptional source of information on the evolutionary history of the group from the Permian to the present. However, inconsistent terminology, varying formats of description, and the general lack of a uniform taxonomic concept renders this wealth of information poorly accessible. To this end, we provide a comprehensive review of the diversity of structural features of osmundalean axes under a standardized, descriptive terminology. A novel morphological character matrix with 45 anatomical characters scored for 15 extant species and for 114 fossil operational units (species or specimens is analysed using networks in order to establish systematic relationships among fossil and extant Osmundales rooted in axis anatomy. The results lead us to propose an evolutionary classification for fossil Osmundales and a revised, standardized taxonomy for all taxa down to the rank of (subgenus. We introduce several nomenclatural novelties: (1 a new subfamily Itopsidemoideae (Guaireaceae is established to contain Itopsidema, Donwelliacaulis, and Tiania; (2 the thamnopteroid genera Zalesskya, Iegosigopteris, and Petcheropteris are all considered synonymous with Thamnopteris; (3 12 species of Millerocaulis and Ashicaulis are assigned to modern genera (tribe Osmundeae; (4 the hitherto enigmatic Aurealcaulis is identified as an extinct subgenus of Plenasium; and (5 the poorly known Osmundites tuhajkulensis is assigned to Millerocaulis. In addition, we consider Millerocaulis

  16. The fossil Osmundales (Royal Ferns)-a phylogenetic network analysis, revised taxonomy, and evolutionary classification of anatomically preserved trunks and rhizomes.

    Science.gov (United States)

    Bomfleur, Benjamin; Grimm, Guido W; McLoughlin, Stephen

    2017-01-01

    The Osmundales (Royal Fern order) originated in the late Paleozoic and is the most ancient surviving lineage of leptosporangiate ferns. In contrast to its low diversity today (less than 20 species in six genera), it has the richest fossil record of any extant group of ferns. The structurally preserved trunks and rhizomes alone are referable to more than 100 fossil species that are classified in up to 20 genera, four subfamilies, and two families. This diverse fossil record constitutes an exceptional source of information on the evolutionary history of the group from the Permian to the present. However, inconsistent terminology, varying formats of description, and the general lack of a uniform taxonomic concept renders this wealth of information poorly accessible. To this end, we provide a comprehensive review of the diversity of structural features of osmundalean axes under a standardized, descriptive terminology. A novel morphological character matrix with 45 anatomical characters scored for 15 extant species and for 114 fossil operational units (species or specimens) is analysed using networks in order to establish systematic relationships among fossil and extant Osmundales rooted in axis anatomy. The results lead us to propose an evolutionary classification for fossil Osmundales and a revised, standardized taxonomy for all taxa down to the rank of (sub)genus. We introduce several nomenclatural novelties: (1) a new subfamily Itopsidemoideae (Guaireaceae) is established to contain Itopsidema, Donwelliacaulis, and Tiania; (2) the thamnopteroid genera Zalesskya, Iegosigopteris, and Petcheropteris are all considered synonymous with Thamnopteris; (3) 12 species of Millerocaulis and Ashicaulis are assigned to modern genera (tribe Osmundeae); (4) the hitherto enigmatic Aurealcaulis is identified as an extinct subgenus of Plenasium; and (5) the poorly known Osmundites tuhajkulensis is assigned to Millerocaulis. In addition, we consider Millerocaulis stipabonettiorum a

  17. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    . To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...

  18. What Is Fertility Preservation?

    Science.gov (United States)

    ... Share Facebook Twitter Pinterest Email Print What is fertility preservation? Fertility preservation is the process of saving or protecting ... children in the future. Who can benefit from fertility preservation? People with certain diseases, disorders, and life ...

  19. The homeodomain-interacting protein kinase HPK-1 preserves protein homeostasis and longevity through master regulatory control of the HSF-1 chaperone network and TORC1-restricted autophagy in Caenorhabditis elegans

    Science.gov (United States)

    Morton, Elizabeth A.; Cornwell, Adam B.; Crick, Beresford; Lamitina, Todd; Douglas, Peter M.

    2017-01-01

    An extensive proteostatic network comprised of molecular chaperones and protein clearance mechanisms functions collectively to preserve the integrity and resiliency of the proteome. The efficacy of this network deteriorates during aging, coinciding with many clinical manifestations, including protein aggregation diseases of the nervous system. A decline in proteostasis can be delayed through the activation of cytoprotective transcriptional responses, which are sensitive to environmental stress and internal metabolic and physiological cues. The homeodomain-interacting protein kinase (hipk) family members are conserved transcriptional co-factors that have been implicated in both genotoxic and metabolic stress responses from yeast to mammals. We demonstrate that constitutive expression of the sole Caenorhabditis elegans Hipk homolog, hpk-1, is sufficient to delay aging, preserve proteostasis, and promote stress resistance, while loss of hpk-1 is deleterious to these phenotypes. We show that HPK-1 preserves proteostasis and extends longevity through distinct but complementary genetic pathways defined by the heat shock transcription factor (HSF-1), and the target of rapamycin complex 1 (TORC1). We demonstrate that HPK-1 antagonizes sumoylation of HSF-1, a post-translational modification associated with reduced transcriptional activity in mammals. We show that inhibition of sumoylation by RNAi enhances HSF-1-dependent transcriptional induction of chaperones in response to heat shock. We find that hpk-1 is required for HSF-1 to induce molecular chaperones after thermal stress and enhances hormetic extension of longevity. We also show that HPK-1 is required in conjunction with HSF-1 for maintenance of proteostasis in the absence of thermal stress, protecting against the formation of polyglutamine (Q35::YFP) protein aggregates and associated locomotory toxicity. These functions of HPK-1/HSF-1 undergo rapid down-regulation once animals reach reproductive maturity. We show

  20. Review of "Privacy-preserving network forensics" by Afanasyev M., Kohno T., Ma J., Murphy N., Savage S., Snoeren A., and Voelker G.

    NARCIS (Netherlands)

    Hartel, Pieter H.

    The Internet offers users some anonymity; at the network level, an Internet protocol (IP) address is only loosely associated with a device, and is not associated with a person. This article proposes the use of group signatures to bind the identity of the device responsible for sending a packet with

  1. Alveolar ridge preservation after tooth extraction: a Bayesian Network meta-analysis of grafting materials efficacy on prevention of bone height and width reduction.

    Science.gov (United States)

    Iocca, Oreste; Farcomeni, Alessio; Pardiñas Lopez, Simon; Talib, Huzefa S

    2017-01-01

    To conduct a traditional meta-analysis and a Bayesian Network meta-analysis to synthesize the information coming from randomized controlled trials on different socket grafting materials and combine the resulting indirect evidence in order to make inferences on treatments that have not been compared directly. RCTs were identified for inclusion in the systematic review and subsequent statistical analysis. Bone height and width remodelling were selected as the chosen summary measures for comparison. First, a series of pairwise meta-analyses were performed and overall mean difference (MD) in mm with 95% CI was calculated between grafted versus non-grafted sockets. Then, a Bayesian Network meta-analysis was performed to draw indirect conclusions on which grafting materials can be considered most likely the best compared to the others. From the six included studies, seven comparisons were obtained. Traditional meta-analysis showed statistically significant results in favour of grafting the socket compared to no-graft both for height (MD 1.02, 95% CI 0.44-1.59, p value Bayesian Network meta-analysis allowed to obtain a rank of intervention efficacy. On the basis of the results of the present analysis, socket grafting seems to be more favourable than unassisted socket healing. Moreover, Bayesian Network meta-analysis indicates that freeze-dried bone graft plus membrane is the most likely effective in the reduction of bone height remodelling. Autologous bone marrow resulted the most likely effective when width remodelling was considered. Studies with larger samples and less risk of bias should be conducted in the future in order to further strengthen the results of this analysis. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  2. [Fertility preservation in oncology].

    Science.gov (United States)

    Chaput, Laure; Grémeau, Anne-Sophie; Vorilhon, Solène; Pons, Hanae; Chabrot, Cécile; Grèze, Victoria; Pouly, Jean-Luc; Brugnon, Florence

    2018-01-01

    Since the improvement of cancer diagnosis and treatment, survival rates of these patients increase. Gonadal damages are frequent consequences of cancer treatments with different evidence of impaired fertility. In this context, fertility preservation should be proposed to patients exposed to potentially gonadotoxic treatments. Different preservation approaches may be proposed depending on patient age, sex, cancer type and type of treatment. The indications of fertility preservation depend on sexual maturity. In young girls, ovarian cortex cryopreservation is the only technique feasible in order to preserve their reproductive potential. Vitrification of oocytes which needs ovarian stimulation or oocytes in vitro maturation is becoming more commonly performed for pubertal women to preserve their fertility. Ovarian cortex freezing could be offered to emergency fertility preservation of adult female cancer patients. In prepubertal boys, testicular tissue cryopreservation is the only line treatment for fertility preservation. For future use, various approaches are being evaluated such as spermatogonial stem cell injection or in vitro maturation. Cryopreservation of spermatozoa is, today, an established and successful technique for male adults. When there are no spermatozoa in ejaculate, sperm can be retrieved after treatment of testicular biopsy. The French bioethics law clearly indicates that fertility preservation should be proposed to patients exposed to potentially gonadotoxic treatment. Today, many approaches are possible. Fertility preservation indications are based on multidisciplinary consultations within platforms for the fertility preservation in order to optimize the patient care. Copyright © 2017 Société Française du Cancer. Published by Elsevier Masson SAS. All rights reserved.

  3. Preserving Digital Materials

    CERN Document Server

    Harvey, Ross

    2011-01-01

    This book provides a single-volume introduction to the principles, strategies and practices currently applied by librarians and recordkeeping professionals to the critical issue of preservation of digital information. It incorporates practice from both the recordkeeping and the library communities, taking stock of current knowledge about digital preservation and describing recent and current research, to provide a framework for reflecting on the issues that digital preservation raises in professional practice.

  4. Environmental education on wood preservatives and preservative ...

    African Journals Online (AJOL)

    The development and use of wood preservatives in Nigeria should address not only the cost and demand functions but also the potential hazards in environmental equations. Forest products specialists are often asked about the perceived risks and environmental costs of treated wood products. Evidently, the civil society is ...

  5. Grafts for Ridge Preservation.

    Science.gov (United States)

    Jamjoom, Amal; Cohen, Robert E

    2015-08-07

    Alveolar ridge bone resorption is a biologic phenomenon that occurs following tooth extraction and cannot be prevented. This paper reviews the vertical and horizontal ridge dimensional changes that are associated with tooth extraction. It also provides an overview of the advantages of ridge preservation as well as grafting materials. A Medline search among English language papers was performed in March 2015 using alveolar ridge preservation, ridge augmentation, and various graft types as search terms. Additional papers were considered following the preliminary review of the initial search that were relevant to alveolar ridge preservation. The literature suggests that ridge preservation methods and augmentation techniques are available to minimize and restore available bone. Numerous grafting materials, such as autografts, allografts, xenografts, and alloplasts, currently are used for ridge preservation. Other materials, such as growth factors, also can be used to enhance biologic outcome.

  6. Grafts for Ridge Preservation

    Directory of Open Access Journals (Sweden)

    Amal Jamjoom

    2015-08-01

    Full Text Available Alveolar ridge bone resorption is a biologic phenomenon that occurs following tooth extraction and cannot be prevented. This paper reviews the vertical and horizontal ridge dimensional changes that are associated with tooth extraction. It also provides an overview of the advantages of ridge preservation as well as grafting materials. A Medline search among English language papers was performed in March 2015 using alveolar ridge preservation, ridge augmentation, and various graft types as search terms. Additional papers were considered following the preliminary review of the initial search that were relevant to alveolar ridge preservation. The literature suggests that ridge preservation methods and augmentation techniques are available to minimize and restore available bone. Numerous grafting materials, such as autografts, allografts, xenografts, and alloplasts, currently are used for ridge preservation. Other materials, such as growth factors, also can be used to enhance biologic outcome.

  7. Self-preserving cosmetics.

    Science.gov (United States)

    Varvaresou, A; Papageorgiou, S; Tsirivas, E; Protopapa, E; Kintziou, H; Kefala, V; Demetzos, C

    2009-06-01

    Preservatives are added to products for two reasons: first, to prevent microbial spoilage and therefore to prolong the shelf life of the product; second, to protect the consumer from a potential infection. Although chemical preservatives prevent microbial growth, their safety is questioned by a growing segment of consumers. Therefore, there is a considerable interest in the development of preservative-free or self-preserving cosmetics. In these formulations traditional/chemical preservatives have been replaced by other cosmetic ingredients with antimicrobial properties that are not legislated as preservatives according to the Annex VI of the Commission Directive 76/768/EEC and the amending directives (2003/15/EC, 2007/17/EC and 2007/22/EC). 'Hurdle Technology', a technology that has been used for the control of product safety in the food industry since 1970s, has also been applied for the production of self-preserving cosmetics. 'Hurdle Technology' is a term used to describe the intelligent combination of different preservation factors or hurdles to deteriorate the growth of microorganisms. Adherence to current good manufacturing practice, appropriate packaging, careful choice of the form of the emulsion, low water activity and low or high pH values are significant variables for the control of microbial growth in cosmetic formulations. This paper describes the application of the basic principles of 'Hurdle Technology' in the production of self-preserving cosmetics. Multifunctional antimicrobial ingredients and plant-derived essential oils and extracts that are used as alternative or natural preservatives and are not listed in Annex VI of the Cosmetic Directive are also reported.

  8. Analysis Preservation in ATLAS

    CERN Document Server

    Cranmer, Kyle; The ATLAS collaboration; Jones, Roger; South, David

    2015-01-01

    Long before data taking ATLAS established a policy that all analyses need to be preserved. In the initial data-taking period, this has been achieved by various tools and techniques. ATLAS is now reviewing the analysis preservation with the aim to bring coherence and robustness to the process and with a clearer view of the level of reproducibility that is reasonably achievable. The secondary aim is to reduce the load on the analysts. Once complete, this will serve for our internal preservation needs but also provide a basis for any subsequent sharing of analysis results with external parties.

  9. VT Historic Preservation Grant

    Data.gov (United States)

    Vermont Center for Geographic Information — The State-funded Historic Preservation Grant Program helps municipalities and non-profit organizations rehabilitate the historic buildings that are a vital part of...

  10. Secure Communication in Vehicular Networks - PRESERVE Demo

    NARCIS (Netherlands)

    Lagana, M.; Feiri, Michael; Sall, M.; Lange, M.; Tomatis, A.; Papadimitratos, P.

    2012-01-01

    Security and privacy are fundamental prerequisites for the deployment of vehicular communications. The near-deployment status of Safety Applications for Intelligent Transport Systems (ITS) calls for strong evidence on the applicability of proposed research solutions, notably close-to-reality

  11. Data Preservation at LEP

    CERN Document Server

    Holzner, André G; Igo-Kemenes, Peter; Maggi, Marcello; Malgeri, Luca; Mele, Salvatore; Pape, Luc; Plane, David; Schröder, Matthias; Schwickerath, Ulrich; Tenchini, Roberto; Timmermans, Jan

    2009-01-01

    The four LEP experiments ALEPH, DELPHI, L3 and OPAL successfully recorded e+e- collision data during the years 1989 to 2000. As part of the ordinary evolution in High Energy Physics, these experiments can not be repeated and their data is therefore unique. This article briefly reviews the data preservation efforts undertaken by the four experiments beyond the end of data taking. The current status of the preserved data and associated tools is summarised.

  12. Digital preservation for heritages

    CERN Document Server

    Lu, Dongming

    2011-01-01

    ""Digital Preservation for Heritages: Technologies and Applications"" provides a comprehensive and up-to-date coverage of digital technologies in the area of cultural heritage preservation, including digitalization, research aiding, conservation aiding, digital exhibition, and digital utilization. Processes, technical frameworks, key technologies, as well as typical systems and applications are discussed in the book. It is intended for researchers and students in the fields of computer science and technology, museology, and archaeology. Dr. Dongming Lu is a professor at College of Computer Sci

  13. Advances in lung preservation.

    Science.gov (United States)

    Machuca, Tiago N; Cypel, Marcelo; Keshavjee, Shaf

    2013-12-01

    After a brief review of conventional lung preservation, this article discusses the rationale behind ex vivo lung perfusion and how it has shifted the paradigm of organ preservation from conventional static cold ischemia to the utilization of functional normothermia, restoring the lung's own metabolism and its reparative processes. Technical aspects and previous clinical experience as well as opportunities to address specific donor organ injuries in a personalized medicine approach are also reviewed. Copyright © 2013 Elsevier Inc. All rights reserved.

  14. Historic Preservation Information CFM Website

    Data.gov (United States)

    Department of Veterans Affairs — The VA Historic Preservation Office keeps information about VA's programs to comply with Federal preservation requirements, and also interesting information about VA...

  15. Food Preservation beyond the Season.

    Science.gov (United States)

    Hanes, Phyllis

    1992-01-01

    Examines how current scientific knowledge of food preservation emerged from traditions handed down through the generations. Discusses various methods of preservation, their history, and current application. (LZ)

  16. Preservation of stability and synchronization in nonlinear systems

    Energy Technology Data Exchange (ETDEWEB)

    Fernandez-Anaya, G. [Departamento de Fisica y Matematicas, Universidad Iberoamericana, Prol. Paseo de la Reforma 880, Lomas de Santa Fe, Mexico, D.F. 01210 (Mexico)], E-mail: guillermo.fernandez@uia.mx; Flores-Godoy, J.J. [Departamento de Fisica y Matematicas, Universidad Iberoamericana, Prol. Paseo de la Reforma 880, Lomas de Santa Fe, Mexico, D.F. 01210 (Mexico)], E-mail: job.flores@uia.mx; Femat, R. [Division de Matematicas Aplicadas y Sistemas Computacionales, IPICyT, Camino a la Presa San Jose 2055, Col. Lomas 4a. seccion, San Luis Potosi, San Luis Potosi 78216 (Mexico)], E-mail: rfemat@ipicyt.edu.mx; Alvarez-Ramirez, J.J. [Ingenieria de Procesos e Hidraulica, Universidad Autonoma Metropolitana-Iztapalapa, Av. San Rafael Atlixco 186, Col. Vicentina, Mexico, D.F. 09340 (Mexico)], E-mail: jjar@xanum.uam.mx

    2007-11-12

    Preservation of stability in the presence of structural and/or parametric changes is an important issue in the study of dynamical systems. A specific case is the synchronization of chaos in complex networks where synchronization should be preserved in spite of changes in the network parameters and connectivity. In this work, a methodology to establish conditions for preservation of stability in a class of dynamical system is given in terms of Lyapunov methods. The idea is to construct a group of dynamical transformations under which stability is retained along certain manifolds. Some synchronization examples illustrate the results.

  17. Towards Smart Storage for Repository Preservation Services

    Directory of Open Access Journals (Sweden)

    Steve Hitchcock

    2010-07-01

    Full Text Available The move to digital is being accompanied by a huge rise in volumes of (born-digital content and data. As a result the curation lifecycle has to be redrawn. Processes such as selection and evaluation for preservation have to be driven by automation. Manual processes will not scale, and the traditional signifiers and selection criteria in older formats, such as print publication, are changing. The paper will examine at a conceptual and practical level how preservation intelligence can be built into software-based digital preservation tools and services on the Web and across the network ‘cloud’ to create ‘smart’ storage for long-term, continuous data monitoring and management. Some early examples will be presented, focussing on storage management and format risk assessment.

  18. Cancer and fertility preservation

    DEFF Research Database (Denmark)

    Lambertini, Matteo; Del Mastro, Lucia; Pescio, Maria C

    2016-01-01

    In the last years, thanks to the improvement in the prognosis of cancer patients, a growing attention has been given to the fertility issues. International guidelines on fertility preservation in cancer patients recommend that physicians discuss, as early as possible, with all patients...... of reproductive age their risk of infertility from the disease and/or treatment and their interest in having children after cancer, and help with informed fertility preservation decisions. As recommended by the American Society of Clinical Oncology and the European Society for Medical Oncology, sperm...... cryopreservation and embryo/oocyte cryopreservation are standard strategies for fertility preservations in male and female patients, respectively; other strategies (e.g. pharmacological protection of the gonads and gonadal tissue cryopreservation) are considered experimental techniques. However, since then, new...

  19. Endometriosis and Fertility Preservation.

    Science.gov (United States)

    Barnett, Rebecca; Banks, Nicole; Decherney, Alan H

    2017-09-01

    Endometriosis is common, affecting 5% to 10% of reproductive age women. Nearly half of women with surgical evidence of endometriosis fail to achieve spontaneous pregnancy. Surgical treatment of endometriosis can be detrimental to ovarian reserve. In the absence of surgical intervention, ovarian reserve may still be negatively impacted over time. Fertility preservation was developed for women requiring gonadotoxic treatments. Improved methods have led to greater consideration of offering these services to women with other disease processes that threaten ovarian reserve. This chapter will present the debate regarding use of fertility preservation in management of endometriosis, and outline the need for further studies.

  20. Mass preserving image registration

    DEFF Research Database (Denmark)

    Gorbunova, Vladlena; Sporring, Jon; Lo, Pechin Chien Pau

    2010-01-01

    The paper presents results the mass preserving image registration method in the Evaluation of Methods for Pulmonary Image Registration 2010 (EMPIRE10) Challenge. The mass preserving image registration algorithm was applied to the 20 image pairs. Registration was evaluated using four different...... scores: lung boundary alignment, major fissure lignment, landmark alignment and transform singularity scores. The registration algorithm achieved an average landmark alignment score of 2.20 } 2.05 mm and the median of 1.29 mm. In 19 out of 20 image pairs, the method produced invertible deformations....... Overall, the masspreserving image registration method was ranked 20th out of 34 participants...

  1. THE ROMANCE AND ENGINEERING OF FOOD PRESERVATION.

    Science.gov (United States)

    Woolrich, W R

    1944-02-11

    The engineering profession of the world can be expected to give more attention to the animal-plant food cycles in the years ahead and to determine new methods of preserving for complete utilization the critical and exhaustible supplies of plant foods for the generations yet to live. Coincidentally with this obligation which the engineer must assume, there is the romantic but very real task ahead of applying the same intensive interest in the ultimate preservation of foods as the agriculturists have displayed in producing them. The food preservation arts and sciences have now progressed forward far enough that the engineering profession can well assure the world that diets can henceforth be determined on the basis of what is good for man. With the coordination of our implements of electrical power, internal-combustion engine, propelled transportation, excellent network of road. ways and mechanical inventions, and with the competent support of the food technologists, the bacteriologists and the chemists, the engineering profession should be able to assure the multitudes that the world's ability to preserve is now prepared to equal the world's capacity to produce food. When complete coordination is effected, and production, preservation and distribution become daily realities, then the profession will have reached new heights in engineering, achievement, statesmanship and service.

  2. Constrained Graph Optimization: Interdiction and Preservation Problems

    Energy Technology Data Exchange (ETDEWEB)

    Schild, Aaron V [Los Alamos National Laboratory

    2012-07-30

    The maximum flow, shortest path, and maximum matching problems are a set of basic graph problems that are critical in theoretical computer science and applications. Constrained graph optimization, a variation of these basic graph problems involving modification of the underlying graph, is equally important but sometimes significantly harder. In particular, one can explore these optimization problems with additional cost constraints. In the preservation case, the optimizer has a budget to preserve vertices or edges of a graph, preventing them from being deleted. The optimizer wants to find the best set of preserved edges/vertices in which the cost constraints are satisfied and the basic graph problems are optimized. For example, in shortest path preservation, the optimizer wants to find a set of edges/vertices within which the shortest path between two predetermined points is smallest. In interdiction problems, one deletes vertices or edges from the graph with a particular cost in order to impede the basic graph problems as much as possible (for example, delete edges/vertices to maximize the shortest path between two predetermined vertices). Applications of preservation problems include optimal road maintenance, power grid maintenance, and job scheduling, while interdiction problems are related to drug trafficking prevention, network stability assessment, and counterterrorism. Computational hardness results are presented, along with heuristic methods for approximating solutions to the matching interdiction problem. Also, efficient algorithms are presented for special cases of graphs, including on planar graphs. The graphs in many of the listed applications are planar, so these algorithms have important practical implications.

  3. Perspectives in organ preservation

    NARCIS (Netherlands)

    Maathuis, Mark-Hugo J.; Leuvenink, Henri G. D.; Ploeg, Rutger J.

    2007-01-01

    Maintaining organ viability after donation until transplantation is critically important for optimal graft function and survival. To date, static cold storage is the most widely used form of preservation in every day clinical practice. Although simple and effective, it is questionable whether this

  4. Preserving Southwest Virginia's Folklore.

    Science.gov (United States)

    Burgin, Ramond

    1997-01-01

    Describes Southwest Virginia's rich tradition of folklore and culture and the need for its preservation. Summarizes the author's time-consuming process of preparing an inventory and indexing the vast archival collections gathered by students in American Folklore classes at Mountain Empire Community College and by the Southwest Virginia Folklore…

  5. Preservation in New Buildings

    Directory of Open Access Journals (Sweden)

    Christopher Kitching

    2000-06-01

    Full Text Available In the United Kingdom (as in many other countries increasing attention is being paid to the importance of each library and archive having a written preservation strategy endorsed by its governing body. So increasingly we are asking: where does „preservation“ begin and what are its top priorities? Some would say preservation begins with the definition of collecting policies to ensure that only relevant items are acquired in the first place, and therefore that no unnecessary costs are incurred on the long-term care of unwanted and unconsulted items. Others might argue that the first priority must be the careful appraisal of existing holdings to determine their preservation and conservation requirements and to prioritise their treatment. Or should preservation begin with damage-limitation: restricting the physical handling of books and documents, on the one hand by providing whenever possible surrogate copies in digital formats or microform, and on the other hand by offering at least basic protection through appropriate boxing and packaging? This, surely, goes hand-in-hand with the education of staff and readers about the importance of treating rare or unique materials with proper respect.

  6. NIGERIAN CULTURAL HERITAGE: PRESERVATION ...

    African Journals Online (AJOL)

    Dean SPGS NAU

    Ecological or natural heritages emanate from nature and environment. Ecological heritages can be defined as the relatively undisturbed or uncontaminated natural areas with its wild plants ... architecture/buildings, defensive walls and ditches, crafts, tools, .... influence of traditional rulers and their role in preserving Nigerian.

  7. On Distribution Preserving Quantization

    CERN Document Server

    Li, Minyue; Kleijn, W Bastiaan

    2011-01-01

    Upon compressing perceptually relevant signals, conventional quantization generally results in unnatural outcomes at low rates. We propose distribution preserving quantization (DPQ) to solve this problem. DPQ is a new quantization concept that confines the probability space of the reconstruction to be identical to that of the source. A distinctive feature of DPQ is that it facilitates a seamless transition between signal synthesis and quantization. A theoretical analysis of DPQ leads to a distribution preserving rate-distortion function (DP-RDF), which serves as a lower bound on the rate of any DPQ scheme, under a constraint on distortion. In general situations, the DP-RDF approaches the classic rate-distortion function for the same source and distortion measure, in the limit of an increasing rate. A practical DPQ scheme based on a multivariate transformation is also proposed. This scheme asymptotically achieves the DP-RDF for i.i.d. Gaussian sources and the mean squared error.

  8. Patch test with preservatives

    Directory of Open Access Journals (Sweden)

    Kar Sumit

    1992-01-01

    Full Text Available Of the 705 patients patch tested between March 88 to March 91, 317 were tested for sensitivity to preservatives with antigens obtained from Chemo technique AB, Sweden. Paraben was the commonest sensitizer (22.4% followed by Groton B K (8.1% and Triclosan (6.5%. We stress the need to consider these allergens as source of dermatitis and advocate complete labelling of topical preparations marketed.

  9. Enterocins in food preservation.

    Science.gov (United States)

    Khan, Haider; Flint, Steve; Yu, Pak-Lam

    2010-06-30

    The Enterococcus genus, a member of the Lactic Acid Bacteria (LAB) is found in various environments, but more particularly in the intestines of humans and other animals. Although sometimes associated with pathogenicity these bacteria have many benefits. They have been found in traditional artisanal fermented products, are used as probiotic cultures and nowadays extensively studied for the production of bacteriocins--the enterocins. Many of these enterocins have been found to be active against Listeria monocytogenes, and a few have also been reported to be active even against Gram negative bacteria, an unusual property for the bacteriocins produced by LAB. These properties have resulted in many studies describing the use of enterocins as preservatives in foods of animal and vegetable origin. This review covers the most recent information on the use of enterocins as food preservatives, either produced in-situ by the addition of enterocin producing strains or as external preservatives in the form of purified or semi-purified extracts, to prevent the growth of spoilage and pathogenic microorganisms. 2010 Elsevier B.V. All rights reserved.

  10. Memoir of fertility preservation.

    Science.gov (United States)

    Gosden, Roger G

    2013-01-01

    Fertility preservation has been practiced for at least 50 years using semen banking, pelvic surgery, and radiation shields, but in the past 20 years it has emerged as a rapidly growing subspecialty of reproductive medicine. A dramatic rise in survivorship of young cancer patients and the widespread postponement of family building to the later years of the female reproductive lifespan have been major driving forces. Throughout the history of fertility preservation, low temperature banking has played a pivotal role, first for gametes and later for embryos and immature germ cells, while ovarian transplantation recently began to contribute and spermatogonial stem cell transfer holds future promise for men and prepubertal boys. But there are significant risks with some diseases from reimplanting residual disease, which hopefully can be eliminated by new methods for purging the tissue and germ cell culture. Since all technologies are interim, cryopreservation as a mainstay in this field will likely be swept aside eventually by a stream of progress aimed at managing fertility preservation in vivo.

  11. Presentazione dell'Azione Europea Digital Preservation Europe

    OpenAIRE

    Cirinnà, Chiara

    2007-01-01

    The presentation deals about the matter of the digital preservation and raising the awareness about it. It presents a series of initiatives to create a cooperation and dissemination network for the digital preservation, and goes on suggesting important subjects such as the professional training, the coordination of the activities on the repositories with the help of DRAMBORA, a self-audit tool (Digital Repositories Audit Method Based on Risk Assessment), the integration between industry and r...

  12. ATLAS Data Preservation

    CERN Document Server

    Jones, Roger; The ATLAS collaboration

    2015-01-01

    Complementary to parallel open access and analysis preservation initiatives, ATLAS is taking steps to ensure that the data taken by the experiment during run-1 remain accessible and available for future analysis by the collaboration. An evaluation of what is required to achieve this is underway, examining the ATLAS data production chain to establish the effort required and potential problems. Several alternatives are explored, but the favoured solution is to bring the run 1 data and software in line with the equivalent to that which will be used for run 2. This will result in a coherent ATLAS dataset for the data already taken and that to come in the future.

  13. Preserving reptiles for research

    Science.gov (United States)

    Gotte, Steve W.; Jacobs, Jeremy F.; Zug, George R.; Dodd, C. Kenneth

    2016-01-01

    What are voucher specimens and why do we collect them? Voucher specimens are animals and/or their parts that are deposited in a research museum to document the occurrence of a taxon at a specific location in space and time (Pleijel et al., 2008; Reynolds and McDiarmid, 2012). For field biologists, vouchers are the repeatable element of a field study as they allow other biologists, now and in the future, to confirm the identity of species that were studied. The scientific importance of a voucher specimen or series of specimens is that other people are afforded the opportunity to examine the entire animal and confirm or correct identifications. A photographic record is somewhat useful for recording the occurrence of a species, but such records can be insufficient for reliable confirmation of specific identity. Even if a photo shows diagnostic characters of currently recognized taxa, it may not show characters that separate taxa that may be described in the future. Substantial cryptic biodiversity is being found in even relatively well-known herpetofaunas (Crawford et al., 2010), and specimens allow researchers to retroactively evaluate the true diversity in a study as understanding of taxonomy evolves. They enable biologists to study the systematic relationships of populations by quantifying variation in different traits. Specimens are also a source of biological data such as behaviour, ecology, epidemiology, and reproduction through examination of their anatomy, reproductive and digestive tracts, and parasites (Suarez and Tsutsui, 2004). Preserving reptiles as vouchers is not difficult, although doing it properly requires care, effort, and time. Poorly preserved vouchers can invalidate the results and conclusions of your study because of the inability to confirm the identity of your study animals. Good science requires repeatability of observations, and the absence of vouchers or poorly preserved ones prevents such confirmation. Due to space restrictions, we are

  14. Preservation of Built Environments

    DEFF Research Database (Denmark)

    Pilegaard, Marie Kirstine

    When built environments and recently also cultural environments are to be preserved, the historic and architectural values are identified as the key motivations. In Denmark the SAVE system is used as a tool to identify architectural values, but in recent years it has been criticized for having...... a too narrow aesthetic goal, especially when it comes to the evaluation of built environments as a whole. Architectural value has therefore been perceived as a different concept than aesthetic value, primarily related to a static and unchanging expression. This fact creates problems in relation...... to current conservation tasks, which today include more and more untraditionally built environments, including cultural environments. Architectural value must in this case rather be associated with development, ongoing processes, and allow room for future change. The Danish architect Johannes Exner, defines...

  15. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed with Cancer Fertility Preservation for Children Diagnosed ... for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed with Cancer Fertility Preservation for Children Diagnosed ...

  16. Contamination versus preservation of cosmetics

    DEFF Research Database (Denmark)

    Lundov, Michael Dyrgaard; Moesby, Lise; Zachariae, Claus

    2009-01-01

    Cosmetics with high water content are at a risk of being contaminated by micro-organisms that can alter the composition of the product or pose a health risk to the consumer. Pathogenic micro-organisms such as Staphylococcus aureus and Pseudomonas aeruginosa are frequently found in contaminated...... cosmetics. In order to avoid contamination of cosmetics, the manufacturers add preservatives to their products. In the EU and the USA, cosmetics are under legislation and all preservatives must be safety evaluated by committees. There are several different preservatives available but the cosmetic market...... is dominated by a few preservatives: parabens, formaldehyde, formaldehyde releasers, and methylchloroisothiazolinone/methylisothiazolinone. Allergy to preservatives is one of the main reasons for contact eczema caused by cosmetics. Concentration of the same preservative in similar products varies greatly...

  17. Management of digital preservation repositories

    Directory of Open Access Journals (Sweden)

    Miguel Ángel Márdero Arellano

    2016-09-01

    Full Text Available The object of this work are the international experiences of implementation of digital preservation practices in repositories. It based on bibliographical survey about the beginning of digital preservation practices in digital repositories, identifying important aspects of how to manage the practices of digital preservation on repositories. Most repositories analyzed showed a double function of access and preservation, but few could be considered to be "dark archives" used only for preservation matters. The application of digital preservation standards showed that large institutions possessed detailed definitions of what stored materials could be filed and used. Repositories managers had some kind of operating budget to carry on preservation activities. Most repositories cited in the bibliography used a combination of commercial tools and free software. As a conclusion, the records analyzed reinforce the need today of the application of digital preservation strategies using the OAIS Reference Model and official audit certification actions  on the design of digital preservation repositories, to keep the integration flexibility of  functions and services that go beyond the repository.

  18. Preserving Differential Privacy in Degree-Correlation based Graph Generation

    OpenAIRE

    Yue Wang; Xintao Wu

    2013-01-01

    Enabling accurate analysis of social network data while preserving differential privacy has been challenging since graph features such as cluster coefficient often have high sensitivity, which is different from traditional aggregate functions (e.g., count and sum) on tabular data. In this paper, we study the problem of enforcing edge differential privacy in graph generation. The idea is to enforce differential privacy on graph model parameters learned from the original network and then genera...

  19. Preserving Source Location Privacy for Energy Harvesting WSNs

    Science.gov (United States)

    Huang, Changqin; Ma, Ming; Liu, Yuxin; Liu, Anfeng

    2017-01-01

    Fog (From cOre to edGe) computing employs a huge number of wireless embedded devices to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating nature, wireless sensor nodes often work unattended, and hence are exposed to a variety of attacks. Preserving source-location privacy plays a key role in some wireless sensor network (WSN) applications. In this paper, a redundancy branch convergence-based preserved source location privacy scheme (RBCPSLP) is proposed for energy harvesting sensor networks, with the following advantages: numerous routing branches are created in non-hotspot areas with abundant energy, and those routing branches can merge into a few routing paths before they reach the hotspot areas. The generation time, the duration of routing, and the number of routing branches are then decided independently based on the amount of energy obtained, so as to maximize network energy utilization, greatly enhance privacy protection, and provide long network lifetimes. Theoretical analysis and experimental results show that the RBCPSLP scheme allows a several-fold improvement of the network energy utilization as well as the source location privacy preservation, while maximizing network lifetimes. PMID:28358341

  20. Preserving Source Location Privacy for Energy Harvesting WSNs.

    Science.gov (United States)

    Huang, Changqin; Ma, Ming; Liu, Yuxin; Liu, Anfeng

    2017-03-30

    Fog (From cOre to edGe) computing employs a huge number of wireless embedded devices to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating nature, wireless sensor nodes often work unattended, and hence are exposed to a variety of attacks. Preserving source-location privacy plays a key role in some wireless sensor network (WSN) applications. In this paper, a redundancy branch convergence-based preserved source location privacy scheme (RBCPSLP) is proposed for energy harvesting sensor networks, with the following advantages: numerous routing branches are created in non-hotspot areas with abundant energy, and those routing branches can merge into a few routing paths before they reach the hotspot areas. The generation time, the duration of routing, and the number of routing branches are then decided independently based on the amount of energy obtained, so as to maximize network energy utilization, greatly enhance privacy protection, and provide long network lifetimes. Theoretical analysis and experimental results show that the RBCPSLP scheme allows a several-fold improvement of the network energy utilization as well as the source location privacy preservation, while maximizing network lifetimes.

  1. Preservation of Scientific and Cultural Heritage in Balkan Countries

    Science.gov (United States)

    Tonta, Yasar

    2009-01-01

    Purpose: The peoples living in the Balkan Peninsula over centuries have created a very rich cultural heritage and the constant political upheavals in the region have affected the development and preservation of their cultures. This paper aims to review the internet infrastructure and networked readiness levels of the Balkan countries, which are…

  2. User Experience and Heritage Preservation

    Science.gov (United States)

    Orfield, Steven J.; Chapman, J. Wesley; Davis, Nathan

    2011-01-01

    In considering the heritage preservation of higher education campus buildings, much of the attention gravitates toward issues of selection, cost, accuracy, and value, but the model for most preservation projects does not have a clear method of achieving the best solutions for meeting these targets. Instead, it simply relies on the design team and…

  3. The Divine Library Function: Preservation.

    Science.gov (United States)

    Watson, Duane A.

    1986-01-01

    Discusses the importance of preservation as a priority for all librarians and explains the basics of controlling environmental factors, disaster planning, book repair, educating students, selection and preservation, ephemera, and library binding in the context of school libraries. Specific examples in the school library environment are included.…

  4. nestor Guideline for Preservation Planning – a Process Model

    Directory of Open Access Journals (Sweden)

    Sabine Schrimpf

    2014-02-01

    Full Text Available The nestor guideline for preservation planning is the latest in a series of nestor publications. nestor is the German competence network for digital preservation and it offers all interested parties from the private and public domains the possibility to participate in working groups. The guideline for preservation planning is the result of such a working group, which discussed the conceptual and practical issues of implementing the OAIS Functional Entity “Preservation Planning”.The guideline describes a process model and offers some guidance on potential implementations. It integrates and builds on recognized community concepts like Significant Properties, the OAIS Designated Community, the National Archives of Australia’s Performance Model, the PREMIS concept of Intellectual Entities and Representations, and the PLANET’s approach to preservation planning. Furthermore, it introduces the concepts “intended use” (Nutzungsziele, “information type” (Informationstyp and “preservation group” (Erhaltungsgruppe. The purpose of these new categories is that information objects shall be grouped by information type (e.g., audio, video, text… and intended use (e.g., reading for pleasure, search for specific information… to preservation groups for automatic processing. Significant properties can then be derived for whole preservation groups. The file format alone is considered as not completely sufficient for such categorisation. Some exemplary implementation solutions of the new concepts are presented in an annex.The guideline takes into account that resources for preservation planning and preservation actions are limited and has therefore adopted 4 premises: adequacy, financial viability, automation, and authenticity of archived objects. Its pragmatic approach becomes apparent in the definition and explanation of these dimensions. The guideline is written from the point of view of representatives of memory institutions, i

  5. Preserving Dignity in Later Life.

    Science.gov (United States)

    São José, José Manuel

    2016-09-01

    This article examines how elders who receive social care in the community experience loss of dignity and how they preserve their dignity. Qualitative research revealed that loss of dignity is a major concern for these elders and that they preserve their dignity differently, ranging from actively engaging with life to detaching themselves from life. We conclude that, in later life, preserving dignity while receiving social care differs from preserving dignity in the context of health care, especially health care provided in institutional settings. Furthermore, preserving dignity in later life, while receiving social care, is a complex process, depending not only on performing activities and individual action and responsibility, but also on other actions, some of them involving a certain inactivity/passivity, and interactions with others, especially caregivers. This article offers some insights to developing better policies and care practices for promoting dignity in the context of community-based social care.

  6. Hearing preservation after cochlear reimplantation.

    Science.gov (United States)

    Helbig, Silke; Rajan, Gunesh P; Stöver, Timo; Lockley, Morag; Kuthubutheen, Jafri; Green, Kevin M

    2013-01-01

    The combination of electrical and acoustical hearing (EAS) is the aim of successful hearing preservation in patients with low-frequency residual hearing who receive a cochlear implant. With adequate surgical treatment and electrode arrays designed for hearing preservation, partial hearing preservation can nowadays be achieved in the majority of patients. Over recent years, the number of patients with EAS has increased, and device failures within this group are a problem that will need to be addressed. It remains unclear how reliably hearing can be preserved during revision surgery. The outcome of 3 subjects requiring cochlear reimplantation after surgery for hearing preservation is presented and discussed. Our aim was to investigate the influence of electrode reinsertion on hearing preservation. Three patients with measurable residual hearing were implanted with a flexible, free-fitting electrode array in 3 different centers. Two subjects received a 31.5-mm array inserted 24 mm into the cochlea, whereas a third was treated with a 24-mm array, which was inserted 21 mm into the cochlea. In all cases, hearing was preserved at the initial operation. All of these subjects subsequently represented with device problems, and reimplantation was performed. Hearing preservation was measured using preoperative and postoperative pure tone audiograms. In addition, speech perception with the implant was evaluated before and after reimplantation surgery. Reimplantation was feasible in all subjects also in cases where a slightly deeper reinsertion was performed. Speech understanding scores after reimplantation were comparable to those seen after the first intervention. Revision surgery in patients with preserved hearing after cochlear implantation does not necessarily lead to loss of natural residual hearing, and patients can continue to benefit from the combination of electric and acoustic hearing. Even deeper insertion is possible without hearing loss within residual frequencies.

  7. Pavement Preservation for Elected Officials: The Inside Story of Pavement Deterioration

    OpenAIRE

    Olson, Jim

    2012-01-01

    This session is intended to provide elected officials and practitioners with an introduction to the concept of pavement preservation and its applicability within public agencies. Topics include definitions, budget planning, pavement life, road networks, alternative strategies, pavement distresses, guidelines and preservation treatments.

  8. MoDOT pavement preservation research program volume IV, pavement evaluation tools-data collection methods.

    Science.gov (United States)

    2015-10-01

    The overarching goal of the MoDOT Pavement Preservation Research Program, Task 3: Pavement Evaluation Tools Data : Collection Methods was to identify and evaluate methods to rapidly obtain network-level and project-level information relevant to :...

  9. Novel Fluid Preservation System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — To address NASA's need for a method to preserve blood and urine samples from astronauts collected during flight, Chromologic (CL) proposes to develop a novel Fluid...

  10. Novel Fluid Preservation System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — To address NASA's need for a method to preserve human biological samples, mostly blood and urine, from astronauts collected during flight under ambient conditions,...

  11. NONCONVEX REGULARIZATION FOR SHAPE PRESERVATION

    Energy Technology Data Exchange (ETDEWEB)

    CHARTRAND, RICK [Los Alamos National Laboratory

    2007-01-16

    The authors show that using a nonconvex penalty term to regularize image reconstruction can substantially improve the preservation of object shapes. The commonly-used total-variation regularization, {integral}|{del}u|, penalizes the length of the object edges. They show that {integral}|{del}u|{sup p}, 0 < p < 1, only penalizes edges of dimension at least 2-p, and thus finite-length edges not at all. We give numerical examples showing the resulting improvement in shape preservation.

  12. Blogs as Objects of Preservation

    DEFF Research Database (Denmark)

    Stepanyan, Karen; Gkotsis, George; Kalb, Hendrik

    2012-01-01

    challenge for the digital preservation community. While the methodological frameworks for selecting these properties provide a good foundation, a continued discussion is necessary for further clarifying and improving the available methods. This paper advances earlier work by building...... analysis) and, subsequently, improve the final reformulation of the properties. To demonstrate the applicability of the modified framework, the paper presents a use case of a blog preservation initiative that is informed by stakeholder interviews and evaluation of structural and technological foundations...

  13. Fertility Preservation for Children Diagnosed with Cancer

    Science.gov (United States)

    ... website. Skip to main content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers Open ... Diagnosed with Cancer You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation ...

  14. Hereditary History Preserving Bisimilarity Is Undecidable

    DEFF Research Database (Denmark)

    Jurdzinski, Marcin; Nielsen, Mogens

    2000-01-01

    History preserving bisimilarity (hp-bisimilarity) and hereditary history preserving bisimilarity (hhp-bisimilarity) are behavioural equivalences taking into account causal relationships between events of concurrent systems. Their prominent feature is being preserved under action refinement...

  15. System And Method For Monitoring Traffic While Preserving Personal Privacy

    KAUST Repository

    Canepa, Edward

    2015-08-06

    A traffic monitoring system and method for mapping traffic speed and density while preserving privacy. The system can include fixed stations that make up a network and mobile probes that are associated with vehicles. The system and method do not gather, store, or transmit any unique or identifying information, and thereby preserves the privacy of members of traffic. The system and method provide real-time traffic density and speed mapping. The system and method can further be integrated with a complementary flood monitoring system and method.

  16. Towards a Methodology for Software Preservation

    OpenAIRE

    Matthews, Brian; Shaon, Arif; Bicarregui, Juan; Jones, Catherine; Woodcock, Jim; Conway, Esther

    2009-01-01

    Only a small part of the research which has been carried out to date on the preservation of digital objects has looked specifically at the preservation of software. This is because the preservation of software has been seen as a less urgent problem than the preservation of other digital objects, and also the complexity of software artifacts makes the problem of preserving them a daunting one. Nevertheless, there are good reasons to want to preserve software. In this paper we consider some of ...

  17. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for Children Diagnosed with Cancer Ask Your Doctor Information for Patients Many adult ...

  18. Fertility preservation in Turner syndrome.

    Science.gov (United States)

    Grynberg, Michaël; Bidet, Maud; Benard, Julie; Poulain, Marine; Sonigo, Charlotte; Cédrin-Durnerin, Isabelle; Polak, Michel

    2016-01-01

    Premature ovarian insufficiency is a relatively rare condition that can appear early in life. In a non-negligible number of cases the ovarian dysfunction results from genetic diseases. Turner syndrome (TS), the most common sex chromosome abnormality in females, is associated with an inevitable premature exhaustion of the follicular stockpile. The possible or probable infertility is a major concern for TS patients and their parents, and physicians are often asked about possible options to preserve fertility. Unfortunately, there are no recommendations on fertility preservation in this group. The severely reduced follicle pool even during prepubertal life represents the major limit for fertility preservation and is the root of numerous questions regarding the competence of gametes or ovarian tissue crybanked. In addition, patients suffering from TS show higher than usual rates of spontaneous abortion, fetal anomaly, and maternal morbidity and mortality, which should be considered at the time of fertility preservation and before reutilization of the cryopreserved gametes. Apart from fulfillment of the desire of becoming genetic parents, TS patients may be potential candidates for egg donation, gestational surrogacy, and adoption. The present review discusses the different options for preserving female fertility in TS and the ethical questions raised by these approaches. Copyright © 2016 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  19. Preservation of a National Resource and Preservation of Self.

    Science.gov (United States)

    de Laricheliere, Joyce

    Bilingualism and the cultural and linguistic pluralism that it involves should be preserved and encouraged within the national educational system. Statistics concerning bilinguals on a national scale would present a more accurate picture if based on John Macnamara's definition of bilinguals as "persons who possess at least one of the language…

  20. Polarization-preserving holey fibers

    DEFF Research Database (Denmark)

    Broeng, Jes; Mogilevtsev, Dmitri; Libori, Stig E. Barkou

    2001-01-01

    In this work we suggest and discuss a microstructure of air capillaries with elliptical cross-section in a tread of glass that gives opportunity for Creation of polarization-preserving fiber with very small beat length between the fundamental modes of different polarization......In this work we suggest and discuss a microstructure of air capillaries with elliptical cross-section in a tread of glass that gives opportunity for Creation of polarization-preserving fiber with very small beat length between the fundamental modes of different polarization...

  1. Active preservation - otherwise no archives

    Energy Technology Data Exchange (ETDEWEB)

    Norberg, E. [National Swedish Archives, Stockholm (Sweden)

    1996-12-01

    The role and history of national and regional archives in Sweden is discussed. It is noted that large portions of our cultural heritage can not be set aside for long-term preservation due to several facts: Some events are never documented, Important records are never set aside, Important information is stored on media that are not suitable for long-term preservation, Information can not be accessed due to inadequate search aids, Eliminations are made due to lack of space. Strategies for an action plan to save valuable material are briefly outlined, and the importance of international cooperation is stressed.

  2. Privacy-Preserving Health Data Collection for Preschool Children

    Directory of Open Access Journals (Sweden)

    Shaopeng Guan

    2013-01-01

    Full Text Available With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children’s identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol.

  3. A Translation Layer to Convey Preservation Metadata

    OpenAIRE

    Di Iorio, Angela

    2009-01-01

    The long term preservation is a responsibility to share with other organizations, even adopting different preservation methods and tools. The overcoming of the interoperability issues, by means of the achievement of a flawless exchange of digital assets to preserve, enables the feasibility of applying distributed digital preservation policies. The Archives Ready To AIP Transmission a PREMIS Based Project (ARTAT-PBP) aims to experiment with the adoption of a common preservation metadata standa...

  4. Implementing Metadata that Guide Digital Preservation Services

    Directory of Open Access Journals (Sweden)

    Angela Dappert

    2011-03-01

    Full Text Available Effective digital preservation depends on a set of preservation services that work together to ensure that digital objects can be preserved for the long-term. These services need digital preservation metadata, in particular, descriptions of the properties that digital objects may have and descriptions of the requirements that guide digital preservation services. This paper analyzes how these services interact and use these metadata and develops a data dictionary to support them.

  5. Scalable privacy-preserving big data aggregation mechanism

    OpenAIRE

    Dapeng Wu; Boran Yang; Ruyan Wang

    2016-01-01

    As the massive sensor data generated by large-scale Wireless Sensor Networks (WSNs) recently become an indispensable part of ‘Big Data’, the collection, storage, transmission and analysis of the big sensor data attract considerable attention from researchers. Targeting the privacy requirements of large-scale WSNs and focusing on the energy-efficient collection of big sensor data, a Scalable Privacy-preserving Big Data Aggregation (Sca-PBDA) method is proposed in this paper. Firstly, according...

  6. Differential Privacy Preserving in Big Data Analytics for Connected Health.

    Science.gov (United States)

    Lin, Chi; Song, Zihao; Song, Houbing; Zhou, Yanhong; Wang, Yi; Wu, Guowei

    2016-04-01

    In Body Area Networks (BANs), big data collected by wearable sensors usually contain sensitive information, which is compulsory to be appropriately protected. Previous methods neglected privacy protection issue, leading to privacy exposure. In this paper, a differential privacy protection scheme for big data in body sensor network is developed. Compared with previous methods, this scheme will provide privacy protection with higher availability and reliability. We introduce the concept of dynamic noise thresholds, which makes our scheme more suitable to process big data. Experimental results demonstrate that, even when the attacker has full background knowledge, the proposed scheme can still provide enough interference to big sensitive data so as to preserve the privacy.

  7. Yeasts preservation: alternatives for lyophilisation

    NARCIS (Netherlands)

    Nyanga, L.K.; Nout, M.J.R.; Smid, E.J.; Boekhout, T.; Zwietering, M.H.

    2012-01-01

    The aim of the study was to compare the effect of two low-cost, low technology traditional methods for drying starter cultures with standard lyophilisation. Lyophilised yeast cultures and yeast cultures preserved in dry rice cakes and dry plant fibre strands were examined for viable cell counts

  8. Scalable privacy-preserving big data aggregation mechanism

    Directory of Open Access Journals (Sweden)

    Dapeng Wu

    2016-08-01

    Full Text Available As the massive sensor data generated by large-scale Wireless Sensor Networks (WSNs recently become an indispensable part of ‘Big Data’, the collection, storage, transmission and analysis of the big sensor data attract considerable attention from researchers. Targeting the privacy requirements of large-scale WSNs and focusing on the energy-efficient collection of big sensor data, a Scalable Privacy-preserving Big Data Aggregation (Sca-PBDA method is proposed in this paper. Firstly, according to the pre-established gradient topology structure, sensor nodes in the network are divided into clusters. Secondly, sensor data is modified by each node according to the privacy-preserving configuration message received from the sink. Subsequently, intra- and inter-cluster data aggregation is employed during the big sensor data reporting phase to reduce energy consumption. Lastly, aggregated results are recovered by the sink to complete the privacy-preserving big data aggregation. Simulation results validate the efficacy and scalability of Sca-PBDA and show that the big sensor data generated by large-scale WSNs is efficiently aggregated to reduce network resource consumption and the sensor data privacy is effectively protected to meet the ever-growing application requirements.

  9. Hybrid Food Preservation Program Improves Food Preservation and Food Safety Knowledge

    Science.gov (United States)

    Francis, Sarah L.

    2014-01-01

    The growing trend in home food preservation raises concerns about whether the resulting food products will be safe to eat. The increased public demand for food preservation information led to the development of the comprehensive food preservation program, Preserve the Taste of Summer (PTTS). PTTS is a comprehensive hybrid food preservation program…

  10. Malha rodoviária e conflitos de conservação alha no cerrado: um estudo para a preservação de anfíbios - DOI: 10.4025/actascibiolsci.171 Road network and conservation conflicts in cerrado: a study for amphibian preservation- DOI: 10.4025/actascibiolsci.171

    Directory of Open Access Journals (Sweden)

    Guilherme Oliveira

    2007-11-01

    Full Text Available A criação de unidades de conservação tem sido uma importante ferramenta para minimizar a perda de biodiversidade. Entretanto, a alocação destas unidades deve ser otimizada de forma que possam preservar o maior número de espécies sob uma série de restrições sócio-econômicas, as quais incluem o efeito da malha rodoviária sobre a biodiversidade. Utilizando um conjunto de dados sobre a distribuição de 131 espécies de anfíbios Anuros no bioma Cerrado, distribuídos em 181 células (1º de latitude e 1º de longitude, um processo de otimização foi feito através do algoritmo “simulated annealing”, disponível no programa SITES 1.0. O presente estudo apresenta duas redes de unidades de conservação para o Cerrado, uma baseada no conceito de complementaridade e a outra na distribuição de rodovias. Elas indicam, respectivamente, as localidades mais importantes para a criação de unidades de conservação e os locais onde deve existir uma unidade de conservação para que todas as espécies de anuros com ocorrência neste Bioma sejam preservadas, levando em consideração a extensão rodoviária. Estes resultados sugerem a utilização de ambas as redes para que haja sinergismo entre projetos de conservação e desenvolvimento humano, medido através da malha viária.Building conservation units has been an important tool to minimize the loss of biodiversity. However, the allocation of these units need to be optimized to preserve the greatest number of species, under a series of socioeconomics restrictions that include the road network effect on biodiversity. An optimization process was made by using the “simulated annealing” algorithm, available on program SITES 1.0, to model a set of data on the distribution of 131 species of anuran amphibians occuring in Cerrado, distributed in 181 cells with 1º of spatial resolution. This study shows a couple of conservation units networks in Brazilian Cerrado, one of them based on the

  11. Low-level efficacy of cosmetic preservatives

    DEFF Research Database (Denmark)

    Lundov, M D; Johansen, J D; Zachariae, C

    2011-01-01

    Preservation using combinations of preservatives has several advantages. This study shows that the concentration of some of the most frequently used allergenic preservatives can be markedly lowered when they are combined with phenoxyethanol. The antimicrobial efficacy of cosmetic preservatives...... of the preservatives indicated additive effects against the microorganisms. No combination of preservatives showed any inhibitory action on each other. Challenge tests with different concentrations and combinations were performed in a cosmetic cream. Diazolidinyl urea and MCI/MI alone were ineffective against C....... albicans in a challenge test at concentrations up to 16 times higher than the observed MIC values. When combining phenoxyethanol with either one of the allergenic preservatives diazolidinyl urea, MCI/MI or MI, the cosmetic cream was adequately preserved at concentrations well below the preservatives' MIC values as well...

  12. Scarpa Fascia Preservation in Abdominoplasty: Does It Preserve the Lymphatics?

    Science.gov (United States)

    Tourani, Saam S; Taylor, G Ian; Ashton, Mark W

    2015-08-01

    The course of the cutaneous lymphatic collectors of the abdominal wall in relation to the Scarpa fascia is unclear in the literature. Preserving the Scarpa fascia in the lower abdomen to reduce the seroma rate following abdominoplasty has been suggested based on the assumption that the lower abdominal lymphatics run deep to this layer along their entire course. Using the previously described technique, the superficial lymphatic drainage of eight hemiabdomen specimens from four fresh human cadavers was investigated. The upper and lower abdominal collectors originated at the umbilical and midline watershed areas in a subdermal plane by the union of precollectors draining the dermis. In the lower abdomen, the depth of the collectors gradually increased in the subcutaneous fat as they coursed toward the groin. They eventually pierced the Scarpa fascia before draining into the superficial inguinal nodes located deep to this layer. The transition from the supra- to the infra-Scarpa fascia plane occurred within 2 to 3 cm of the inguinal ligament in 95 percent of the collectors. In the four cadavers studied, preserving the Scarpa fascia during abdominoplasty would not preserve the lower abdominal collectors.

  13. Remembering preservation in hippocampal amnesia

    Science.gov (United States)

    Clark, Ian A.; Maguire, Eleanor A.

    2017-01-01

    The lesion-deficit model dominates neuropsychology. This is unsurprising given powerful demonstrations that focal brain lesions can affect specific aspects of cognition. Nowhere is this more evident than in patients with bilateral hippocampal damage. In the last sixty years the amnesia and other impairments exhibited by these patients have helped to delineate the functions of the hippocampus and shape the field of memory. We do not question the value of this approach. However, less prominent are the cognitive processes that remain intact following hippocampal lesions. Here, we collate the piecemeal reports of preservation of function following focal bilateral hippocampal damage, highlighting a wealth of information often veiled by the field’s focus on deficits. We consider how a systematic understanding of what is preserved as well as what is lost could add an important layer of precision to models of memory and the hippocampus. PMID:26361051

  14. Preserved entropy and fragile magnetism.

    Science.gov (United States)

    Canfield, Paul C; Bud'ko, Sergey L

    2016-08-01

    A large swath of quantum critical and strongly correlated electron systems can be associated with the phenomena of preserved entropy and fragile magnetism. In this overview we present our thoughts and plans for the discovery and development of lanthanide and transition metal based, strongly correlated systems that are revealed by suppressed, fragile magnetism, quantum criticality, or grow out of preserved entropy. We will present and discuss current examples such as YbBiPt, YbAgGe, YbFe2Zn20, PrAg2In, BaFe2As2, CaFe2As2, LaCrSb3 and LaCrGe3 as part of our motivation and to provide illustrative examples.

  15. INCORRECT PRESERVATION OF AMPUTATED DIGITS

    Directory of Open Access Journals (Sweden)

    Uroš Ahčan

    2004-09-01

    Full Text Available Background. A decision to replant is critically dependent on the condition of the amputated digit and the way it was preserved during transport. The most common error is exposing the amputated digit to very low temperatures. Preservation directly on ice, on cooling devices in portable refrigerators, or on top of packets of frozen meat often result in a frozen and therefore unusable body digit.Methods. An inquiry questionnaire on correct methods of preservation of amputated digits was conducted on a sample of 30 lay persons, 30 medical students, and 15 physicians.Three simulations of most frequently used methods of preservation of amputated digit were conducted (the correct method; directly on ice; on cooling devices of portable refrigerators. Environment temperature of the (simulated amputated digits stored was measured.In a retrospective study, hospital records of patients treated at the Clinical department of plastic surgery and burns in Ljubljana between 1998 and 2002 were examined. We determined the number of replantations performed, gender of the patients, their age, the mechanism of the injury, the success rate of the replantation, and the duration of hospitalisation. In five case described in detail, we present an inadequate treatment of the amputated digits.Results. The results of the questionnaire survey show that no less than 86.7% of lay person respondents would have treated the injuries in an incorrect way; same holds for 43.4% students of medicine, and 33.3% of practicing physicians.The temperature of the simulated amputated digit remained above 5°C throughout the simulated correct treatment. When preserved directly on ice on or coolant bodies, the temperature dropped below the freezing point and never climbed above 0°C throughout the duration of the simulation (150 minutes.Between years 1998 and 2002, Clinical department of plastic surgery and burns at the University clinical centre Ljubljana admitted 124 injured persons with

  16. Technical Information/Website Preservation

    Science.gov (United States)

    PintoRey, Christian R.

    2010-01-01

    This document reviews the work of the author in NASA's Motivating Undergraduates in Science and Technology (MUST) internship. The intern worked on the Space Shuttles hydraulic systems (i.e., Auxiliary Power Units (APU's) and Hydraulic Pump Units (HPU's)), and website preservation of the hydraulic technology captured in websites relating to the coming.the Space Shuttle Retirement. Several figures and pictures show an overview of the orbiter's hydraulic systems

  17. Food Preservation by Irradiation (Rev.)

    Energy Technology Data Exchange (ETDEWEB)

    Urrows, Grace M.

    1968-01-01

    Up to 30% of food harvests are lost in some parts of the world because of animal pests and microorganisms. Nuclear techniques can help reduce and extend the shelf life of these foods. Around 55 countries now have food irradiation programs. The use of radiation is the most recent step in man's attempts to preserve some of his harvest for the lean part of the year.

  18. Fertility Preservation in Gynecological Cancers

    OpenAIRE

    Shakuntala Chhabra; Imran Kutchi

    2013-01-01

    For cancers of reproductive system in women, fertility preservation is complex. Fertility is also affected by therapies, however prevention is possible. Radiotherapy affects gonads, uterus, and subsequent pregnancy outcomes in all ages. However, degree and damage depend on dose, irradiation field, and age at the time of exposure. Ovarian transposition is considered if ovarian involvement is unlikely. Gonadotoxic effects of chemotherapy are related to agent’s type, cumulative doses, age, and o...

  19. PREDON Scientific Data Preservation 2014

    Science.gov (United States)

    Diaconu, C.; Kraml, S.; Surace, C.; Chateigner, D.; Libourel, T.; Laurent, A.; Lin, Y.; Schaming, M.; Benbernou, S.; Lebbah, M.; Boucon, D.; Cérin, C.; Azzag, H.; Mouron, P.; Nief, J.-Y.; Coutin, S.; Beckmann, V.

    Scientific data collected with modern sensors or dedicated detectors exceed very often the perimeter of the initial scientific design. These data are obtained more and more frequently with large material and human efforts. A large class of scientific experiments are in fact unique because of their large scale, with very small chances to be repeated and to superseded by new experiments in the same domain: for instance high energy physics and astrophysics experiments involve multi-annual developments and a simple duplication of efforts in order to reproduce old data is simply not affordable. Other scientific experiments are in fact unique by nature: earth science, medical sciences etc. since the collected data is "time-stamped" and thereby non-reproducible by new experiments or observations. In addition, scientific data collection increased dramatically in the recent years, participating to the so-called "data deluge" and inviting for common reflection in the context of "big data" investigations. The new knowledge obtained using these data should be preserved long term such that the access and the re-use are made possible and lead to an enhancement of the initial investment. Data observatories, based on open access policies and coupled with multi-disciplinary techniques for indexing and mining may lead to truly new paradigms in science. It is therefore of outmost importance to pursue a coherent and vigorous approach to preserve the scientific data at long term. The preservation remains nevertheless a challenge due to the complexity of the data structure, the fragility of the custom-made software environments as well as the lack of rigorous approaches in workflows and algorithms. To address this challenge, the PREDON project has been initiated in France in 2012 within the MASTODONS program: a Big Data scientific challenge, initiated and supported by the Interdisciplinary Mission of the National Centre for Scientific Research (CNRS). PREDON is a study group formed by

  20. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... JP, Kolon TF. Fertility Preservation in Children and Adolescents With Cancer . Urology. 2016;91:190-6. Loren ... 10. Nieman CL, et al. Fertility preservation and adolescent cancer patients: lessons from adult survivors of childhood ...

  1. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... preservation and the ability to have a future family are important. Understanding there may be fertility preservation ... Northwestern University © 2015 Northwestern University Contact Northwestern University Careers Disclaimer Campus Emergency Information University Policies Oncofertility Consortium ...

  2. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... preservation and the ability to have a future family are important. Understanding there may be fertility preservation options available and having your child see a reproductive specialist in a timely manner ...

  3. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... feel fertility preservation and the ability to have a future family are important. Understanding there may be ... preservation options available and having your child see a reproductive specialist in a timely manner can improve ...

  4. SYNERGISTIC WOOD PRESERVATIVES FOR REPLACEMENT OF CCA

    Science.gov (United States)

    The objective of this project was to evaluate the potential synergistic combinations of environmentally-safe biocides as wood preservatives. These wood preservatives could be potential replacements for the heavy-metal based CCA.Didecyldimethylammonium chloride [DDAC] was...

  5. Tailor made preservation strategies : Food Innovation Concepts

    NARCIS (Netherlands)

    Blankestijn, J.

    2013-01-01

    High quality, long shelf life, clean label, less salt: food must comply with many requirements. From genomics and mild preservation to a ‘Quick Scan’ for process hygiene, TNO helps manufacturers to develop a tailor made preservation strategy.

  6. Digital preservation technology for cultural heritage

    CERN Document Server

    Zhou, Mingquan; Wu, Zhongke

    2012-01-01

    ""Digital Preservation Technology for Cultural Heritage"" discusses the technology and processes in digital preservation of cultural heritage. It covers topics in five major areas: Digitization of cultural heritage; Digital management in the cultural heritage preservation; Restoration techniques for rigid solid relics; Restoration techniques for paintings; Digital museum. It also includes application examples for digital preservation of cultural heritage. The book is intended for researchers, advanced undergraduate and graduate students in Computer Graphics and Image Processing as well as Cu

  7. Autonomous Preservation Tools in Minimal Effort Ingest

    DEFF Research Database (Denmark)

    Jurik, Bolette Ammitzbøll; Blekinge, Asger Askov; Andersen, Thorbjørn Ravn

    2016-01-01

    This poster presents the concept of Autonomous Preservation Tools, as developed by the State and University Library, Denmark. The work expands the idea of Minimal Effort Ingest, where most preservation actions such as Quality Assurance and enrichment of the digital objects are performed after...... content is ingested for preservation, rather than before. We present our Newspaper Digitisation Project as a case-study of real-world implementations of Autonomous Preservation Tools....

  8. Preservation for Institutional Repositories: practical and invisible

    OpenAIRE

    Hitchcock, Steve; Brody, Tim; Hey, Jessie M.N.; Carr, Leslie

    2005-01-01

    With good prospects for growth in institutional repository (IR) contents, in the UK, due to the proposed RCUK policy on mandating deposit of papers on funded work, and internationally due to the Berlin 3 recommendation, it is timely to investigate preservation solutions for IRs. The paper takes a broad view of preservation issues for IRs - based on practice, experience and visions for the future - from the perspective of Preserv, a JISC-funded project. It considers preservation in the context...

  9. STUDY OF A SECURE AND PRIVACY-PRESERVING OPPORTUNISTIC COMPUTING FRAMEWORK FOR MOBILE-HEALTHCARE EMERGENCY

    OpenAIRE

    Pramod B. Deshmukh; Nilesh N. Wani; Laxmikant S. Malphedwar; Deepali A. Ghanwat

    2016-01-01

    With the pervasiveness of smart phones and the advance of wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving opportunistic computing framew...

  10. Orthogonality preserving infinite dimensional quadratic stochastic operators

    Energy Technology Data Exchange (ETDEWEB)

    Akın, Hasan [Department of Mathematics, Faculty of Education, Zirve University, Gaziantep, 27260 (Turkey); Mukhamedov, Farrukh [Department of Computational & Theoretical Sciences Faculty of Science, International Islamic University Malaysia P.O. Box, 141, 25710, Kuantan Pahang (Malaysia)

    2015-09-18

    In the present paper, we consider a notion of orthogonal preserving nonlinear operators. We introduce π-Volterra quadratic operators finite and infinite dimensional settings. It is proved that any orthogonal preserving quadratic operator on finite dimensional simplex is π-Volterra quadratic operator. In infinite dimensional setting, we describe all π-Volterra operators in terms orthogonal preserving operators.

  11. Preservation Copying Endangered Historic Negative Collections

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad

    2008-01-01

    This article discusses preservation copying of unstable B&W nitrate and acetate still photographic negatives. It focuses on evaluating two different strategies for preserving the copies from a point of view of quality and cost-effectiveness. The evaluated strategies are preservation of the master...

  12. Preservation of documentary heritage in Malawi

    African Journals Online (AJOL)

    USER

    Abstract. Through preservation, access, use and re-use of documentary heritage can be promised. The paper explored the preservation of documentary heritage in Malawi as there was there is lack of appreciation on the importance of preservation of documentary heritage by policy makers making it a least government ...

  13. 76 FR 74721 - Preserving the Open Internet

    Science.gov (United States)

    2011-12-01

    ... COMMISSION 47 CFR Parts 0 and 8 Preserving the Open Internet AGENCY: Federal Communications Commission... protections for broadband service to preserve and reinforce Internet freedom and openness. DATES: Oppositions... any rules of particular applicability. Subject: In the Matter of Preserving the Open Internet...

  14. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... website. Skip to main content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers Open ... Diagnosed with Cancer You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation ...

  15. Preservation Reformatting Strategies in Selected Sub- Saharan ...

    African Journals Online (AJOL)

    While archivists are aware of the preservation challenges they face in the management of records, their major dilemma lies in choosing an appropriate preservation method. A variety of ... These expensive digitisation projects are often impeded by scarce resources and scant research in digital preservation. Presently, digital ...

  16. Preservation management for libraries, archives and museums

    CERN Document Server

    Gorman, G E

    2006-01-01

    Memory institutions such as libraries, archives, galleries and museums all share pressing concerns about preserving heritage. This book charts the diversity of preservation management in the contemporary information landscape, and offers guidance on preservation methods for the sustainability of collections from a range of international experts.

  17. Achieve Location Privacy-Preserving Range Query in Vehicular Sensing.

    Science.gov (United States)

    Kong, Qinglei; Lu, Rongxing; Ma, Maode; Bao, Haiyong

    2017-08-08

    Modern vehicles are equipped with a plethora of on-board sensors and large on-board storage, which enables them to gather and store various local-relevant data. However, the wide application of vehicular sensing has its own challenges, among which location-privacy preservation and data query accuracy are two critical problems. In this paper, we propose a novel range query scheme, which helps the data requester to accurately retrieve the sensed data from the distributive on-board storage in vehicular ad hoc networks (VANETs) with location privacy preservation. The proposed scheme exploits structured scalars to denote the locations of data requesters and vehicles, and achieves the privacy-preserving location matching with the homomorphic Paillier cryptosystem technique. Detailed security analysis shows that the proposed range query scheme can successfully preserve the location privacy of the involved data requesters and vehicles, and protect the confidentiality of the sensed data. In addition, performance evaluations are conducted to show the efficiency of the proposed scheme, in terms of computation delay and communication overhead. Specifically, the computation delay and communication overhead are not dependent on the length of the scalar, and they are only proportional to the number of vehicles.

  18. Polarization preservation in the AGS

    Energy Technology Data Exchange (ETDEWEB)

    Ratner, L.G.

    1983-01-01

    The successful operation of a high energy polarized beam at the Argonne Zero Gradient Synchrotron (ZGS) with the concommitant development of depolarizing resonance correction techniques has led to the present project of commissioning such a beam at the Brookhaven Alternating Gradient Synchrotron (AGS). A description of the project was presented at the 1981 National Accelerator Conference. I would like to now present a more detailed description of how we plan to preserve the polarization during acceleration, and to present our game plan for tuning through some 50 resonances and reaching our goal of a 26 GeV polarized proton beam with greater than 60% polarization.

  19. A holistic approach to bit preservation

    DEFF Research Database (Denmark)

    Zierau, Eld

    2012-01-01

    Purpose: The purpose of this paper is to point out the importance of taking a holistic approach to bit preservation when setting out to find an optimal bit preservation solution for specific digital materials. In the last decade there has been an increasing awareness that bit preservation, which...... are taken into account. Design/methodology/approach: The paper describes the various findings from previous research which have led to the holistic approach to bit preservation. This paper also includes an introduction to digital preservation with a focus on the role of bit preservation, which sets...... of the shortcomings, the results can assist in analysis and evaluation of bit preservation strategies. Originality/value This paper is an extract of the findings presented in the doctoral thesis “A holistic approach to bit preservation”. The findings are relevant for any organisation that is required to do bit...

  20. Modelling the Costs of Preserving Digital Assets

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2012-01-01

    on experiences from a Danish project to develop a cost model. It was found that a generic cost model should account for the nature of the organisation and the assets to be preserved, and for all major preservation activities and cost drivers. In addition, it should describe accounting principles. It was proposed......Information is increasingly being produced in digital form, and some of it must be preserved for the longterm. Digital preservation includes a series of actively managed activities that require on-going funding. To obtain sufficient resources, there is a need for assessing the costs...... and the benefits accrued by preserving the assets. Cost data is also needed for optimizing activities and comparing the costs of different preservation alternatives. The purpose of this study is to analyse generic requirements for modelling the cost of preserving digital assets. The analysis was based...

  1. Preserving & Serving 150 years of KNMI data

    Science.gov (United States)

    van de Vegte, J.; Som de Cerff, W. J.

    2012-04-01

    The Royal Netherlands Meteorological Institute (KNMI) has over 150 years of knowledge and gathered information related to weather, Climate and Seismology. A huge part of this information is from numerical models, insitu sensor networks and remote sensing satellites. This digital collection is mostly internal only available and is a collection of non searchable , non standardized file formats, lacking documentation and has no references to scientific publications. With the Dutch funded KNMI Data Centre (KDC) project we aim to tackle al these issues. In the project a user driven development approach with SCRUM is chosen to get maximum user involvement in a relative short development timeframe. Building on open standards and proven opensource technology (which includes in-house developed software like ADAGUC WMS and Portal) should result in a solid first release in 2012-Q3. This presentation will focus on the aspects of developing the KDC relating to its technical challenges, the human factor and the development strategy to come to a future-proof centre that will preserve our data en make it usable for the community.

  2. [Musical memory preserved in an amnesic syndrome].

    Science.gov (United States)

    Sánchez, V; Serrano, C; Feldman, M; Tufró, G; Rugilo, C; Allegri, R F

    In amnesic syndromes, it's usually to see dissociation between episodic, semantic and procedural memory. However, a few reports have been found about musical memory's processing and the relation with classic memory systems. To describe the musical's abilities preserved in a patient with amnesic syndrome and discuss possible neuropsychological and neurobiological bases implicated. A 28-years-old woman presenting with amnesic syndrome is reported. Following a carbon monoxide encephalophaty and subsequent hypoxia she remained in coma for 10 days with evidence of bilateral temporal changes, mainly affecting basal ganglia areas. The patient showed anterograde amnesia and semantic memory impairment, with disproportionately spared musical abilities' performance, either music perception (discrimination and recognition of tonal melodies, musical sight-reading) or music production (song and instrumental performance) or musical memory. This case suggests that the music require elaborate bihemispheric processing and may implicate different forms of information processing. The neural network involved in musical memory can be different that the declarative memory systems (episodic and semantic).

  3. Preserving the Pyramid of STI Using Buckets

    Science.gov (United States)

    Nelson, Michael L.; Maly, Kurt

    2004-01-01

    The product of research projects is information. Through the life cycle of a project, information comes from many sources and takes many forms. Traditionally, this body of information is summarized in a formal publication, typically a journal article. While formal publications enjoy the benefits of peer review and technical editing, they are also often compromises in media format and length. As such, we consider a formal publication to represent an abstract to a larger body of work: a pyramid of scientific and technical information (STI). While this abstract may be sufficient for some applications, an in-depth use or analysis is likely to require the supporting layers from the pyramid. We have developed buckets to preserve this pyramid of STI. Buckets provide an archive- and protocol-independent container construct in which all related information objects can be logically grouped together, archived, and manipulated as a single object. Furthermore, buckets are active archival objects and can communicate with each other, people, or arbitrary network services. Buckets are an implementation of the Smart Object, Dumb Archive (SODA) DL model. In SODA, data objects are more important than the archives that hold them. Much of the functionality traditionally associated with archives is pushed down into the objects, such as enforcing terms and conditions, negotiating display, and content maintenance. In this paper, we discuss the motivation, design, and implication of bucket use in DLs with respect to grey literature.

  4. Preservation of forest wood chips

    Energy Technology Data Exchange (ETDEWEB)

    Kofman, P.D.; Thomsen, I.M.; Ohlsson, C.; Leer, E.; Ravn Schmidt, E.; Soerensen, M.; Knudsen, P.

    1999-01-01

    As part of the Danish Energy Research Programme on biomass utilisation for energy production (EFP), this project concerns problems connected to the handling and storing of wood chips. In this project, the possibility of preserving wood chips of the Norway Spruce (Picea Abies) is addressed, and the potential improvements by anaerobic storage are tested. Preservation of wood chips aims at reducing dry matter losses from extensive heating during storage and to reduce production of fungal spores. Fungal spores pose a health hazards to workers handling the chips. Further the producers of wood chips are interested in such a method since it would enable them to give a guarantee for the delivery of homogeneous wood chips also during the winter period. Three different types of wood chips were stored airtight and further one of these was stored in accordance with normal practise and use as reference. The results showed that airtight storage had a beneficial impact on the quality of the chips: no redistribution of moisture, low dry matter losses, unfavourable conditions for microbial activity of most fungi, and the promotion of yeasts instead of fungi with airborne spores. Likewise the firing tests showed that no combustion problems, and no increased risk to the environment or to the health of staff is caused by anaerobic storage of wood chips. In all, the tests of the anaerobic storage method of forest wood chips were a success and a large-scale test of the method will be carried out in 1999. (au)

  5. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang

    2011-01-01

    We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.

  6. Patient attitudes toward fertility preservation.

    Science.gov (United States)

    Schover, Leslie R

    2009-08-01

    The increased survival rates for pediatric cancer patients and for some malignancies that are common in young adults, such as testicular cancer and Hodgkin disease have led to an increased focus on preserving fertility. Research on the psychosocial aspects of cancer-related infertility is a recent development, but we know that both young men and women value parenthood after cancer. At least 75% of survivors who were childless at diagnosis would like future offspring. For those who do not become parents, long-term distress is common. Younger teens may have difficulty assessing whether parenthood will be important to them in the future, and informed consent protocols need to respect their desires rather than deferring too much to parents. We do not know whether parenting a non-biological child (adopted, conceived through third-party reproduction, or a stepchild) reduces distress as much as being able to have one's own genetic offspring. Survivors often have exaggerated concerns about their children's health risks, but still prefer to have biological children if possible. More research is needed on whether participating in fertility preservation reduces long-term distress about cancer-related fertility. Better evidence-based programs to educate families and reduce decisional conflict are needed. (c) 2009 Wiley-Liss, Inc.

  7. Comparison of Tissue Preservation using Formalin and Ethanol as Preservative Formula

    Directory of Open Access Journals (Sweden)

    See Woan Shian

    2016-09-01

    Full Text Available Background: Tissue preservation can be performed through embalming, by providing the chemical embalming fluid to the human remains. Formalin’s preservative formula is the foundation for modern methods of embalming. Unfortunately, this preservative formula has several disadvantages. While Ethanol’s preservative formula is a considerable agent to replace formalin’s preservative formula. The aim of this study was to compare the tissue preservation using formalin and ethanol as preservative formula. Methods: This study was carried out from September–October 2014 in the Laboratory of the Department of Anatomy, Faculty of Medicine, Universitas Padjadjaran. The study used the laboratory experimental method with consecutive sampling of 16 Wistar Rats. Thirty two soleus muscles and thirty two colons were collected and divided into two groups. Each group consisted of 16 soleus muscles and 16 colons. Group 1 was preserved with formalin’s preservative formula and Group 2 was preserved with ethanol’s preservative formula. The two groups were preserved for six weeks. The tissue’s color, consistency, odor and the growth of bacteria were determined before and after treatment. Results: Tissues preserved with ethanol’s preservative formula had better tissue preservation in the aspect of color and odor, compared with formalin’s preservative formula. Both preservative formulas showed no growth of bacteria in tissues but failed to retain the consistency. All the data were analyzed with Chi-square test. Conclusions: Ethanol’s preservative formula preserves better quality of tissue compared to formalin’s preservative formula.

  8. Preserving Differential Privacy in Degree-Correlation based Graph Generation.

    Science.gov (United States)

    Wang, Yue; Wu, Xintao

    2013-08-01

    Enabling accurate analysis of social network data while preserving differential privacy has been challenging since graph features such as cluster coefficient often have high sensitivity, which is different from traditional aggregate functions (e.g., count and sum) on tabular data. In this paper, we study the problem of enforcing edge differential privacy in graph generation. The idea is to enforce differential privacy on graph model parameters learned from the original network and then generate the graphs for releasing using the graph model with the private parameters. In particular, we develop a differential privacy preserving graph generator based on the dK-graph generation model. We first derive from the original graph various parameters (i.e., degree correlations) used in the dK-graph model, then enforce edge differential privacy on the learned parameters, and finally use the dK-graph model with the perturbed parameters to generate graphs. For the 2K-graph model, we enforce the edge differential privacy by calibrating noise based on the smooth sensitivity, rather than the global sensitivity. By doing this, we achieve the strict differential privacy guarantee with smaller magnitude noise. We conduct experiments on four real networks and compare the performance of our private dK-graph models with the stochastic Kronecker graph generation model in terms of utility and privacy tradeoff. Empirical evaluations show the developed private dK-graph generation models significantly outperform the approach based on the stochastic Kronecker generation model.

  9. Towards a Standard for Provenance and Context for Preservation of Data for Earth System Science

    Science.gov (United States)

    Ramaprian, Hampapuram K.; Moses, John F.

    2011-01-01

    Long-term data sets with data from many missions are needed to study trends and validate model results that are typical in Earth System Science research. Data and derived products originate from multiple missions (spaceborne, airborne and/or in situ) and from multiple organizations. During the missions as well as well past their termination, it is essential to preserve the data and products to support future studies. Key aspects of preservation are: preserving bits and ensuring data are uncorrupted, preserving understandability with appropriate documentation, and preserving reproducibility of science with appropriate documentation and other artifacts. Computer technology provides adequate standards to ensure that, with proper engineering, bits are preserved as hardware evolves. However, to ensure understandability and reproducibility, it is essential to plan ahead to preserve all the relevant data and information. There are currently no standards to identify the content that needs to be preserved, leading to non-uniformity in content and users not being sure of whether preserved content is comprehensive. Each project, program or agency can specify the items to be preserved as a part of its data management requirements. However, broader community consensus that cuts across organizational or national boundaries would be needed to ensure comprehensiveness, uniformity and long-term utility of archived data. The Federation of Earth Science Information Partners (ESIP), a diverse network of scientists, data stewards and technology developers, has a forum for ESIP members to collaborate on data preservation issues. During early 2011, members discussed the importance of developing a Provenance and Context Content Standard (PCCS) and developed an initial list of content items. This list is based on the outcome of a NASA and NOAA meeting held in 1998 under the auspices of the USGCRP, documentation requirements from NOAA and our experience with some of the NASA Earth science

  10. Managerial challenges within networks: emphasizing the paradox of network participation

    DEFF Research Database (Denmark)

    Jakobsen, Morten

    Flexibility and access to numerous resources are essential benefits associated with network participation. An important aspect of managing the network participation of a company is to maintain a dynamic portfolio of partners, and thereby keep up the strategic opportunities for development. However......, maintaining the dynamics within a network seems to be a complex challenge. There is a risk that the network ends up in The Paradox of Network Participation. The desired renewal and flexibility are not utilised because the involved parties preserve the existing networks structure consisting of the same...... companies, and hence, the paradox reduces the potential advantages of the network. The objective of this paper is to analyse the fundamental conditions for a company which depends on an efficient network, and based on this discuss how active use of information can reduce the relative importance of trust...

  11. Managerial Challenges Within Networks - Emphasizing the Paradox of Network Participation

    DEFF Research Database (Denmark)

    Jakobsen, Morten

    2003-01-01

    Flexibility and access to numerous resources are essential benefits associated with network participation. An important aspect of managing the network participation of a company is to maintain a dynamic portfolio of partners, and thereby keep up the strategic opportunities for development. However......, maintaining the dynamics within a network seems to be a complex challenge. There is a risk that the network ends up in The Paradox of Network Participation. The desired renewal and flexibility are not utilised because the involved parties preserve the existing networks structure consisting of the same...... companies, and hence, the paradox reduces the potential advantages of the network. The objective of this paper is to analyse the fundamental conditions for a company which depends on an efficient network, and based on this discuss how active use of information can reduce the relative importance of trust...

  12. Self-preserving personal care products.

    Science.gov (United States)

    Narayanan, M; Sekar, P; Pasupathi, M; Mukhopadhyay, T

    2017-06-01

    As questions on the safety of some popular preservatives are on the rise, there is a growing interest in developing 'self-preserving' personal care products. Use of multifunctional ingredients/actives with antimicrobial properties has been explored as replacements for conventional preservatives. This study explores the use of combinations of multifunctional actives (MFA) and other cosmetic ingredients in various personal care formulations, to deliver microbiologically safe self-preserving products. Products studied in this study include face wash, gel-based leave-on skin care product and face mask. Minimum inhibitory concentration (MIC) of several cosmetic ingredients was determined to identify multifunctional actives with antimicrobial activity. Personal care formulations made with multifunctional actives and other cosmetic ingredients were studied for preservative efficacy by challenging the product with six multiple cycles of microbial challenge. Formulations with combinations of multifunctional actives with antioxidant (AO) and chelators (CHL) were found to work synergistically and were highly efficacious in controlling multiple microbial challenges as observed in the preservative efficacy test (PET) studies. The effective combinations were able to withstand up to six multiple microbial challenges without product degradation. The preservative efficacy profile was similar to control formula containing preservatives. Self-preserving personal care/cosmetic products can be developed which are as efficacious as preserved products by a prudent selection of multifunctional actives, antioxidants and chelators as a part of the formulation. © 2016 Society of Cosmetic Scientists and the Société Française de Cosmétologie.

  13. [The quality of preserved blood].

    Science.gov (United States)

    Radović, M; Durić, D; Milenković, L; Radojicić, C; Zunić, G; Todorović, P; Golubović, V; Dimitrijević, J; Taseski, J; Tomasević, R

    1979-01-01

    The examinations of 30 blood samples each preserved with three Yugoslav different ACD-solutions were performed. The blood samples were stored at 2-6 degrees C and examinations were performed at the day of blood donation and after on the 7th, 14th and 21st day during the storage. Differences in hematocrit (well known dilution effect of the ACD-solutions used) and intensive morphological and chemical changes were found in all blood samples regardless the type of ACD-solution used. It was shown that the permanently increasing number morphologically altered erythrocytes (echinocytes and spherocytes) and the excessive release of hemoglobin and potassium from erythrocytes were occurred during the storage of blood samles. Too, there were noticed significant decrease of pH values enormous accumulation of ammoniac and other metabolic producta.

  14. Correlation-Preserving Photo Collage.

    Science.gov (United States)

    Liu, Lingjie; Zhang, Hongjie; Jing, Guangmei; Guo, Yanwen; Chen, Zhonggui; Wang, Wenping

    2017-05-12

    A new method is presented for producing photo collages that preserve content correlation of photos. We use deep learning techniques to find correlation among given photos to facilitate their embedding on the canvas, and develop an efficient combinatorial optimization technique to make correlated photos stay close to each other. To make efficient use of canvas space, our method first extracts salient regions of photos and packs only these salient regions. We allow the salient regions to have arbitrary shapes, therefore yielding informative, yet more compact collages than by other similar collage methods based on salient regions. We present extensive experimental results, user study results, and comparisons against the state-of-the-art methods to show the superiority of our method.

  15. Saliva Preservative for Diagnostic Purposes

    Science.gov (United States)

    Pierson, Duane L.; Mehta, Satish K.

    2012-01-01

    Saliva is an important body fluid for diagnostic purposes. Glycoproteins, glucose, steroids, DNA, and other molecules of diagnostic value are found in saliva. It is easier to collect as compared to blood or urine. Unfortunately, saliva also contains large numbers of bacteria that can release enzymes, which can degrade proteins and nucleic acids. These degradative enzymes destroy or reduce saliva s diagnostic value. This innovation describes the formulation of a chemical preservative that prevents microbial growth and inactivates the degradative enzymes. This extends the time that saliva can be stored or transported without losing its diagnostic value. Multiple samples of saliva can be collected if needed without causing discomfort to the subject and it does not require any special facilities to handle after it is collected.

  16. Beyond the Scope of Preservation?

    DEFF Research Database (Denmark)

    Rikke, Stenbro,; Riesto, Svava

    2014-01-01

    Why are some parts of the built environment protected as national heritage and others not? Listing is the most restrictive tool of Norwegian and Danish preservation in the built environment and creates a specific version of the past told through buildings and sites. The heritage authorities in both...... countries present listing as an instrument to protect a representative sample of all the country’s built structures and environments (in theory for eternity). The article examines the role of mass housing complexes, a significant product of the welfare states from the 1950s and onwards, in the practice...... established in architectural history and other mechanisms effect contemporary decisions about whether to list mass housing areas. In conclusion, we question the role of the official criteria for listing and instead call for a more open discussion about why and how listing creates national history....

  17. SMART PACKAGING FOR FOOD PRESERVATION

    Directory of Open Access Journals (Sweden)

    Raquel Rodríguez-Sauceda

    2014-07-01

    Full Text Available One of the biggest challenges of the food industry is the preservation of its products, that is, to prevent them from being attacked by microorganisms that decompose them hauling economic losses and severe health damage to the consumer. Today, competition in the food industry is very high and any company that does not offer the quality products is doomed to fail. Consumers demand more and the industry still stands offering what is asked: quality, security and safety. The package, in addition to fulfilling its core functions is becoming a means of sophisticated interactions with content and a record of relevant information for both the end consumer and intermediate players in the value chain and concepts are born of active and intelligent packaging. A smart container is defined as a system that monitors the condition of the packaged product, being able to register and provide information about product quality or condition of the container, showing the possible "abnormal" practices that have suffered the product or the container during the entire supply chain, such as transportation or storage. These systems monitor the mechanisms of altered food due to physiological, chemical and biological processes that respond and communicate changes in the status of the product as time-temperature, Oxygen, Carbon dioxide, microbial growth, etc. There are different types of smart packaging such as time-temperature indicators, color indicators, indicators of pathogens and indicators of leaks, to name a few. Through literature review, arguments that demonstrate the usefulness and necessity of the use of smart packaging to preserve the quality and safety of the product it contains, from manufacturing to the time it is used by consumers were found, as these besides communicating or providing information about their state, acting as a marketing tool.

  18. Towards Building a Blog Preservation Platform

    CERN Document Server

    Kasioumis, Nikos; Kalb, Hendrik

    2014-01-01

    Social media content and user participation has increased dramatically since the advent of Web 2.0. Blogs have become relevant to every aspect of business and personal life. Nevertheless, we do not have the right tools to aggregate and preserve blog content correctly, as well as to manage blog archives effectively. Given the rising importance of blogs, it is crucial to build systems to facilitate blog preservation, safeguarding an essential part of our heritage that will prove valuable for current and future generations. In this paper, we present our work in progress towards building a novel blog preservation platform featuring robust digital preservation, management and dissemination facilities for blogs. This work is part of the BlogForever project which is aiming to make an impact to the theory and practice of blog preservation by creating guidelines and software that any individual or organization could use to preserve their blogs.

  19. LANTIBIOTIC NISIN: NATURAL PRESERVATIVE FROM LACTOCOCCUS LACTIS

    OpenAIRE

    Suganthi.V; E. Selvarajan; C.Subathradevi; V. Mohanasrinivasan

    2012-01-01

    The increasing demand for high quality safe foods that are not extensively processed has created a niche for natural food preservative. Studies confirm that food allergies due to chemical preservatives affect as much as 2.5% of the population. Recent research had suggested bacteriocins (Nisin) are the ideal biological food preservative. Nisin was proteinaceous antibacterial substances produced by Lactococcus lactis, a homofermentative bacterium. Naturally nisin occurs in two different forms n...

  20. Survey of colourings and preservatives in drugs.

    OpenAIRE

    Pollock, I; Young, E.; Stoneham, M.; Slater, N; Wilkinson, J. D.; Warner, J O

    1989-01-01

    OBJECTIVE--To assess the prevalence of colourings and preservatives in drug formulations in the United Kingdom. DESIGN--Postal survey. PARTICIPANTS--All pharmaceutical manufacturers in the United Kingdom were requested to supply data on drug formulations with particular regard to the content of colourings and preservatives. MAIN OUTCOME MEASURE--Prevalence in proprietary drugs of colourings or preservatives, or both, that have been implicated in adverse reactions. Computation of a list of for...

  1. Preserving Privacy in Social Tagging

    OpenAIRE

    Pradnya M. Deshmane; Prof. N.R.Wankhade

    2015-01-01

    Our system works on the collaborative tagging technique which is very famous in online system or social networking system. This system works on the bottle neck area of some previous tagging method. Our system contains the module that extends the tagging functionality capacity and features. Our system is having one policy layer that analyzes the collaborative tagging before it is into action. Our system required this layer to consider user preferences, deliberately defi...

  2. POPE: Partial Order Preserving Encoding

    Science.gov (United States)

    2016-09-09

    database. A different trade -off between client storage and communication is given by Kerschbaum and Schröpfer [30] achieving just O(1) communication...complete just one test run of this experiment using mOPE and actual network communication with our Python implementa- tion. We were able to run... Python implementation without parallelization, we achieved over 55,000 operations per second with POPE vs. less than 2,000 operations per second for mOPE

  3. Cosmetic preservative labelling on the Thai market.

    Science.gov (United States)

    Bunyavaree, Monthathip; Kasemsarn, Pranee; Boonchai, Waranya

    2016-04-01

    Preservatives are added to cosmetics and other consumer products to prevent microbial growth and product degradation. Many cosmetic preservatives are skin sensitizers and frequent causes of contact dermatitis. The use of preservatives may vary by country and/or region, according to legislation, and may be reflected in differences in the prevalence rates of preservative allergy worldwide. To examine the type and frequency of preservative use in cosmetics sold in Thai markets in metropolitan Bangkok, Thailand. Preservatives contained in 1000 different cosmetics sold in Thai markets were documented and analysed, based on the labelling of ingredients. Most of the cosmetic and skincare products sold in Thai markets were international brands, with only a small proportion of cosmetic products being produced in Thailand. International brand cosmetics were more likely to contain non-formaldehyde-releasing preservatives than domestically produced brands. Isothiazolinone-based preservatives, which are responsible for the current increase in the prevalence of contact allergy, were found at a significant frequency in domestically produced, leave-on cosmetic products. Preservatives in cosmetics were significantly different according to source of production and type of cosmetics. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  4. Endothelial cell preservation at hypothermic to normothermic conditions using clinical and experimental organ preservation solutions

    NARCIS (Netherlands)

    Post, Ivo C. J. H.; de Boon, Wadim M. I.; Heger, Michal; van Wijk, Albert C. W. A.; Kroon, Jeffrey; van Buul, Jaap D.; van Gulik, Thomas M.

    2013-01-01

    Endothelial barrier function is pivotal for the outcome of organ transplantation. Since hypothermic preservation (gold standard) is associated with cold-induced endothelial damage, endothelial barrier function may benefit from organ preservation at warmer temperatures. We therefore assessed

  5. Co-ordinating economic, behavioural and spatial aspects of wildlife preservation in agriculture

    NARCIS (Netherlands)

    Wossink, G.A.A.; Wenum, van J.H.; Jurgens, C.R.; Snoo, de G.R.

    1999-01-01

    This paper addresses the supply side of wildlife preservation and restoration in agriculture at the regional level. First, we show how network design modelling can be used for economic optimal spatial selection of unsprayed field margins creating a wildlife corridor in the landscape. Second, we

  6. Efficient privacy preserving K-means clustering in a three-party setting

    NARCIS (Netherlands)

    Beye, Michael; Erkin, Zekeriya; Erkin, Zekeriya; Lagendijk, Reginald L.

    2011-01-01

    User clustering is a common operation in online social networks, for example to recommend new friends. In previous work [5], Erkin et al. proposed a privacy-preserving K-means clustering algorithm for the semi-honest model, using homomorphic encryption and multi-party computation. This paper makes

  7. 7 CFR 782.14 - Identity preservation.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Identity preservation. 782.14 Section 782.14 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF... § 782.14 Identity preservation. (a) The importer and all subsequent buyers of the imported wheat shall...

  8. Unique preservative tolerance in Tyromyces palustris

    Science.gov (United States)

    Frederick Green; Rachel A. Arango; Carol A. Clausen

    2005-01-01

    Fungal tolerance to wood preservatives has been critically important for many years. The tolerance of type cultures to common wood preservatives is, in fact, noted in the AWPA Standards [1]. Gloeophyllum trabeum Mad-617, for example, is particularly tolerant to phenolic and arsenic compounds. One important group of decay fungi that has been studied extensively are...

  9. Corrosion avoidance with new wood preservatives

    Science.gov (United States)

    Samuel L. Zelinka; Douglas R. Rammer

    2006-01-01

    The increased use of alkaline copper quaternary (ACQ) and copper azole (CuAz) as wood preservatives for residential construction has led to concerns about the corrosion performance of fasteners. Information on the effects of these preservatives on the corrosion rate is limited, although Simpson Strong Tie has published a technical bulletin indicating that both ACQ and...

  10. Orthogonality preserving property, Wigner equation, and stability

    Directory of Open Access Journals (Sweden)

    Chmieliński Jacek

    2006-01-01

    Full Text Available We deal with the stability of the orthogonality preserving property in the class of mappings phase-equivalent to linear or conjugate-linear ones. We give a characterization of approximately orthogonality preserving mappings in this class and we show some connections between the considered stability and the stability of the Wigner equation.

  11. Concise Review: Fertility Preservation: An Update

    OpenAIRE

    González, Clara; Boada, Montserrat; Devesa, Marta; Veiga, Anna

    2012-01-01

    Fertility preservation is an emerging field in medicine that enables men, women, and children to maintain reproductive health when it is threatened by gonadotoxic treatment or nononcologic malignancies that can impair spermatogenesis and ovogenesis. Established methods include sperm cryopreservation or experimental testicular tissue cryopreservation for males, and oocyte cryopreservation or ovarian tissue cryopreservation for females. Fertility preservation treatments must be addressed throug...

  12. Emerging concepts in liver graft preservation.

    Science.gov (United States)

    Bejaoui, Mohamed; Pantazi, Eirini; Folch-Puy, Emma; Baptista, Pedro M; García-Gil, Agustín; Adam, René; Roselló-Catafau, Joan

    2015-01-14

    The urgent need to expand the donor pool in order to attend to the growing demand for liver transplantation has obliged physicians to consider the use of suboptimal liver grafts and also to redefine the preservation strategies. This review examines the different methods of liver graft preservation, focusing on the latest advances in both static cold storage and machine perfusion (MP). The new strategies for static cold storage are mainly designed to increase the fatty liver graft preservation via the supplementation of commercial organ preservation solutions with additives. In this paper we stress the importance of carrying out effective graft washout after static cold preservation, and present a detailed discussion of the future perspectives for dynamic graft preservation using MP at different temperatures (hypothermia at 4 °C, normothermia at 37 °C and subnormothermia at 20 °C-25 °C). Finally, we highlight some emerging applications of regenerative medicine in liver graft preservation. In conclusion, this review discusses the "state of the art" and future perspectives in static and dynamic liver graft preservation in order to improve graft viability.

  13. Corn, alfalfa and grass silage preservation principles

    Science.gov (United States)

    Ensiling is the primary means of preserving moist forages for feeding livestock. In ensiling, the crop is stored anaerobically, and sugars in the crop are fermented by lactic acid bacteria naturally on the crop. The crop is preserved by the combination of the acids produced by the lactic acid bacter...

  14. Anuran artifacts of preservation: 27 years later

    Directory of Open Access Journals (Sweden)

    Jessica L. Deichmann

    2009-07-01

    Full Text Available Measurements made on preserved anuran specimens are often used in studies of systematics, ecology and evolution. Here, we examine the effect of preservation on one of the most common measurement of frogs, snout-urostyle length (SUL. Preservation had significanteffects on the SUL of 13 of the 14 species of North American frogs included in this study, with all species decreasing in SUL by 0.31-5.62%. Smaller frog species did not shrink proportionally more or less than larger species. Absolute shrinkage was correlated with SUL and was greater in larger species. Within species, percent shrinkage was not significantly correlated with SUL in 10 species, but significantly greater for larger individuals in 3 species, and decreased with size in 1 species. Absolute shrinkage was statistically greater for larger individuals in 4 species. Our results agree with studies of morphological permutations in fish which show that most preservation-related changes take place within the first few months after initial preservation. We suggest that the potential consequences of using preserved specimens in research must be considered and that future studies continue to examine preservation effects, not only on frogs, but on all preserved specimens used in scientific investigations.

  15. Whale Preservation. Grades Five to Nine.

    Science.gov (United States)

    Racicot, Darlene

    Dedicated to the conservation and preservation of whales, dolphins, and porpoises through public education, this instructional unit for grades 5-9 provides current (1993) facts, lesson plans, activities, and conservation and preservation techniques. Interdisciplinary activities involve students in debates, critical thinking, research, and…

  16. 76 FR 60754 - Preserving the Open Internet

    Science.gov (United States)

    2011-09-30

    ... COMMISSION 47 CFR Part 0 Preserving the Open Internet AGENCY: Federal Communications Commission. ACTION... of September 23, 2011, a document establishing rules to preserve the open Internet. Inadvertently the...) Resolve complaints alleging violations of the open Internet rules. Federal Communications Commission. Matt...

  17. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... preservation and the ability to have a future family are important. Understanding there may be fertility preservation options available and having your child see a reproductive specialist in a timely manner can improve their future quality of life. Introduction You may not be aware there are ...

  18. Historic Preservation Vocabulary, Designations, and Resources

    Science.gov (United States)

    Williams, Stacy D.

    2011-01-01

    Preservationists use a common language that had its beginnings in the National Historic Preservation Act of 1966. This act created the Secretary of the Interior's Standards for the Treatment of Historic Properties, which defined the terms and treatments that have become the standard for preservation projects and plans. These terms have been used…

  19. Survey of postharvest handling, preservation and processing ...

    African Journals Online (AJOL)

    Despite the important contribution of camel milk to food security for pastoralists in Kenya, little is known about the postharvest handling, preservation and processing practices. In this study, existing postharvest handling, preservation and processing practices for camel milk by pastoralists in Isiolo, Kenya were assessed ...

  20. Diameter preserving linear maps and isometries, II

    Indian Academy of Sciences (India)

    In this paper we study diameter preserving mappings on spaces of affine functions. Precisely, let S be a compact convex set in a locally convex Hausdorff space and let eЕSЖ be the space of all (real or complex) continuous affine functions on S. We are interested in linear bijections on eЕSЖ which preserve the diameter of ...

  1. Preservation of documentary heritage in Malawi

    African Journals Online (AJOL)

    USER

    2006). In Malawi while archivists appreciate the importance of documentary heritage, policy makers question their relevance. This lack of appreciation leads to inadequate support to the preservation of these precious materials that provide national identity. Documentary heritage have to be appreciated so that preservation ...

  2. Newspaper preservation at Botswana's legal repositories ...

    African Journals Online (AJOL)

    This has unfortunately limited our understanding of how records managers and archivists preserve newspapers in transitioning country contexts. The study reported here investigated the preservation of newspapers in Botswana's three national repositories: Botswana National Archives and Records Services, Botswana ...

  3. A Big Problem for Magellan: Food Preservation

    Science.gov (United States)

    Galvao, Cecilia; Reis, Pedro; Freire, Sofia

    2008-01-01

    In this paper, we present data related to how a Portuguese teacher developed the module "A big problem for Magellan: Food preservation." Students were asked to plan an investigation in order to identify which were the best food preservation methods in the XV and XVI centuries of Portuguese overseas navigation, and then establish a…

  4. Home Food Preservation Training for Extension Educators

    Science.gov (United States)

    Goard, Linnette Mizer; Hill, Melinda; Shumaker, Katharine; Warrix, Marisa

    2013-01-01

    During times of economic downturn, there has been an increased interest in home food preservation. As the primary resource for current research-based recommendations, a team of Extension Family and Consumer Sciences educators with specialization in food safety and food preservation responded to this demand by developing a standardized food…

  5. A Holistic Approach to Bit Preservation

    DEFF Research Database (Denmark)

    Zierau, Eld

    2011-01-01

    This thesis presents three main results for a holistic approach to bit preservation, where the ultimate goal is to find the optimal bit preservation strategy for specific digital material that must be digitally preserved. Digital material consists of sequences of bits, where a bit is a binary digit...... preservation strategy. This can be aspects of how the permanent access to the digital material must be ensured. It can also be aspects of how the material must be treated as part of using it. This includes aspects related to how the digital material to be bit preserved is represented, as well as requirements...... for confidentiality, availability, costs, additional to the requirements of ensuring bit safety. A few examples are: • The way that digital material is represented in files and structures has an influence on whether it is possible to interpret and use the bits at a later stage. Consequentially, the way bits represent...

  6. Flexible Bit Preservation on a National Basis

    DEFF Research Database (Denmark)

    Jurik, Bolette; Nielsen, Anders Bo; Zierau, Eld

    2012-01-01

    In this paper we present the results from The Danish National Bit Repository project. The project aim was establishment of a system that can offer flexible and sustainable bit preservation solutions to Danish cultural heritage institutions. Here the bit preservation solutions must include support...... of bit safety as well as other requirements like e.g. confidentiality and availability. The Danish National Bit Repository is motivated by the need to investigate and handle bit preservation for digital cultural heritage. Digital preservation relies on the integrity of the bits which digital material...... consists of, and it is with this focus that the project was initiated. This paper summarizes the requirements for a general system to offer bit preservation to cultural heritage institutions. On this basis the paper describes the resulting flexible system which can support such requirements. The paper...

  7. Package Formats for Preserved Digital Material

    DEFF Research Database (Denmark)

    Zierau, Eld

    2012-01-01

    This paper presents an investigation of the best suitable package formats for long term digital preservation. The choice of a package format for preservation is crucial for future access, thus a thorough analysis of choice is important. The investigation presented here covers setting up requireme......This paper presents an investigation of the best suitable package formats for long term digital preservation. The choice of a package format for preservation is crucial for future access, thus a thorough analysis of choice is important. The investigation presented here covers setting up...... requirements for package formats used for long term preserved digital material, and using these requirements as the basis for analysing a range of package formats. The result of the concrete investigation is that the WARC format is the package format best suited for the listed requirements. Fulfilling......, e.g. if there are specific forensic or direct access to files....

  8. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  9. A network of networks.

    Science.gov (United States)

    Iedema, Rick; Verma, Raj; Wutzke, Sonia; Lyons, Nigel; McCaughan, Brian

    2017-04-10

    Purpose To further our insight into the role of networks in health system reform, the purpose of this paper is to investigate how one agency, the NSW Agency for Clinical Innovation (ACI), and the multiple networks and enabling resources that it encompasses, govern, manage and extend the potential of networks for healthcare practice improvement. Design/methodology/approach This is a case study investigation which took place over ten months through the first author's participation in network activities and discussions with the agency's staff about their main objectives, challenges and achievements, and with selected services around the state of New South Wales to understand the agency's implementation and large system transformation activities. Findings The paper demonstrates that ACI accommodates multiple networks whose oversight structures, self-organisation and systems change approaches combined in dynamic ways, effectively yield a diversity of network governances. Further, ACI bears out a paradox of "centralised decentralisation", co-locating agents of innovation with networks of implementation and evaluation expertise. This arrangement strengthens and legitimates the role of the strategic hybrid - the healthcare professional in pursuit of change and improvement, and enhances their influence and impact on the wider system. Research limitations/implications While focussing the case study on one agency only, this study is unique as it highlights inter-network connections. Contributing to the literature on network governance, this paper identifies ACI as a "network of networks" through which resources, expectations and stakeholder dynamics are dynamically and flexibly mediated and enhanced. Practical implications The co-location of and dynamic interaction among clinical networks may create synergies among networks, nurture "strategic hybrids", and enhance the impact of network activities on health system reform. Social implications Network governance requires more

  10. Fertility preservation in female classic galactosemia patients.

    Science.gov (United States)

    van Erven, Britt; Gubbels, Cynthia S; van Golde, Ron J; Dunselman, Gerard A; Derhaag, Josien G; de Wert, Guido; Geraedts, Joep P; Bosch, Annet M; Treacy, Eileen P; Welt, Corrine K; Berry, Gerard T; Rubio-Gozalbo, M Estela

    2013-07-16

    Almost every female classic galactosemia patient develops primary ovarian insufficiency (POI) as a diet-independent complication of the disease. This is a major concern for patients and their parents, and physicians are often asked about possible options to preserve fertility. Unfortunately, there are no recommendations on fertility preservation in this group. The unique pathophysiology of classic galactosemia with a severely reduced follicle pool at an early age requires an adjusted approach. In this article recommendations for physicians based on current knowledge concerning galactosemia and fertility preservation are made. Fertility preservation is only likely to be successful in very young prepubertal patients. In this group, cryopreservation of ovarian tissue is currently the only available technique. However, this technique is not ready for clinical application, it is considered experimental and reduces the ovarian reserve. Fertility preservation at an early age also raises ethical questions that should be taken into account. In addition, spontaneous conception despite POI is well described in classic galactosemia. The uncertainty surrounding fertility preservation and the significant chance of spontaneous pregnancy warrant counseling towards conservative application of these techniques. We propose that fertility preservation should only be offered with appropriate institutional research ethics approval to classic galactosemia girls at a young prepubertal age.

  11. Preserving geomorphic data records of flood disturbances

    Science.gov (United States)

    Moody, John A.; Martin, Deborah; Meade, Robert H.

    2015-01-01

    No central database or repository is currently available in the USA to preserve long-term, spatially extensive records of fluvial geomorphic data or to provide future accessibility. Yet, because of their length and continuity these data are valuable for future research. Therefore, we built a public accessible website to preserve data records of two examples of long-term monitoring (40 and 18 years) of the fluvial geomorphic response to natural disturbances. One disturbance was ∼50-year flood on Powder River in Montana in 1978, and the second disturbance was a catastrophic flood on Spring Creek following a ∼100-year rainstorm after a wildfire in Colorado in 1996.Two critical issues arise relative to preserving fluvial geomorphic data. The first is preserving the data themselves, but the second, and just as important, is preserving information about the location of the field research sites where the data were collected so the sites can be re-located and re-surveyed in the future. The latter allows long-term datasets to be extended into the future and to provide critical background data for interpreting future landscape changes. Data were preserved on a website to allow world-wide accessibility and to upload new data to the website as they become available. We describe the architecture of the website, lessons learned in developing the website, future improvements, and recommendations on how also to preserve information about the location of field research sites.

  12. On orthogonality preserving quadratic stochastic operators

    Energy Technology Data Exchange (ETDEWEB)

    Mukhamedov, Farrukh; Taha, Muhammad Hafizuddin Mohd [Department of Computational and Theoretical Sciences, Faculty of Science International Islamic University Malaysia, P.O. Box 141, 25710 Kuantan, Pahang Malaysia (Malaysia)

    2015-05-15

    A quadratic stochastic operator (in short QSO) is usually used to present the time evolution of differing species in biology. Some quadratic stochastic operators have been studied by Lotka and Volterra. In the present paper, we first give a simple characterization of Volterra QSO in terms of absolutely continuity of discrete measures. Further, we introduce a notion of orthogonal preserving QSO, and describe such kind of operators defined on two dimensional simplex. It turns out that orthogonal preserving QSOs are permutations of Volterra QSO. The associativity of genetic algebras generated by orthogonal preserving QSO is studied too.

  13. Organ Preservation Surgery for Carcinoma Penis.

    Science.gov (United States)

    Yuvaraja, T B; Waigankar, Santosh; Dharmadhikari, Nikhil; Pednekar, Abhinav

    2017-03-01

    Carcinoma of the penis is not uncommon in India. A sizeable number of patients do not report to the doctors in fear of mutilation to the organ and hence subsequently end up with advanced disease. Many patients with T1 or T2 disease when carefully selected are amenable to organ-preserving penile procedures including surgery, topical therapy, laser, and radiation therapy. Identification of appropriate patients and institution of these treatments has been noted to produce oncologically comparable results to extirpative surgeries. In this article, we review the criteria to identify patients qualifying for organ-preserving treatments and also review outcomes with a variety of penile-preserving procedures.

  14. Preservation Methods Utilized for Space Food

    Science.gov (United States)

    Vodovotz, Yael; Bourland, Charles

    2000-01-01

    Food for manned space flight has been provided by NASA-Johnson Space Center since 1962. The various mission scenarios and space craft designs dictated the type of food preservation methodologies required to meet mission objectives. The preservation techniques used in space flight include freeze-dehydration, thermostabilization, irradiation, freezing and moisture adjustment. Innovative packaging material and techniques enhanced the shelf-stability of the food items. Future space voyages may include extended duration exploration missions requiring new packaging materials and advanced preservation techniques to meet mission goals of up to 5-year shelf-life foods.

  15. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... in a timely manner can improve their future quality of life. Introduction You may not be aware there are options for preserving fertility in your child diagnosed with cancer. You may be focused on ...

  16. EVALUATION OF PRESERVATIVE EFFICIACY OF CAMPHORA IN ...

    African Journals Online (AJOL)

    Key Words: Comphora, herbal products, preservation, parabens, microbial quality, raw materials. Picralima nitida, Simaroubecceae, Piper guineense, Piperaceae; Khaya grandifoliola, Meliaceae, Aristolochia repens, Aristolochiaceae, Allium sativum, Lilaceae, Xylopia aethiopica, Ammonaceae; Triplochiton scleroxylon, ...

  17. Ambient Preservation of Clinical Analytes Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed research is in response to the In-flight Biological Sample Preservation and Analysis topic and offers a non-invasive, proven, space and cost and time...

  18. Fertility preservation during cancer treatment: clinical guidelines

    Science.gov (United States)

    Rodriguez-Wallberg, Kenny A; Oktay, Kutluk

    2014-01-01

    The majority of children, adolescents, and young adults diagnosed with cancer today will become long-term survivors. The threat to fertility that cancer treatments pose to young patients cannot be prevented in many cases, and thus research into methods for fertility preservation is developing, aiming at offering cancer patients the ability to have biologically related children in the future. This paper discusses the current status of fertility preservation methods when infertility risks are related to surgical oncologic treatments, radiation therapy, or chemotherapy. Several scientific groups and societies have developed consensus documents and guidelines for fertility preservation. Decisions about fertility and imminent potentially gonadotoxic therapies must be made rapidly. Timely and complete information on the impact of cancer treatment on fertility and fertility preservation options should be presented to all patients when a cancer treatment is planned. PMID:24623991

  19. A Monograph on St. Vincent's Game Preserve

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document describes the geography, history, climate, and wildlife of St. Vincent’s Game Preserve. Photographs, maps, articles, and letters are included.

  20. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Doctor Information for Patients Many adult survivors of childhood cancer feel fertility preservation and the ability to ... after chemotherapy in male and female survivors of childhood cancer treated between 1970 and 1999: a report ...

  1. The Preservation of Physical Fashion Forecasts

    OpenAIRE

    Kosztowny, Alexander John

    2015-01-01

    Archivists, librarians, and historians desire to preserve the past. Many aspects of fashion design, from costume, illustrations, and swatches have been archived as an integral part of documenting the design process. Trend predictives or forecasting reports are utilized by the fashion industry, yet are not preserved. These books are used to predict what silhouettes, colors, and fabrics will be popular in upcoming seasons, so designers, manufacturers, and retailers can successfully sell items t...

  2. Preserving and documenting the Cultural Heritage

    OpenAIRE

    Deniz Özkut

    2012-01-01

    The phenomenon of preservation may be described as a physical process that depends onconceptual facts. When observed from a conceptual point of view, ‘values’ cause the divergencesin the preservation process, which could be named as the pre-requisites of the construction.Values carry emotional and physical points of view. The emotional context, of course, dependson recognizing and remembering while physical context depends on direction of research. They are indicators of cultural characterist...

  3. Central structure preservation of the reversal sign

    Energy Technology Data Exchange (ETDEWEB)

    Chen, C.J. [Dept. of Diagnostic Radiology, Chang Gung Memorial Hospital, Taipei (Taiwan)

    1999-12-01

    We report serial changes of central structure preservation of the reversal sign in a case of child abuse. The serial CT images show that the relatively spared attenuation at the basal ganglia, thalami, and posterior fossa develops before the occurrence of transtentorial herniation. This finding makes the theory that central preservation of the reversal sign is due to pressure relief after transtentorial herniation less convincible. (orig.)

  4. The Planets Testbed: Science for Digital Preservation

    OpenAIRE

    Seamus Ross; Eleonora Nicchiarelli; Andrew Lindley; Andrew Jackson; Petra Helwig; Brian Aitken

    2008-01-01

    The preservation of digital objects requires specific software tools or services. These can be characterisation tools that abstract the essential characteristics of a digital object from a file, migration tools that convert digital objects to different formats, or emulation tools that render digital objects in their original context on a new infrastructure. Until recently digital preservation has been characterised by practices and processes that could best be described as more art and craft...

  5. Fertility preservation during cancer treatment: clinical guidelines

    Directory of Open Access Journals (Sweden)

    Rodriguez-Wallberg KA

    2014-03-01

    Full Text Available Kenny A Rodriguez-Wallberg,1,2 Kutluk Oktay3,4 1Karolinska Institutet, Department of Clinical Science, Intervention and Technology, Division of Obstetrics and Gynecology, 2Reproductive Medicine, Karolinska University Hospital Huddinge, Stockholm, Sweden; 3Innovation Institute for Fertility Preservation, Rye and New York, 4Department of Obstetrics and Gynecology, New York Medical College, Valhalla, NY, USA Abstract: The majority of children, adolescents, and young adults diagnosed with cancer today will become long-term survivors. The threat to fertility that cancer treatments pose to young patients cannot be prevented in many cases, and thus research into methods for fertility preservation is developing, aiming at offering cancer patients the ability to have biologically related children in the future. This paper discusses the current status of fertility preservation methods when infertility risks are related to surgical oncologic treatments, radiation therapy, or chemotherapy. Several scientific groups and societies have developed consensus documents and guidelines for fertility preservation. Decisions about fertility and imminent potentially gonadotoxic therapies must be made rapidly. Timely and complete information on the impact of cancer treatment on fertility and fertility preservation options should be presented to all patients when a cancer treatment is planned. Keywords: fertility preservation, cancer, cryopreservation, ovarian tissue transplantation, fertility-sparing surgery, cancer survival, quality of life

  6. Production and Preservation of Passion Fruit Juice

    Directory of Open Access Journals (Sweden)

    U. G. AKPAN

    2005-06-01

    Full Text Available Production and preservation of Passion Fruit Juice was examined to reduce the spoilage and to increase the shelf life of the juice using chemical preservatives. The preservation of the juice was carried out using sugar, benzoic acid, citric and a combination of citric and benzoic acid under room temperature.The result revealed that the juice maintained its color, aroma and tastes for at least one month when 30% benzoic acid was used as preservative. This happens to be the best among all. The juice under other preservation like 4% sugar went bad after three days, while that of 4% citric acid maintained its qualities for one week and some days, but thereafter the aroma started to fade. The combination of 3% benzoic acid and 4% citric acid maintained the qualities of the juice fairly between two to three weeks. The alcoholic content was also estimated and it was discovered that the juice containing citric acid and sugar has the highest percentage of alcohol. The preservation used also altered the pH so that it is impossible for pathogens to exist at such a low pH environment.

  7. Innovations in food preservation in pastoral zones.

    Science.gov (United States)

    Jans, C; Mulwa Kaindi, D W; Meile, L

    2016-11-01

    Food preservation makes a significant contribution to food security and food safety in pastoral communities with limited access to external food sources. Raw materials are preserved by heating, drying, smoking, pickling, salting, curing or fermentation with microorganisms. This article describes preservation techniques in the pastoral context, targeting the major dietary components of milk, meat and cereals; related health risks; and potential innovations for food preservation. Sustainable elimination of pathogenic microorganisms, preventing re-contamination, sporulation and the growth of zoonotic and foodborne microorganisms, is necessary to enhance food safety and ensure food security by reducing post-harvest losses and food waste. However, modern preservation procedures are difficult to adapt to the lifestyles of pastoralists and so are rarely implemented or accepted. Innovations should therefore focus on improving existing accepted procedures by promoting synergistic combinations to compensate for the disadvantages of these traditional techniques and ensure the quality of the raw material right up until consumption. Drying and spontaneous fermentation are key preservation techniques among pastoralists that serve as opportunities for innovation and can be shared across pastoral communities. Further potential for innovation lies in the unique, largely uncharacterised, microflora biodiversity of fermented products. The characterisation, safety assessment and conservation of these microorganisms are needed to develop locally adapted starter cultures that retain or improve on the desired characteristics of the finished product. Careful sensitisation of stakeholders, the study of social acceptance and capacitybuilding at all levels are required to achieve the sustainable implementation of such innovations, which will contribute to enhanced food security and safety.

  8. Concurrent conditional clustering of multiple networks: COCONETS.

    Directory of Open Access Journals (Sweden)

    Sabrina Kleessen

    Full Text Available The accumulation of high-throughput data from different experiments has facilitated the extraction of condition-specific networks over the same set of biological entities. Comparing and contrasting of such multiple biological networks is in the center of differential network biology, aiming at determining general and condition-specific responses captured in the network structure (i.e., included associations between the network components. We provide a novel way for comparison of multiple networks based on determining network clustering (i.e., partition into communities which is optimal across the set of networks with respect to a given cluster quality measure. To this end, we formulate the optimization-based problem of concurrent conditional clustering of multiple networks, termed COCONETS, based on the modularity. The solution to this problem is a clustering which depends on all considered networks and pinpoints their preserved substructures. We present theoretical results for special classes of networks to demonstrate the implications of conditionality captured by the COCONETS formulation. As the problem can be shown to be intractable, we extend an existing efficient greedy heuristic and applied it to determine concurrent conditional clusters on coexpression networks extracted from publically available time-resolved transcriptomics data of Escherichia coli under five stresses as well as on metabolite correlation networks from metabolomics data set from Arabidopsis thaliana exposed to eight environmental conditions. We demonstrate that the investigation of the differences between the clustering based on all networks with that obtained from a subset of networks can be used to quantify the specificity of biological responses. While a comparison of the Escherichia coli coexpression networks based on seminal properties does not pinpoint biologically relevant differences, the common network substructures extracted by COCONETS are supported by

  9. Linking left hemispheric tissue preservation to fMRI language task activation in chronic stroke patients.

    Science.gov (United States)

    Griffis, Joseph C; Nenert, Rodolphe; Allendorfer, Jane B; Szaflarski, Jerzy P

    2017-11-01

    The preservation of near-typical function in distributed brain networks is associated with less severe deficits in chronic stroke patients. However, it remains unclear how task-evoked responses in networks that support complex cognitive functions such as semantic processing relate to the post-stroke brain anatomy. Here, we used recently developed methods for the analysis of multimodal MRI data to investigate the relationship between regional tissue concentration and functional MRI activation evoked during auditory semantic decisions in a sample of 43 chronic left hemispheric stroke patients and 43 age, handedness, and sex-matched controls. Our analyses revealed that closer-to-normal levels of tissue concentration in left temporo-parietal cortex and the underlying white matter correlated with the level of task-evoked activation in distributed regions associated with the semantic network. This association was not attributable to the effects of left hemispheric lesion or brain volumes, and similar results were obtained when using explicit lesion data. Left temporo-parietal tissue concentration and the associated task-evoked activations predicted patient performance on the in-scanner task, and also predicted patient performance on out-of-scanner naming and verbal fluency tasks. Exploratory analyses using the average HCP-842 tractography dataset revealed the presence of fronto-temporal, fronto-parietal, and temporo-parietal semantic network connections in the locations where tissue concentration was found to correlate with task-evoked activation in the semantic network. In summary, our results link the preservation of left posterior temporo-parietal structures with the preservation of task-evoked semantic network function in chronic left hemispheric stroke patients. Speculatively, this relationship may reflect the status of posterior temporo-parietal areas as cortical and white matter convergence zones that support coordinated processing in the distributed semantic

  10. On Planning and Managing the Preservation of Historical Buildings

    Directory of Open Access Journals (Sweden)

    Č. Jarský

    2003-01-01

    Full Text Available The process of preserving and reconstructing historical buildings poses several specific questions and raises problems which must be solved in the planning and management stage of the building process - from questions of architectural and art-historical significance, via the future purpose of use of the building, links to the surrounding buildings, environmental questions, questions of cost, time analysis, and quality assurance problems. Many of these problems can be solved with the help of a computer model of the course of the rehabilitation and reconstruction of the building created by a construction technology network diagram. The CONTEC integrated project planning, management and quality control system based on these diagrams has been used for bidding, planning and managing the reconstruction process of several significant historical buildings in Prague and other cities.

  11. Selective Preservation of Fossil Ghost Fish

    Science.gov (United States)

    Meacham, Amanda

    2016-04-01

    A unique type of fossil fish preservation has been discovered in the Angelo Member (Fossil Lake) of the Green River Formation. The Angelo Member is a predominately evaporative deposit dominated by dolomite, but contains facies of fossiliferous laminated calcimicrite. Fossil fish occurring in two beds conspicuously lack bones. Fish in the lower bed are only preserved as organic material, including skin, pigments, and eyes. Fish in the upper bed have three-dimensional etching where bones once existed but also contain skin, pigments, and eyes. The top third of the upper bed often contains calcite crystals that are pseudomorphs after trona and possibly halite. Preliminary mineralogical analysis and mapping of evaporate facies suggests that this unique preservation may be related to lake geochemical conditions, such as high pH and alkalinity. To our knowledge, this is the first time this type of preservation has been observed and studied. Fossils and sediments within these beds are being studied both vertically and laterally through the one-meter thick sequence containing the fossil fish using XRD, isotopic, SEM, thin section, and total organic carbon analysis. Nine quarries, 0.5-1 meter square, were excavated for both fossils and rock samples along with 17 additional rock sample locations across an approximately 25-kilometer square region. This investigation has the capability of reconstructing the paleoenvironment and lake chemistry of Fossil Lake during the deposition of the "ghost-fish" beds and solving the mystery of the "missing bones" and the unusual process of preservation.

  12. Methods of Hearing Preservation during Cochlear Implantation.

    Science.gov (United States)

    Khater, Ahmed; El-Anwar, Mohammad Waheed

    2017-07-01

    Introduction  Recent advances in surgical techniques and electrode design have made residual hearing preservation during cochlear implantation (CI) possible, achievable, and desirable. Objectives  The objective of this study was to review the literature regarding methods used for hearing preservation during CI surgery. Data Synthesis  We performed a search in the LILACS, MEDLINE, SciELO, PubMed databases, and Cochrane Library, using the keywords CI, hearing preservation, CI electrode design, and CI soft surgery. We fully read about 15 studies that met the criteria described in "study selection". The studies showed that several factors could contribute to possible cochlear damage during or after CI surgery and must be kept in mind; mechanical damage during electrode insertion, shock waves in the perilymph fluid due to implantation, acoustic trauma due to drilling, loss of perilymph and disruption of inner ear fluid homeostasis, potential bacterial infection, and secondary intracochlear fibrous tissue formation. The desire to preserve residual hearing has led to the development of the soft-surgery protocols with its various components; avoiding entry of blood into the cochlea and the use of hyaluronate seem to be reasonably supported, whereas the use of topical steroids is questionable. The site of entry into the cochlea, electrode design, and the depth of insertion are also important contributing factors. Conclusion  Hearing preservation would be useful for CI patients to benefit from the residual low frequency, as well as for the children who could be candidate for future regenerative hair cell therapy.

  13. Data Preservation in High Energy Physics

    CERN Document Server

    Kogler, Roman; Steder, Michael

    2011-01-01

    Data from high-energy physics experiments are collected with significant financial and human effort and are mostly unique. However, until recently no coherent strategy existed for data preservation and re-use, and many important and complex data sets have simply been lost. While the current focus is on the LHC at CERN, in the current period several important and unique experimental programs at other facilities are coming to an end, including those at HERA, b-factories and the Tevatron. To address this issue, an inter-experimental study group on HEP data preservation and long-term analysis (DPHEP) was convened at the end of 2008. The group now aims to publish a full and detailed review of the present status of data preservation in high energy physics. This contribution summarises the results of the DPHEP study group, describing the challenges of data preservation in high energy physics and the group's first conclusions and recommendations. The physics motivation for data preservation, generic computing and pre...

  14. Preservation of Chytridiomycota in culture collections.

    Science.gov (United States)

    Gleason, Frank H; Mozley-Standridge, Sharon E; Porter, David; Boyle, Donna G; Hyatt, Alex D

    2007-02-01

    Methods for the preservation of fungi in the Chytridiomycota in culture collections are reviewed in this paper. The Chytridiomycota can be preserved with varying degrees of success using a number of different protocols including cryopreservation. The survival of fungi in the Chytridiomycota is sensitive to environmental factors such as lack of moisture, high temperatures, high osmotic potential, and availability of oxygen, all of which must be considered in designing preservation methods. The age of the culture at the initiation of preservation appears to be a particularly important determinant of viability. Recently, commonly used methods for preservation of other groups of fungi have been modified to improve the survival of the Chytridiomycota in culture collections. High rates of survival have been reported after cryopreservation of aerobic and anaerobic chytrids in 10 % glycerol or dimethyl sulphoxide as cryoprotectants. The rates of freezing and thawing must be carefully controlled in the methods for cryopreservation considered in this review. Further research on increasing long-term survival rates and morphological, physiological and genetic stability of Chytridiomycota at low temperatures is necessary.

  15. Fertility preservation in young patients with cancer

    Directory of Open Access Journals (Sweden)

    Virender Suhag

    2015-01-01

    Full Text Available Infertility can arise as a consequence of treatment of oncological conditions. The parallel and continued improvement in both the management of oncology and fertility cases in recent times has brought to the forefront the potential for fertility preservation in patients being treated for cancer. Many survivors will maintain their reproductive potential after the successful completion of treatment for cancer. However total body irradiation, radiation to the gonads, and certain high dose chemotherapy regimens can place women at risk for acute ovarian failure or premature menopause and men at risk for temporary or permanent azoospermia. Providing information about risk of infertility and possible interventions to maintain reproductive potential are critical for the adolescent and young adult population at the time of diagnosis. There are established means of preserving fertility before cancer treatment; specifically, sperm cryopreservation for men and in vitro fertilization and embryo cryopreservation for women. Several innovative techniques are being actively investigated, including oocyte and ovarian follicle cryopreservation, ovarian tissue transplantation, and in vitro follicle maturation, which may expand the number of fertility preservation choices for young cancer patients. Fertility preservation may also require some modification of cancer therapy; thus, patients' wishes regarding future fertility and available fertility preservation alternatives should be discussed before initiation of therapy.

  16. Oxygen absorbers in food preservation: a review.

    Science.gov (United States)

    Cichello, Simon Angelo

    2015-04-01

    The preservation of packaged food against oxidative degradation is essential to establish and improve food shelf life, customer acceptability, and increase food security. Oxygen absorbers have an important role in the removal of dissolved oxygen, preserving the colour, texture and aroma of different food products, and importantly inhibition of food spoilage microbes. Active packaging technology in food preservation has improved over decades mostly due to the sealing of foods in oxygen impermeable package material and the quality of oxygen absorber. Ferrous iron oxides are the most reliable and commonly used oxygen absorbers within the food industry. Oxygen absorbers have been transformed from sachets of dried iron-powder to simple self-adhesive patches to accommodate any custom size, capacity and application. Oxygen concentration can be effectively lowered to 100 ppm, with applications spanning a wide range of food products and beverages across the world (i.e. bread, meat, fish, fruit, and cheese). Newer molecules that preserve packaged food materials from all forms of degradation are being developed, however oxygen absorbers remain a staple product for the preservation of food and pharmaceutical products to reduce food wastage in developed nations and increased food security in the developing & third world.

  17. Bacteriocins and Their Applications in Food Preservation.

    Science.gov (United States)

    Ramu, Ramith; Shirahatti, Prithvi S; Devi, Aishwarya T; Prasad, Ashwini; J, Kumuda; M S, Lochana; F, Zameer; B L, Dhananjaya; M N, Nagendra Prasad

    2015-07-20

    Bacteriocins are ribosomally-synthesized antimicrobial peptides or proteinaceous compounds produced by bacterial strains. They are generally effective in inhibiting the growth of similar or closely related bacterial strains. A high diversity of various bacteriocins is produced by many lactic acid bacteria (LAB) and is found in numerous fermented and non-fermented foods. Several bacteriocins from LAB extend potential applications in food preservation, thus help foods to be naturally preserved and richer in organoleptic and nutritional properties. Though chemical preservatives for the preservation of food are successful to some extent, their quality is not as satisfying as fresh food. Hence, an alternative is required and bacteriocins serve the purpose. Nisin is currently the only bacteriocin widely used as a food preservative. Numerous bacteriocins have been characterized chemically, biochemically, genetically and also at the molecular level to understand their basic mode of action. This article gives an overview of classification of bacteriocins, isolation & characterization, and mode of action. Besides, article highlights the optimized parameters for growth of bacteria in the production of bacteriocins and various bioassays for their determination. Special emphasis has been provided on explaining the beneficial aspects of nisin.

  18. Machine perfusion preservation of the pig liver using a new preservation solution, polysol

    NARCIS (Netherlands)

    Bessems, M.; Doorschodt, B. M.; Dinant, S.; de Graaf, W.; van Gulik, T. M.

    2006-01-01

    INTRODUCTION: The current gold standard for donor liver preservation is cold storage in a preservation solution (4 degrees C), such as Celsior or the University of Wisconsin solution (UW). Recent studies have suggested the benefits of machine perfusion (MP) over cold storage. To improve the results

  19. BlogForever: Intelligent Blog Preservation

    CERN Multimedia

    Katarina Anthony

    2011-01-01

    A new EU co-funded project, BlogForever, has set its sights on a developing region of the Internet: the blogosphere. With society growing ever more online-oriented, blogs have become rich repositories of cultural, scientific and social information. The BlogForever software platform is designed to manage and distribute this content and preserve it for posterity.   The BlogForever project will gather blog content into a safeguarded, online archive, turning the once temporary into a well-preserved resource. The project is scheduled for completion in 2013, with partners spread across 12 different companies, universities and research organisations, including CERN. While the CERN team is primarily involved in the technical aspect of the project – designing and implementing the repository – it will also contribute to the preservation guidelines that will be used to choose what content will be kept. “Building on the success of Invenio, the digital library software used by th...

  20. Inhibition effect of food preservatives on endoproteinases.

    Science.gov (United States)

    Esimbekova, Elena N; Asanova, Anastasiya A; Deeva, Anna A; Kratasyuk, Valentina A

    2017-11-15

    The present manuscript proposes a novel approach to assess the impact of food additives on human metabolism by analysing their effect on biomarker enzyme activity. Alterations in the activity of pancreatic enzymes, such as chymotrypsin and trypsin, which are affected by the most common food preservatives, sodium benzoate (E211), potassium sorbate (E202) and sorbic acid (E200), have been evaluated. The proteinase activity was analysed with a bioluminescent method using the light intensity decay constant. Our study revealed that the preservatives reduce proteinase activity by 50% (EC50) at a much lower concentration than their acceptable daily intake (ADI). Thus, sodium benzoate and sorbic acid have an inhibition effect on chymotrypsin at concentrations 14 times lower and 70 times lower than their ADI and this increases with exposure time. Food preservative consumption impacts negatively on protein digestion, which is especially dangerous for patients with pancreatitis. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Liquid growth hormone: preservatives and buffers

    DEFF Research Database (Denmark)

    Kappelgaard, Anne-Marie; Anders, Bojesen; Skydsgaard, Karen

    2004-01-01

    Xx showed that pain perception was similar between formulations containing phenol and benzyl alcohol, whereas m-cresol was associated with more painful injections than benzyl alcohol. Furthermore, patients reported more pain following injection of a citrate-buffered solution than after a histidine...... administration. The formulation uses phenol (3 mg/ml) as a preservative (to protect product from microbial degradation or contamination) and histidine as a buffer. Alternative preservatives used in other GH formulations include m-cresol (9 mg/ml) and benzyl alcohol (3-9 mg/ml). Buffering agents include citrate...... been observed following subcutaneous administration of phenol (7.5 mg/ml), m-cresol (3-4 mg/ml) and benzyl alcohol (9 mg/ml). No general toxicity reactions were observed after subcutaneous administration of these agents. Clinical evaluation of the preservatives and buffers used in Norditropin Simple...

  2. Toward privacy-preserving JPEG image retrieval

    Science.gov (United States)

    Cheng, Hang; Wang, Jingyue; Wang, Meiqing; Zhong, Shangping

    2017-07-01

    This paper proposes a privacy-preserving retrieval scheme for JPEG images based on local variance. Three parties are involved in the scheme: the content owner, the server, and the authorized user. The content owner encrypts JPEG images for privacy protection by jointly using permutation cipher and stream cipher, and then, the encrypted versions are uploaded to the server. With an encrypted query image provided by an authorized user, the server may extract blockwise local variances in different directions without knowing the plaintext content. After that, it can calculate the similarity between the encrypted query image and each encrypted database image by a local variance-based feature comparison mechanism. The authorized user with the encryption key can decrypt the returned encrypted images with plaintext content similar to the query image. The experimental results show that the proposed scheme not only provides effective privacy-preserving retrieval service but also ensures both format compliance and file size preservation for encrypted JPEG images.

  3. Tertiary Treatment Process of Preserved Wastewater

    Directory of Open Access Journals (Sweden)

    Wang Qingyu

    2016-01-01

    Full Text Available The effects of the composite coagulants on coagulation sedimentation for the preserved wastewater was investigated by changing the composite coagulant dosages, and the coagulant was composed of polymeric ferric sulfate (PFS, polyaluminium chloride (PAC, and polyaluminum ferric silicate (PAFSC, while the effect of the tertiary treatment process on the preserved wastewater was tested, which was exceeded the standard seriously. The results showed that 400 mg/L was the optimum composite coagulant dosage. The removal rates of salt and sugar were as high as 99.1% and 99.5% respectively, and the removal rates of CODCr and SS were 99.3% and 96.0%, respectively after the preserved wastewater was treated by the tertiary treatment technology, which both reached the primary standard of “The Integrated Wastewater Discharge Standard” (GB8978-1996.

  4. The Planets Testbed: Science for Digital Preservation

    Directory of Open Access Journals (Sweden)

    Seamus Ross

    2008-06-01

    Full Text Available The preservation of digital objects requires specific software tools or services. These can be characterisation tools that abstract the essential characteristics of a digital object from a file, migration tools that convert digital objects to different formats, or emulation tools that render digital objects in their original context on a new infrastructure. Until recently digital preservation has been characterised by practices and processes that could best be described as more art and craft than science. The Planets Testbed provides a controlled environment where preservation tools can be tested and evaluated, and where experiment results can be empirically compared. This paper presents an overview of the Testbed application, an analysis of the experiment methodology and a description of the Testbed's web service approach.

  5. Cryopreservation for preservation of potato genetic resources

    Science.gov (United States)

    Niino, Takao; Arizaga, Miriam Valle

    2015-01-01

    Cryopreservation is becoming a very important tool for the long-term storage of plant genetic resources and efficient cryopreservation protocols have been developed for a large number of plant species. Practical procedures, developed using in vitro tissue culture, can be a simple and reliable preservation option of potato genetic resources rather than maintaining by vegetative propagation in genebanks due their allogamous nature. Cryopreserved materials insure a long-term backup of field collections against loss of plant germplasm. Occurrence of genetic variation, in tissue culture cells during prolonged subcultures, can be avoided with suitable cryopreservation protocols that provide high regrowth, leading and facilitating a systematic and strategic cryo-banking of plant genetic resources. Cryopreservation protocols for potato reviewed here, can efficiently complement field and in vitro conservation, providing for preservation of genotypes difficult to preserve by other methods, wild types and other species decided as priority collections. PMID:25931979

  6. Preservation of orange juice using propolis.

    Science.gov (United States)

    Yang, Wenchao; Wu, Zhenhong; Huang, Zachary Y; Miao, Xiaoqing

    2017-10-01

    Orange juice is one of the most popular and the most consumed fruit juices all over the world, especially in Europe and the chemical food preservatives, such as sodium benzoate, potassium sorbate and their mixtures, have long been used in orange juice sold on the market. Excessive consumption of these preservatives may be hazardous to human health. Propolis, composed of resins collected from plant buds and exudates and mixed with salivary gland secretions and beeswax by honey bee workers, has been used as a human medicine and natural food preservative. We hypothesis that propolis, without alcohol, can serve as an alternative and non-synthetic preservative of orange juice. In this study, the preservative effect of propolis emulsion on orange juice was determined up to 35 days. Propolis emulsion (0.02 g/mL propolis, 12 mL), emulsion control (12 mL containing Tween-80, hydrophilic phospholipid and polyethylene glycol 400), sodium benzoate (0.4 g) and potassium sorbate (0.4 g) was each added to 388, 388, 400 and 400 mL orange juice respectively. Propolis emulsion showed significant inhibition of bacteria growth and l-ascorbic acid degradation. Orange juice pH value, titratable acidity, total phenolic content, color and antioxidant capacity were effectively maintained by propolis emulsion. A control solution with all the same emulsifying agents without propolis did not show these properties. It was concluded that propolis can be used as a natural additive agent in orange juice or other fruit juices as an alternative to chemical preservatives.

  7. Preserving Dark Skies: Do Astronomers Care?

    Science.gov (United States)

    Davis, D. R.; Crawford, D. L.

    2001-12-01

    Ground based telescopes are, even in this era of planetary missions and space telescopes, the dominant source of data on solar system objects. Yet many of the premier observing sites in the world are threatened by increasing artificial light that is scattered into the sky - light pollution. World class observing sites such as Mt. Wilson have long since lost the ability to do cutting edge faint object science and observatories in Southern Arizona have been recently threatened - the Canoa Ranch development being the most recent example. Yet there are actions that can be taken to preserve dark skies, not only for astronomy, but also for the benefit of all humanity. Lead by astronomers, effective outdoor lighting codes have been produced and adopted by many jurisdictional authorities. Advocacy organizations such as the International Dark-sky Association (IDA) distribute educational material on how to preserve dark skies through good outdoor lighting practices. Other institutions, such as the National Park Service, are realizing that dark skies are an integral part of the wilderness experience and are taking steps to preserve the quality of their skies. However, the primary beneficaries of dark sky preservation efforts, namely the ground based astronomical community, have largely failed to become involved in efforts to preserve dark skies. For example, only a few percent of the membership of the American Astronomical Society is active in light pollution work or is even a member of IDA. In this presentation, Iwe will outline what is being done locally to preserve dark skies througout the world. In addition, some observations on the level of support from the astronomical community will be offered.

  8. Optimization of cosmetic preservation: water activity reduction.

    Science.gov (United States)

    Kerdudo, A; Fontaine-Vive, F; Dingas, A; Faure, C; Fernandez, X

    2015-02-01

    Preservation of cosmetics is a prerequisite for industrialization, and among the proposed solutions, self-preserved cosmetics are of great interest. One key influencing parameter in self-preservation is water activity; its reduction can help to fight against microbial growth in cosmetic products. This work presents a study on the influence of humectants on water activity and its consequence on the preservation of cosmetic formulations. First, water-humectants mixtures were considered. The influence of glycol and glycerin content, glycol chemical structure, glycerin purity and formulation process on the water activity of the binary mixture was studied. Molecular modelling was performed for a better understanding of the impact of glycol chemistry. Then, the results were applied to five different cosmetic formulations to get optimized products. Challenge test on five strains was carried out in that sense. We showed that the higher the humectants concentration, the lower the water activity. Glycol chemical structure also influenced water activity: propan-1,2-diol was more efficient than propan-1,3-diol, certainly because of a better stabilization in water of propan-1,2-diol as shown by DFT calculation. A drop by drop introduction of glycol in water favoured aw reduction. The best water activity loss was 6.6% and was reached on the cream formulation whose preservation was improved as evidenced by challenge test. Fabrication process as well as humectants concentration were shown to influence water activity. The hydroxyl group positions as well as the presence of an alkyl group on the glycol carbon chain impacted water binding as suggested by DFT calculation. Reducing aw improved the preservation of a cosmetic cream, inhibiting or slowing down the growth of bacteria and fungi. © 2014 Society of Cosmetic Scientists and the Société Française de Cosmétologie.

  9. Data Preservation in High Energy Physics

    Energy Technology Data Exchange (ETDEWEB)

    Mount, Richard; Brooks, Travis; /SLAC; Le Diberder, Francois; /Orsay, LAL; Dubois-Felsmann, Gregory; Neal, Homer; /SLAC; Bellis, Matt; /Stanford U.; Boehnlein, Amber; Votava, Margaret; White, Vicky; Wolbers, Stephen; /Fermilab; Konigsberg, Jacobo; /Florida U.; Roser, Robert; Snider, Rick; /Fermilab; Lucchesi, Donatella; /INFN, Padua; Denisov, Dmitri; /Fermilab; Soldner-Rembold, Stefan; /Manchester U.; Li, Qizhong; /Fermilab; Varnes, Erich; /Arizona U.; Jonckheere, Alan; /Fermilab; Gasthuber, Martin; Gulzow, Volker; /DESY /Marseille, CPPM /Dortmund U. /DESY /Gent U. /DESY, Zeuthen /KEK, Tsukuba /CC, Villeurbanne /CERN /INFN, Bari /Gjovik Coll. Engineering /Karlsruhe, Forschungszentrum /Beijing, Inst. High Energy Phys. /Carleton U. /Cornell U. /Rutherford

    2012-04-03

    Data from high-energy physics (HEP) experiments are collected with significant financial and human effort and are mostly unique. At the same time, HEP has no coherent strategy for data preservation and re-use. An inter-experimental Study Group on HEP data preservation and long-term analysis was convened at the end of 2008 and held two workshops, at DESY (January 2009) and SLAC (May 2009). This document is an intermediate report to the International Committee for Future Accelerators (ICFA) of the reflections of this Study Group. Large data sets accumulated during many years of detector operation at particle accelerators are the heritage of experimental HEP. These data sets offer unique opportunities for future scientific studies, sometimes long after the shut-down of the actual experiments: new theoretical input; new experimental results and analysis techniques; the quest for high-sensitivity combined analyses; the necessity of cross checks. In many cases, HEP data sets are unique; they cannot and most likely will not be superseded by data from newer generations of experiments. Once lost, or in an unusable state, HEP data samples cannot be reasonably recovered. The cost of conserving this heritage through a collaborative, target-oriented long-term data preservation program would be small, compared to the costs of past experimental projects or to the efforts to re-do experiments. However, this cost is not negligible, especially for collaborations close or past their end-date. The preservation of HEP data would provide today's collaborations with a secure way to complete their data analysis and enable them to seize new scientific opportunities in the coming years. The HEP community will benefit from preserved data samples through reanalysis, combination, education and outreach. Funding agencies would receive more scientific return, and a positive image, from their initial investment leading to the production and the first analysis of preserved data.

  10. Ranking species in mutualistic networks.

    Science.gov (United States)

    Domínguez-García, Virginia; Muñoz, Miguel A

    2015-02-02

    Understanding the architectural subtleties of ecological networks, believed to confer them enhanced stability and robustness, is a subject of outmost relevance. Mutualistic interactions have been profusely studied and their corresponding bipartite networks, such as plant-pollinator networks, have been reported to exhibit a characteristic "nested" structure. Assessing the importance of any given species in mutualistic networks is a key task when evaluating extinction risks and possible cascade effects. Inspired in a recently introduced algorithm--similar in spirit to Google's PageRank but with a built-in non-linearity--here we propose a method which--by exploiting their nested architecture--allows us to derive a sound ranking of species importance in mutualistic networks. This method clearly outperforms other existing ranking schemes and can become very useful for ecosystem management and biodiversity preservation, where decisions on what aspects of ecosystems to explicitly protect need to be made.

  11. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  12. Network preservation through a topology control algorithm for wireless mesh networks

    CSIR Research Space (South Africa)

    Aron, FO

    2008-09-01

    Full Text Available as the set of all nodes that have a direct link with node u , when u transmits at maximum transmission power. The set is given by { }.),(| DvudVvANu ≤∈= Definition 2 (Weight Function): An edge ),( vu has a weight given by the following expression...NotNbrNotNbr ∪= 018 else if vuRLwLoc →∈)( && ( , ) ( , ) ( , )p u v p v w p u w+ ≤ then { }wNotNbrNotNbr ∪= 019 =)(uLVN NotNbrANu − 020 ( ) max{ ( , ) | ( )p u p u v v LVN u= ∈ , max( , ) ( , )}txF u p F u p≤ The average connectivity...

  13. Privacy-preserving restricted boltzmann machine.

    Science.gov (United States)

    Li, Yu; Zhang, Yuan; Ji, Yue

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model.

  14. Data Preservation in High Energy Physics

    CERN Document Server

    Mount, Richard; Le Diberder, Francois; Dubois-Felsmann, Gregory; Neal, Homer; Bellis, Matt; Boehnlein, Amber; Votava, Margaret; White, Vicky; Wolbers, Stephen; Konigsberg, Jacobo; Roser, Robert; Snider, Rick; Lucchesi, Donatella; Denisov, Dmitri; Soldner-Rembold, Stefan; Li, Qizhong; Varnes, Erich; Jonckheere, Alan; Gasthuber, Martin; Gülzow, Volker; Kemp, Yves; Ozerov, Dmitri; Diaconu, Cristinel; South, David; Lobodzinski, Bogdan; Olsson, Jan; Haas, Tobias; Wrona, Krzysztof; Szuba, Janusz; Schnell, Gunar; Sasaki, Takashi; Katayama, Nobu; Hernandez, Fabio; Mele, Salvatore; Holzner, Andre; Hemmer, Frederic; Schroeder, Matthias; Barring, Olof; Brun, Rene; Maggi, Marcello; Igo-Kemenes, Peter; Van Wezel, Jos; Heiss, Andreas; Chen, Gang; Wang, Yifang; Asner, David; Riley, Daniel; Corney, David; Gordon, John

    2009-01-01

    Data from high-energy physics (HEP) experiments are collected with significant financial and human effort and are mostly unique. At the same time, HEP has no coherent strategy for data preservation and re-use. An inter-experimental Study Group on HEP data preservation and long-term analysis was convened at the end of 2008 and held two workshops, at DESY (January 2009) and SLAC (May 2009). This document is an intermediate report to the International Committee for Future Accelerators (ICFA) of the reflections of this Study Group.

  15. Privacy-Preserving Restricted Boltzmann Machine

    Directory of Open Access Journals (Sweden)

    Yu Li

    2014-01-01

    Full Text Available With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM. The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model.

  16. Fertility preservation: definition, history, and prospect.

    Science.gov (United States)

    Gosden, Roger G

    2009-11-01

    Exposure to gonadotoxic agents for treating cancer and other diseases or postponement of maternity jeopardize the prospects of genetic parenthood and are major factors driving the development of fertility preservation technologies. Although its mainstays, cryopreservation and vitrification, have been adopted from infertility medicine for fertility preservation purposes, there is a need for additional specialized procedures, protocols, and biomedical devices. As its multidisciplinary character and aims diverge compared with other branches of reproductive medicine, we are witnessing the emergence of a field in its own right. Thieme Medical Publishers.

  17. Privacy-Preserving Data Publishing An Overview

    CERN Document Server

    Wong, Raymond Chi-Wing

    2010-01-01

    Privacy preservation has become a major issue in many data analysis applications. When a data set is released to other parties for data analysis, privacy-preserving techniques are often required to reduce the possibility of identifying sensitive information about individuals. For example, in medical data, sensitive information can be the fact that a particular patient suffers from HIV. In spatial data, sensitive information can be a specific location of an individual. In web surfing data, the information that a user browses certain websites may be considered sensitive. Consider a dataset conta

  18. Fossil avian eggshell preserves ancient DNA

    DEFF Research Database (Denmark)

    Oskam, Charlotte L; Haile, James Seymour; McLay, Emma

    2010-01-01

    isolation and amplification of DNA from fossil eggshell up to 19 ka old. aDNA was successfully characterized from eggshell obtained from New Zealand (extinct moa and ducks), Madagascar (extinct elephant birds) and Australia (emu and owl). Our data demonstrate excellent preservation of the nucleic acids...... approximately 125 times lower bacterial load than bone, making it a highly suitable substrate for high-throughput sequencing approaches. Importantly, the preservation of DNA in Pleistocene eggshell from Australia and Holocene deposits from Madagascar indicates that eggshell is an excellent substrate...

  19. Preservation and storage of prepared ballistic gelatine.

    Science.gov (United States)

    Mattijssen, E J A T; Alberink, I; Jacobs, B; van den Boogaard, Y

    2016-02-01

    The use of ballistic gelatine, generally accepted as a human muscle tissue simulant in wound ballistic studies, might be improved by adding a preservative (Methyl 4-hydroxybenzoate) which inhibits microbial growth. This study shows that replacing a part of the gelatine powder by the preservative does not significantly alter the penetration depth of projectiles. Storing prepared blocks of ballistic gelatine over time decreased the penetration depth of projectiles. Storage of prepared gelatine for 4 week already showed a significant effect on the penetration depth of projectiles. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  20. Avian artificial insemination and semen preservation

    Science.gov (United States)

    Gee, G.F.; Risser, Arthur C.; Todd, Frank S.

    1983-01-01

    Summary: Artificial insemination is a practical propagation tool that has been successful with a variety of birds. Cooperative, massage, and electroejaculation and modifications of these three basic methods of semen collection are described for a variety of birds. Semen color and consistency and sperm number, moti!ity, and morphology, as discussed, are useful indicators of semen quality, but the most reliable test of semen quality is the production of fertile eggs. Successful cryogenic preservation of avian semen with DMSO or glycerol as the cryoprotectant has been possible. Although the methods for preservation require special equipment, use of frozen semen requires only simple insemination supplies

  1. In Situ Preservation of Historic Spacecraft

    Science.gov (United States)

    Barclay, R.; Brooks, R.

    The loss of the Mir space station is shown to symbolize a new consciousness of the value of space artefacts. The reasons why such artefacts as Mir become historic objects worthy of preservation are examined. Preservation of space vehicles in situ is discussed, with particular reference to safety, monitoring and long term costs. An argument is made for a wider definition for World Heritage designations to include material beyond the surface of the Earth, and for international bodies to assess, monitor and oversee these projects. Such heritage sites are seen as an economic driver for the development of space tourism in the 21st century.

  2. Mass preserving image registration for lung CT

    DEFF Research Database (Denmark)

    Gorbunova, Vladlena; Sporring, Jon; Lo, Pechin Chien Pau

    2012-01-01

    on four groups of data: 44 pairs of longitudinal inspiratory chest CT scans with small difference in lung volume; 44 pairs of longitudinal inspiratory chest CT scans with large difference in lung volume; 16 pairs of expiratory and inspiratory CT scans; and 5 pairs of images extracted at end exhale and end......This paper presents a mass preserving image registration algorithm for lung CT images. To account for the local change in lung tissue intensity during the breathing cycle, a tissue appearance model based on the principle of preservation of total lung mass is proposed. This model is incorporated...

  3. Temporal trends of preservative allergy in Denmark (1985-2008)

    DEFF Research Database (Denmark)

    Thyssen, Jacob P; Engkilde, Kåre; Lundov, Michael D

    2010-01-01

    Most cosmetics and industrial products contain preservatives. Preservative allergy is common and, historically, changing contact allergy epidemics caused by preservatives have been observed. In 1997, Alan Dillarstone predicted a stable development of preservative allergy following mandatory...... ingredient labelling on cosmetic products....

  4. 21 CFR 146.152 - Orange juice with preservative.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false Orange juice with preservative. 146.152 Section... Fruit Juices and Beverages § 146.152 Orange juice with preservative. (a) Orange juice with preservative... of orange juice for manufacturing as provided for in § 146.151, except that a preservative is added...

  5. Environmental preservation demand: Altruistic, bequest, and intrinsic motives

    Energy Technology Data Exchange (ETDEWEB)

    Whitehead, J.C.; Thompson, C.Y. (East Carolina Univ., Greenville, NC (United States))

    1993-01-01

    When the demand for environmental preservation is not explicitly revealed in markets, motivating attitudes toward environmental preservation become important. A survey approach allows revelation and measurement of demand for environmental preservation. Indices which measure the altruistic, bequest, intrinsic, and option to use motives and other attitudes are utilized as determinants in a model that measures the demand for environmental preservation. Demand is more likely with greater preservation motives. Preservation demand also depends on individual preferences for economic development, perceptions of affordability and responsibility for preservation of the wetlands. 17 refs., 3 tabs.

  6. The State of the Art and Practice in Digital Preservation.

    Science.gov (United States)

    Lee, Kyong-Ho; Slattery, Oliver; Lu, Richang; Tang, Xiao; McCrary, Victor

    2002-01-01

    The goal of digital preservation is to ensure long-term access to digitally stored information. In this paper, we present a survey of techniques used in digital preservation. We also introduce representative digital preservation projects and case studies that provide insight into the advantages and disadvantages of different preservation strategies. Finally, the pros and cons of current strategies, critical issues for digital preservation, and future directions are discussed.

  7. Cancer and fertility : strategies to preserve fertility

    NARCIS (Netherlands)

    Diedrich, K.; Fauser, B. C. J. M.; Devroey, P.

    Fertility preservation is a key component of cancer management in young people. The Fourth Evian Annual Reproduction Workshop Meeting was held in April 2009 to discuss cancer and fertility in young adults. Specialists in oncology, assisted reproduction, embryology and clinical genetics presented

  8. Preservation For and By the People

    Science.gov (United States)

    Rimberg, June

    1973-01-01

    The American the Beautiful Fund (ABF) has for the past eight years been supporting imaginative urban design, the preservation of green spaces, and the protection of the character of small towns and vanishing Americana through staff assistance and modest seed grants. (JA)

  9. Diameter preserving linear maps and isometries, II

    Indian Academy of Sciences (India)

    We study linear bijections of simplex spaces A ( S ) which preserve the diameter of the range, that is, the seminorm ϱ ( f ) = sup { | f ( x ) − f ( y ) | : x , y ∈ S } . Author Affiliations. Félix Cabello Sánchez1. Departamento de Matemáticas, Universidad de Extremadura, Avenida de Elvas 06071- Badajoz, Spain. Dates. Manuscript ...

  10. Interaction of copper wood preservatives and adhesives

    Science.gov (United States)

    Charles R. Frihart

    2003-01-01

    Compared to other substrates, wood is generally easy to bond. However, adhesion is diminished when the wood surface is covered by chemicals, whether natural oils and resins or added chemicals. Among the chemicals added to wood are fire retardants and wood preservatives. Chromated copper arsenate (CCA) has been widely used to protect wood against rot and termites, but...

  11. Thimlich Ohinga Forest: Preserving an endangered heritage

    OpenAIRE

    Ongugo, Paul O.; Mogoi, J.N.; Kamau, E.O.

    2006-01-01

    Metadata only record This article gives the background of settlement of Thimlich Ohinga and the dry stone structures that exist. The preservation of these structures and the forest is this discussed, along wit the potential problems of solutions for managing the forest. Available in SANREM office, FS

  12. Wood preservatives : choosing the right one

    Science.gov (United States)

    Matt Humphries; Stan Lebow; David Moses

    2009-01-01

    If you are having trouble choosing the right wood preservative system for your application, you are not alone. Dozens of products are available, some older types have gone out of use, others may be completely inappropriate for your application. As designers, specifiers and builders, you need to understand key information to be able to navigate through all of these...

  13. Current Concepts in Hip Preservation Surgery

    Science.gov (United States)

    Adler, Kelly L.; Cook, P. Christopher; Geisler, Paul R.; Yen, Yi-Meng; Giordano, Brian D.

    2016-01-01

    Context: Successful treatment of nonarthritic hip pain in young athletic individuals remains a challenge. A growing fund of clinical knowledge has paralleled technical innovations that have enabled hip preservation surgeons to address a multitude of structural variations of the proximal femur and acetabulum and concomitant intra-articular joint pathology. Often, a combination of open and arthroscopic techniques are necessary to treat more complex pathomorphologies. Peri- and postoperative recovery after such procedures can pose a substantial challenge to the patient, and a dedicated, thoughtful approach may reduce setbacks, limit morbidity, and help optimize functional outcomes. Evidence Acquisition: PubMed and CINAHL databases were searched to identify relevant scientific and review articles through December 2014 using the search terms hip preservation, labrum, surgical dislocation, femoroacetabular impingement, postoperative rehabilitation, peri-acetabular osteotomy, and rotational osteotomy. Reference lists of included articles were reviewed to locate additional references of interest. Study Design: Clinical review. Level of Evidence: Level 4. Results: Hip preservation procedures and appropriate rehabilitation have allowed individuals to return to a physically active lifestyle. Conclusion: Effective postoperative rehabilitation must consider modifications and precautions specific to the particular surgical techniques used. Proper postoperative rehabilitation after hip preservation surgery may help optimize functional recovery and maximize clinical success and patient satisfaction. PMID:26733593

  14. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  15. PRESERVATION AND CONSERVATION OF LIBRARY MATERIALS ...

    African Journals Online (AJOL)

    Abstract. The paper attempts to explain preservation and conservation as measures for achieving sustainability of library materials as long as possible in their original format. In order to achieve this, causes of deterioration of library materials such as poor paper manufacture, improper storage, rough handling, pests and ...

  16. Archiving Innovations Preserve Essential Historical Records

    Science.gov (United States)

    2013-01-01

    The Apollo 11 mission left on the Moon a silicon disc inscribed with microscopic recreations of messages from 73 countries. NanoArk Corporation of Fairport, New York, built on that NASA technology to develop a fire and water resistant archiving innovation that provides cost savings and security in preserving documents. Since its launch, NanoArk has grown from 2 to 10 employees.

  17. CERN Services for Long Term Data Preservation

    CERN Document Server

    Shiers, Jamie; Blomer, Jakob; Ganis, Gerardo; Dallmeier-Tiessen, Sunje; Simko, Tibor; Cancio Melia, German; CERN. Geneva. IT Department

    2016-01-01

    In this paper we describe the services that are offered by CERN for Long Term preservation of High Energy Physics (HEP) data, with the Large Hadron Collider (LHC) as a key use case. Data preservation is a strategic goal for European High Energy Physics (HEP), as well as for the HEP community worldwide and we position our work in this global content. Specifically, we target the preservation of the scientific data, together with the software, documentation and computing environment needed to process, (re-)analyse or otherwise (re-)use the data. The target data volumes range from hundreds of petabytes (PB – 10^15 bytes) to hundreds of exabytes (EB – 10^18 bytes) for a target duration of several decades. The Use Cases driving data preservation are presented together with metrics that allow us to measure how close we are to meeting our goals, including the possibility for formal certification for at least part of this work. Almost all of the services that we describe are fully generic – the exception being A...

  18. Parsing with Structure-Preserving Categorial Grammars

    NARCIS (Netherlands)

    Capelletti, M.

    2007-01-01

    This book is a study of the logical and computational properties of structure-preserving categorial grammars. The first part of the book presents chart-parsers for non-associative categorial grammars in the style of Ajdukiewicz and Bar-Hillel. These are proposed in Chapter 3 as deductive parsers,

  19. Nigerian cultural heritage: preservation, challenges and prospects ...

    African Journals Online (AJOL)

    This paper derives from a functionalist perspective which descriptively presents a historical, anthropological, and archaeological account of the Nigerian cultural heritage. Efforts at preserving these heritages are obstructed with daunting challenges, particularly human activities such as trafficking and exportation of Nigerian ...

  20. Coatings Preserve Metal, Stone, Tile, and Concrete

    Science.gov (United States)

    2014-01-01

    John B. Schutt, a chemist at Goddard Space Flight Center, created a coating for spacecraft that could resist corrosion and withstand high heat. After retiring from NASA, Schutt used his expertise to create new formulations for Daytona Beach, Florida-based Adsil Corporation, which now manufactures a family of coatings to preserve various surfaces. Adsil has created 150 jobs due to the products.

  1. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... 1970 and 1999: a report from the Childhood Cancer Survivor Study cohort . Lancet Oncol. 2016;17(5):567-76. Ginsberg JP. New advances in fertility preservation for pediatric cancer patients. Curr Opin Pediatr. 2010;23:9- ...

  2. Enhancing Milk Preservation with Esterified Legume Proteins.

    Science.gov (United States)

    Sitohy, Mahmoud Z; Osman, Ali O

    2011-03-01

    Three methylated legume proteins; soybean protein, broad bean protein and chickpea protein as well as their respective native proteins were applied at two different concentrations (0.1 and 1%) to either raw or pasteurized milk before preservation at 4 °C for 7-14 days. Supplementation of raw milk with esterified legume proteins could ameliorate its preservation quality at 4 °C for 5 days, based on the total bacterial count (TBC) or the titratable acidity levels. Supplementing pasteurized milk with esterified legume proteins (0.1%) has significantly improved its keeping quality as it significantly reduced the total bacterial count by 3.33 and 1.80 log when preserved at 4 °C for 7 and 14 days, respectively. Esterified legume proteins (0.1%) could maintain the level of bacterial load of the pasteurized milk at its initial level of pasteurization (zero time) after 14 days of preservation at 4 °C under closed conditions.

  3. Short Communication: Preservation of Photographs and Audiovisual ...

    African Journals Online (AJOL)

    It is argued that the audiovisual heritage which has remained largely untapped or is scattered both within individual nations or has been collected and carried overseas holds the key to collective memory. The current lack of requisite resources for the collection and preservation of this cultural heritage remains a major ...

  4. Microbiological quality and preservative capacity of commonly ...

    African Journals Online (AJOL)

    Ten brands of cosmetics were randomly purchased from shops in Dar es Salaam, and were subjected to microbiological assessment for microbial quality, preservative capacity and identification of microbial contaminants. Aliquots of each cosmetic were uniformly spread-plated on agar plates to quantify, isolate and identify ...

  5. Fertility preservation in young cancer patients

    Directory of Open Access Journals (Sweden)

    Ariel Revel

    2010-01-01

    Full Text Available As a result of advances in treatment, almost 80% of children and adolescents who receive a diagnosis of cancer become long-term survivors. The increased survival rate of children and adolescents with cancer has resulted in a major interest in the long-term effects of cancer treatment on the possibility for future fertility. Currently established methods for the preservation of fertility are available only for pubertal males and females. Pubertal male cancer patients should be encouraged to freeze numerous sperm samples even when sperm count and motility are poor. In these cases, intracytoplasmic sperm injection is a powerful technique compared with intrauterine insemination since thawed sperm samples with poor parameters can produce relatively high fertilization rates resulting in normal pregnancies and deliveries. Married pubertal women should be proposed ovulation induction, follicular aspiration, and fertilization with husband sperm. Single women could benefit from vitrification of oocytes. This requires a delay of about 3 weeks in the commencement of chemotherapy to enable follicular growth. Fertility preservation for prepubertal patients is more of a problem. Young girls could be offered cryopreservation of gametes in the gonadal tissue. Cryopreservation of testicular tissue was suggested for fertility preservation for young boys, but this method is totally experimental and not currently offered. Discussing future fertility is part of the consultation of young female and male patients facing potentially gonadotoxic cancer therapy. It is the role of reproductive specialists to create various options in their laboratory to preserve fertility potential of cancer patients.

  6. Fossil avian eggshell preserves ancient DNA.

    Science.gov (United States)

    Oskam, Charlotte L; Haile, James; McLay, Emma; Rigby, Paul; Allentoft, Morten E; Olsen, Maia E; Bengtsson, Camilla; Miller, Gifford H; Schwenninger, Jean-Luc; Jacomb, Chris; Walter, Richard; Baynes, Alexander; Dortch, Joe; Parker-Pearson, Michael; Gilbert, M Thomas P; Holdaway, Richard N; Willerslev, Eske; Bunce, Michael

    2010-07-07

    Owing to exceptional biomolecule preservation, fossil avian eggshell has been used extensively in geochronology and palaeodietary studies. Here, we show, to our knowledge, for the first time that fossil eggshell is a previously unrecognized source of ancient DNA (aDNA). We describe the successful isolation and amplification of DNA from fossil eggshell up to 19 ka old. aDNA was successfully characterized from eggshell obtained from New Zealand (extinct moa and ducks), Madagascar (extinct elephant birds) and Australia (emu and owl). Our data demonstrate excellent preservation of the nucleic acids, evidenced by retrieval of both mitochondrial and nuclear DNA from many of the samples. Using confocal microscopy and quantitative PCR, this study critically evaluates approaches to maximize DNA recovery from powdered eggshell. Our quantitative PCR experiments also demonstrate that moa eggshell has approximately 125 times lower bacterial load than bone, making it a highly suitable substrate for high-throughput sequencing approaches. Importantly, the preservation of DNA in Pleistocene eggshell from Australia and Holocene deposits from Madagascar indicates that eggshell is an excellent substrate for the long-term preservation of DNA in warmer climates. The successful recovery of DNA from this substrate has implications in a number of scientific disciplines; most notably archaeology and palaeontology, where genotypes and/or DNA-based species identifications can add significantly to our understanding of diets, environments, past biodiversity and evolutionary processes.

  7. Preserving, developing and promoting indigenous languages ...

    African Journals Online (AJOL)

    On the basis of literature from various fields an attempt is made to construct a holistic conceptual framework for reflection by LIS professionals. Some examples from South African projects are given to illustrate the possible roles of LIS in the preservation, development and promotion of indigenous languages. Innovation ...

  8. Mass preserving registration for heart MR images.

    Science.gov (United States)

    Zhu, Lei; Haker, Steven; Tannenbaum, Allen

    2005-01-01

    This paper presents a new algorithm for non-rigid registration between two doubly-connected regions. Our algorithm is based on harmonic analysis and the theory of optimal mass transport. It assumes an underlining continuum model, in which the total amount of mass is exactly preserved during the transformation of tissues. We use a finite element approach to numerically implement the algorithm.

  9. Stellar Spectral Classification with Locality Preserving Projections ...

    Indian Academy of Sciences (India)

    non-linearly assembling learning machine (Liu et al. 2016) and the method based on. Fisher criterion and manifold learning (Liu & Song 2015). To our knowledge, Locality Preserving ..... an active area of research even in the Machine Learning community and we attempt to overcome the above problems in our future work.

  10. Language Preservation and Human Resources Development.

    Science.gov (United States)

    Silverthorne, Joyce A.

    Those who work in the field of preserving Native American languages are an assortment of individuals who come to the work as a central career (linguists), through family heritage (fluent speakers), or through a developed passion (language learners). This paper examines the field from the perspective of R. Wayne Pace, Phillip C. Smith, and Gordon…

  11. Building Digital Audio Preservation Infrastructure and Workflows

    Science.gov (United States)

    Young, Anjanette; Olivieri, Blynne; Eckler, Karl; Gerontakos, Theodore

    2010-01-01

    In 2009 the University of Washington (UW) Libraries special collections received funding for the digital preservation of its audio indigenous language holdings. The university libraries, where the authors work in various capacities, had begun digitizing image and text collections in 1997. Because of this, at the onset of the project, workflows (a…

  12. Economic growth, ecological economics, and wilderness preservation

    Science.gov (United States)

    Brian Czech

    2000-01-01

    Economic growth is a perennial national goal. Perpetual economic growth and wilderness preservation are mutually exclusive. Wilderness scholarship has not addressed this conflict. The economics profession is unlikely to contribute to resolution, because the neoclassical paradigm holds that there is no limit to economic growth. A corollary of the paradigm is that...

  13. 76 FR 59191 - Preserving the Open Internet

    Science.gov (United States)

    2011-09-23

    ... Evolution of the Internet Architecture, RFC 3724, 1-14 (March 2004), ftp://ftp.rfc-editor.org/in-notes... Internet; Final Rule #0;#0;Federal Register / Vol. 76 , No. 185 / Friday, September 23, 2011 / Rules and Regulations#0;#0; ] FEDERAL COMMUNICATIONS COMMISSION 47 CFR Parts 0 and 8 Preserving the Open Internet AGENCY...

  14. 2015 Site Environmental Report Fernald Preserve

    Energy Technology Data Exchange (ETDEWEB)

    Hertel, Bill [Navarro Research and Engineering, Oak Ridge, TN (United States); Hooten, Gwen [US Department of Energy, Washington, DC (United States)

    2016-05-01

    The Fernald Preserve 2015 Site Environmental Report provides stakeholders with the results from the Fernald, Ohio, Site’s environmental monitoring programs for 2015; a summary of the U.S. Department of Energy’s (DOE’s) activities conducted onsite; and a summary of the Fernald Preserve’s compliance with the various environmental regulations, compliance agreements, and DOE policies that govern site activities. This report has been prepared in accordance with the “Integrated Environmental Monitoring Plan,” which is Attachment D of the Comprehensive Legacy Management and Institutional Controls Plan (LMICP) (DOE 2016). Remediation of the Fernald Preserve has been successfully completed with the exception of the groundwater. During 2015, activities at the Fernald Preserve included: environmental monitoring activities related to direct radiation, groundwater, and surface water; ecological restoration monitoring and maintenance as well as inspections, care, and monitoring of the site and the OSDF to ensure that provisions of the LMICP are fully implemented; OSDF leak detection monitoring and collection, monitoring, and treatment of leachate from the OSDF; extraction, monitoring, and treatment of contaminated groundwater from the Great Miami Aquifer (Operable Unit 5); ongoing operation of the Fernald Preserve Visitors Center, associated outreach, and educational activities; and monitoring as specified in the site’s National Pollutant Discharge Elimination System (NPDES) permit. Environmental monitoring programs were developed to ensure that the remedy remains protective of the environment. The requirements of these programs are described in detail in the LMICP and reported in this Site Environmental Report.

  15. Dry Preserving the Green Sea Urchin.

    Science.gov (United States)

    Stimson, Cheryl D.

    1987-01-01

    Describes a project for junior high and senior high school students designed to safely preserve hard-bodied marine invertebrates. Details the materials and procedures used in this technique. Stresses the use of non-toxic solutions and producing a lifelike specimen. (CW)

  16. Normothermic liver preservation : a new paradigm?

    NARCIS (Netherlands)

    Ravikumar, Reena; Leuvenink, Henri; Friend, Peter J.

    Despite increasing donor numbers, waiting lists and pre-transplant mortality continue to grow in many countries. The number of donor organs suitable for liver transplantation is restricted by cold preservation and ischemia-reperfusion injury (IRI). Transplantation of marginal donor organs has led to

  17. Bioprocessing preservative-treated waste wood

    Science.gov (United States)

    Barbara L. Illman; Vina W. Yang; Les. Ferge

    2000-01-01

    Disposal of preservative-treated waste wood is a growing problem worldwide. Bioprocessing the treated wood offers one approach to waste management under certain conditions. One goal is to use wood decay fungi to reduce the volume of waste with an easily managed system in a cost-effective manner. Wood decay fungi were obtained from culture collections in the Mycology...

  18. Preservation versus non-preservation of the duodenal passage following total gastrectomy: a systematic review.

    Science.gov (United States)

    Yang, Yu-Shang; Chen, Long-Qi; Yan, Xian-Xia; Liu, Ya-Li

    2013-05-01

    Various reconstruction procedures have been proposed for restoring the alimentary tract continuity after total gastrectomy. However, so far there is no consensus on the ideal post-gastrectomy reconstruction procedure. The necessity of preserving the duodenal passage is one of the major focuses of the debate concerning gastrointestinal reconstruction and is the objective of this study. A systematic literature search of PubMed, EMBASE, the Cochrane Library, SCI, and Chinese Biomedical Literature Database (CBM) was carried out before March 2012 to obtain studies of randomized controlled trials (RCT). Analysis was performed using RevMan 5.0 software. Nine RCTs involving 642 participants met the selection criteria. The results of the meta-analyses showed that operative mortality and morbidity were not significantly different between the two procedures (preservation vs. non-preservation of duodenum). However, operative time was considerably prolonged by preserving the duodenal passage. Patients in the preservation group had an improved nutritional parameters (body weight, levels of serum iron and hemoglobin) in the short term (quality of life improvement for patients with a preserved duodenal passage. This systematic review failed to demonstrate obvious advantage in preserving duodenal passage after total gastrectomy.

  19. Contact sensitivity to preservatives in Singapore: frequency of sensitization to 11 common preservatives 2006-2011.

    Science.gov (United States)

    Cheng, Suzanne; Leow, Yung Hian; Goh, Chee Leok; Goon, Anthony

    2014-01-01

    Preservatives are indispensable agents used to prevent bacterial and fungal contamination of cosmetics, personal care products, domestic preparations, and industrial products. We evaluated patch-test data at the National Skin Centre, Singapore, from 2006 to 2011 to identify the trends in preservative contact allergies. All patients with suspected contact dermatitis were patch tested to 4 preservatives within the modified European standard series. Patients were also tested with 7 preservatives from our special series if clinically indicated. Three thousand one hundred seventy-seven patients were tested to preservatives in the standard series. Sensitization frequencies were all greater than 1%: parabens (2.58%), methylchloroisothiazolinone/methylisothiazolinone (1.75%), quaternium 15 (1.43%), and methyldibromoglutaronitrile (1.2%). There was no change in trends in sensitization frequencies from 2006 to 2011, with no increase in sensitization frequency to methylchloroisothiazolinone/methylisothiazolinone. The sensitization frequencies for methyldibromoglutaronitrile/phenoxyethanol and diazolidinylurea were 2.03% and 1.37%, respectively, and remained less than 1% for bronopol, imidazolidinyl urea, and 2-phenoxyethanol. A rate of 0% was seen for 1,3-dimethylol-5,5-dimethyl hydantoin and formaldehyde; 9.4% of positive patch-test results became positive only at day 7. Preservatives are common causes of allergic contact dermatitis. This should be considered when introducing new preservatives into the market. Day 7 readings are important to detect late reactions.

  20. Small amounts of tissue preserve pancreatic function

    Science.gov (United States)

    Lu, Zipeng; Yin, Jie; Wei, Jishu; Dai, Cuncai; Wu, Junli; Gao, Wentao; Xu, Qing; Dai, Hao; Li, Qiang; Guo, Feng; Chen, Jianmin; Xi, Chunhua; Wu, Pengfei; Zhang, Kai; Jiang, Kuirong; Miao, Yi

    2016-01-01

    Abstract Middle-segment preserving pancreatectomy (MPP) is a novel procedure for treating multifocal lesions of the pancreas while preserving pancreatic function. However, long-term pancreatic function after this procedure remains unclear. The aims of this current study are to investigate short- and long-term outcomes, especially long-term pancreatic endocrine function, after MPP. From September 2011 to December 2015, 7 patients underwent MPP in our institution, and 5 cases with long-term outcomes were further analyzed in a retrospective manner. Percentage of tissue preservation was calculated using computed tomography volumetry. Serum insulin and C-peptide levels after oral glucose challenge were evaluated in 5 patients. Beta-cell secreting function including modified homeostasis model assessment of beta-cell function (HOMA2-beta), area under the curve (AUC) for C-peptide, and C-peptide index were evaluated and compared with those after pancreaticoduodenectomy (PD) and total pancreatectomy. Exocrine function was assessed based on questionnaires. Our case series included 3 women and 2 men, with median age of 50 (37–81) years. Four patients underwent pylorus-preserving PD together with distal pancreatectomy (DP), including 1 with spleen preserved. The remaining patient underwent Beger procedure and spleen-preserving DP. Median operation time and estimated intraoperative blood loss were 330 (250–615) min and 800 (400–5500) mL, respectively. Histological examination revealed 3 cases of metastatic lesion to the pancreas, 1 case of chronic pancreatitis, and 1 neuroendocrine tumor. Major postoperative complications included 3 cases of delayed gastric emptying and 2 cases of postoperative pancreatic fistula. Imaging studies showed that segments representing 18.2% to 39.5% of the pancreas with good blood supply had been preserved. With a median 35.0 months of follow-ups on pancreatic functions, only 1 patient developed new-onset diabetes mellitus of the 4

  1. Quantifying loopy network architectures.

    Directory of Open Access Journals (Sweden)

    Eleni Katifori

    Full Text Available Biology presents many examples of planar distribution and structural networks having dense sets of closed loops. An archetype of this form of network organization is the vasculature of dicotyledonous leaves, which showcases a hierarchically-nested architecture containing closed loops at many different levels. Although a number of approaches have been proposed to measure aspects of the structure of such networks, a robust metric to quantify their hierarchical organization is still lacking. We present an algorithmic framework, the hierarchical loop decomposition, that allows mapping loopy networks to binary trees, preserving in the connectivity of the trees the architecture of the original graph. We apply this framework to investigate computer generated graphs, such as artificial models and optimal distribution networks, as well as natural graphs extracted from digitized images of dicotyledonous leaves and vasculature of rat cerebral neocortex. We calculate various metrics based on the asymmetry, the cumulative size distribution and the Strahler bifurcation ratios of the corresponding trees and discuss the relationship of these quantities to the architectural organization of the original graphs. This algorithmic framework decouples the geometric information (exact location of edges and nodes from the metric topology (connectivity and edge weight and it ultimately allows us to perform a quantitative statistical comparison between predictions of theoretical models and naturally occurring loopy graphs.

  2. THE LEGAL APPROACH TO HISTORIC PRESERVATION: A COMPARATIVE STUDY OF HISTORIC PRESERVATION LAWS IN NEW YORK AND HONG KONG

    OpenAIRE

    ZHENG, Jie Jane

    2015-01-01

    To explore the significance of historic preservation in metropolitan cities and disparities in the legal system to preservation, this paper conducts a comparative study of Hong Kong and New York. To begin with, it provides an overview of the historic preservation legal system in New York and Hong Kong and outlines the major preservation laws respectively in two cities. It pinpoints the key difference of the two legal systems: historic preservation in New York is shaped by four tiers of laws o...

  3. The network researchers' network

    DEFF Research Database (Denmark)

    Henneberg, Stephan C.; Jiang, Zhizhong; Naudé, Peter

    2009-01-01

    The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987). In thi......The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987......). In this paper, based upon the papers presented at the 22 conferences held to date, we undertake a Social Network Analysis in order to examine the degree of co-publishing that has taken place between this group of researchers. We identify the different components in this database, and examine the large main...

  4. THE PRESERVATION OF SOME ORAL LIQUID PREPARATIONS - THE REPLACEMENT OF CHLOROFORM BY OTHER PRESERVATIVES

    NARCIS (Netherlands)

    VANDOORNE, H; LEIJEN, JB

    1994-01-01

    Chloroform should be considered as an obsolete preservative for,pharmaceutical preparations, because of its toxicological implications and its physical instability. The effectiveness oi possible alternatives for chloroform in three-oral liquid pharmaceutical preparations was investigated, using a

  5. Fertility preservation in paediatric nephrology: results of a physician survey.

    Science.gov (United States)

    Miller, Steven D; Li, Yimei; Meyers, Kevin E C; Caplan, Arthur; Miller, Victoria A; Ginsberg, Jill P

    2014-12-01

    Fertility preservation (FP) is a widespread practice in paediatric oncology when gonadotoxic medications such as cyclophosphamide (CPO) are used. FP practice outside of oncology has not been studied, although nephrologists regularly use CPO. This is the first study to explore FP practice by paediatric nephrologists when CPO is used. Survey study. Descriptive statistics and chi-squared analyses were employed to analyse the data. US paediatric nephrologists were sent a survey via email. The survey queried participants about FP practice behaviours, FP attitudes and barriers to practice. Of 579 nephrologists invited, 32% responded to the survey. CPO was dosed in mg/kg by 23% of physicians, g/m(2) by 40% and both by 37%. About 80% agreed that pubertal females should be offered a fertility referral, while 58% report that they actually refer. Factors negatively associated with referral include lack of training, lack of referral network and adherence to gonadotoxic dose limits. Results were similar for male patients. The survey showed that FP practice in the United States is widespread among nephrologists. Lack of referral networks is a notable barrier for nephrologists. Perceived adherence to dose limits may be problematic given the variable dosing regimens utilised. This is due to the risk of unintended overdose in large adolescents dosed in mg/kg whose cumulative dose exceeds gonadotoxic limits in g/m(2) . This paper has implications for nephrology care providers and other specialists who utilise CPO, generalists who care for these patients and oncologists with extant FP referral networks. © 2014 European Dialysis and Transplant Nurses Association/European Renal Care Association.

  6. Network cosmology.

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology.

  7. Network Cosmology

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S.; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology. PMID:23162688

  8. A Mesozoic bird from Gondwana preserving feathers.

    Science.gov (United States)

    Carvalho, Ismar de Souza; Novas, Fernando E; Agnolín, Federico L; Isasi, Marcelo P; Freitas, Francisco I; Andrade, José A

    2015-06-02

    The fossil record of birds in the Mesozoic of Gondwana is mostly based on isolated and often poorly preserved specimens, none of which has preserved details on feather anatomy. We provide the description of a fossil bird represented by a skeleton with feathers from the Early Cretaceous of Gondwana (NE Brazil). The specimen sheds light on the homology and 3D structure of the rachis-dominated feathers, previously known from two-dimensional slabs. The rectrices exhibit a row of rounded spots, probably corresponding to some original colour pattern. The specimen supports the identification of the feather scapus as the rachis, which is notably robust and elliptical in cross-section. In spite of its juvenile nature, the tail plumage resembles the feathering of adult individuals of modern birds. Documentation of rachis-dominated tail in South American enantiornithines broadens the paleobiogeographic distribution of basal birds with this tail feather morphotype, up to now only reported from China.

  9. Heavy hitters via cluster-preserving clustering

    DEFF Research Database (Denmark)

    Larsen, Kasper Green; Nelson, Jelani; Nguyen, Huy L.

    2016-01-01

    , providing correctness whp. In fact, a simpler version of our algorithm for p = 1 in the strict turnstile model answers queries even faster than the "dyadic trick" by roughly a log n factor, dominating it in all regards. Our main innovation is an efficient reduction from the heavy hitters to a clustering...... problem in which each heavy hitter is encoded as some form of noisy spectral cluster in a much bigger graph, and the goal is to identify every cluster. Since every heavy hitter must be found, correctness requires that every cluster be found. We thus need a "cluster-preserving clustering" algorithm......, that partitions the graph into clusters with the promise of not destroying any original cluster. To do this we first apply standard spectral graph partitioning, and then we use some novel combinatorial techniques to modify the cuts obtained so as to make sure that the original clusters are sufficiently preserved...

  10. Privacy Preservation in Distributed Subgradient Optimization Algorithms.

    Science.gov (United States)

    Lou, Youcheng; Yu, Lean; Wang, Shouyang; Yi, Peng

    2017-07-31

    In this paper, some privacy-preserving features for distributed subgradient optimization algorithms are considered. Most of the existing distributed algorithms focus mainly on the algorithm design and convergence analysis, but not the protection of agents' privacy. Privacy is becoming an increasingly important issue in applications involving sensitive information. In this paper, we first show that the distributed subgradient synchronous homogeneous-stepsize algorithm is not privacy preserving in the sense that the malicious agent can asymptotically discover other agents' subgradients by transmitting untrue estimates to its neighbors. Then a distributed subgradient asynchronous heterogeneous-stepsize projection algorithm is proposed and accordingly its convergence and optimality is established. In contrast to the synchronous homogeneous-stepsize algorithm, in the new algorithm agents make their optimization updates asynchronously with heterogeneous stepsizes. The introduced two mechanisms of projection operation and asynchronous heterogeneous-stepsize optimization can guarantee that agents' privacy can be effectively protected.

  11. Techniques and results for open hip preservation

    Directory of Open Access Journals (Sweden)

    David Levy

    2016-11-01

    Full Text Available While hip arthroscopy grows in popularity, there are still many circumstances under which open hip preservation is most appropriately indicated. This article specifically reviews open hip preservation procedures for a variety of hip conditions. Femoral acetabular impingement may be corrected using an open surgical hip dislocation. Acetabular dysplasia may be corrected using a periacetabular osteotomy. Acetabular protrusio may require surgical hip dislocation with rim trimming and a possible valgus intertrochanteric osteotomy. Legg-Calve ́-Perthes disease produces complex deformities that may be better served with osteotomies of the proximal femur and/ or acetabulum. Chronic slipped capital femoral epiphysis (SCFE may also benefit from a surgical hip dislocation and/or proximal femoral osteotomy.

  12. Preservation and postponement of female fertility.

    Science.gov (United States)

    Bromer, J G; Patrizio, P

    2008-10-01

    In the last several decades, both the growing number of reproductive age cancer survivors, and the trend of women from western countries delaying child-bearing to a later age have been markedly increasing. The confluence of these two epidemiologic trends has led to the need for better and more widely available strategies for fertility preservation. In this paper, we will first review both the established and experimental methodologies which can be utilized for either the preservation or postponement of female fertility. These options currently include embryo and oocyte cryopreservation, cortical and whole ovary cryopreservation, ovarian transplantation, ovarian transposition, and gonadotropin releasing hormone agonist protection. As laboratory and surgical techniques for oocyte and ovary cryopreservation continue to improve, modalities now considered experimental will become part of routine practice for reproductive medicine specialists.

  13. Modelling OAIS Compliance for Disaggregated Preservation Services

    Directory of Open Access Journals (Sweden)

    Gareth Knight

    2007-07-01

    Full Text Available The reference model for the Open Archival Information System (OAIS is well established in the research community as a method of modelling the functions of a digital repository and as a basis in which to frame digital curation and preservation issues. In reference to the 5th anniversary review of the OAIS, it is timely to consider how it may be interpreted by an institutional repository. The paper examines methods of sharing essential functions and requirements of an OAIS between two or more institutions, outlining the practical considerations of outsourcing. It also details the approach taken by the SHERPA DP Project to introduce a disaggregated service model for institutional repositories that wish to implement preservation services.

  14. Irradiation preservation of seafood: Literature review

    Energy Technology Data Exchange (ETDEWEB)

    Molton, P.M.

    1987-10-01

    The application of gamma-irradiation for extending the shelf life of seafood has been of interest for many years. This report reviews a number of studies on seafood irradiation conducted over the past several years. Topics covered include seafood irradiation techniques and dosages, species applicability and differences, the effects of packaging on seafood preservation, and changes in organoleptic acceptability as a result of irradiation. Particular attention is given to radiation effects (likely and unlikely) of concern to the public. These include the potential for generation of toxic chemical products, botulinum toxin production, and other health concerns. No scientifically defensible evidence of any kind was found for any harmful effect of irradiation of seafoods at the doses being considered (less than 300 krad), and all indications are that irradiation is an acceptable and needed additional tool for seafood preservation. 49 refs., 14 figs., 14 tabs.

  15. Virtualized cognitive network architecture for 5G cellular networks

    KAUST Repository

    Elsawy, Hesham

    2015-07-17

    Cellular networks have preserved an application agnostic and base station (BS) centric architecture1 for decades. Network functionalities (e.g. user association) are decided and performed regardless of the underlying application (e.g. automation, tactile Internet, online gaming, multimedia). Such an ossified architecture imposes several hurdles against achieving the ambitious metrics of next generation cellular systems. This article first highlights the features and drawbacks of such architectural ossification. Then the article proposes a virtualized and cognitive network architecture, wherein network functionalities are implemented via software instances in the cloud, and the underlying architecture can adapt to the application of interest as well as to changes in channels and traffic conditions. The adaptation is done in terms of the network topology by manipulating connectivities and steering traffic via different paths, so as to attain the applications\\' requirements and network design objectives. The article presents cognitive strategies to implement some of the classical network functionalities, along with their related implementation challenges. The article further presents a case study illustrating the performance improvement of the proposed architecture as compared to conventional cellular networks, both in terms of outage probability and handover rate.

  16. Experimental Breeder Reactor I Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Julie Braun

    2006-10-01

    Experimental Breeder Reactor I (EBR I) is a National Historic Landmark located at the Idaho National Laboratory, a Department of Energy laboratory in southeastern Idaho. The facility is significant for its association and contributions to the development of nuclear reactor testing and development. This Plan includes a structural assessment of the interior and exterior of the EBR I Reactor Building from a preservation, rather than an engineering stand point and recommendations for maintenance to ensure its continued protection.

  17. ON nth CLASS PRESERVING AUTOMORPHISMS OF n ...

    Indian Academy of Sciences (India)

    92

    of G which fix N element wise and act trivially on G/M. Let n be a positive integer. In this article we have shown that if G and H are two n-isoclinic groups, then there exists an isomorphism from Aut γn+1(G). Zn(G). (G) to Aut γn+1(H). Zn(H). (H), which maps the group of nth class preserving auto- morphisms of G to the group of ...

  18. Fertility preservation during cancer treatment: clinical guidelines

    OpenAIRE

    Rodriguez-Wallberg KA; Oktay K

    2014-01-01

    Kenny A Rodriguez-Wallberg,1,2 Kutluk Oktay3,4 1Karolinska Institutet, Department of Clinical Science, Intervention and Technology, Division of Obstetrics and Gynecology, 2Reproductive Medicine, Karolinska University Hospital Huddinge, Stockholm, Sweden; 3Innovation Institute for Fertility Preservation, Rye and New York, 4Department of Obstetrics and Gynecology, New York Medical College, Valhalla, NY, USA Abstract: The majority of children, adolescents, and young adults diagnosed with cancer...

  19. Preservative solution for skeletal muscle biopsy samples

    Directory of Open Access Journals (Sweden)

    Yasemin Gulcan Kurt

    2015-01-01

    Full Text Available Context : Muscle biopsy samples must be frozen with liquid nitrogen immediately after excision and maintained at -80 o C until analysis. Because of this requirement for tissue processing, patients with neuromuscular diseases often have to travel to centers with on-site muscle pathology laboratories for muscle biopsy sample excision to ensure that samples are properly preserved. Aim: Here, we developed a preservative solution and examined its protectiveness on striated muscle tissues for a minimum of the length of time that would be required to reach a specific muscle pathology laboratory. Materials and Methods: A preservative solution called Kurt-Ozcan (KO solution was prepared. Eight healthy Sprague-Dawley rats were sacrificed; striated muscle tissue samples were collected and divided into six different groups. Muscle tissue samples were separated into groups for morphological, enzyme histochemical, molecular, and biochemical analysis. Statistical method used: Chi-square and Kruskal Wallis tests. Results: Samples kept in the KO and University of Wisconsin (UW solutions exhibited very good morphological scores at 3, 6, and 18 hours, but artificial changes were observed at 24 hours. Similar findings were observed for the evaluated enzyme activities. There were no differences between the control group and the samples kept in the KO or UW solution at 3, 6, and 18 hours for morphological, enzyme histochemical, and biochemical features. The messenger ribonucleic acid (mRNA of β-actin gene was protected up to 6 hours in the KO and UW solutions. Conclusion: The KO solution protects the morphological, enzyme histochemical, and biochemical features of striated muscle tissue of healthy rats for 18 hours and preserves the mRNA for 6 hours.

  20. Preserving idealism in global health promotion.

    Science.gov (United States)

    Franco-Paredes, Carlos; Zeuli, Julia; Hernández-Ramos, Isabel; Santos-Preciado, Jose I

    2010-12-01

    If the field of global health is to evolve in the second decade of the new millennium, we need to revive the idealistic spirit and by using the lens of health equity work toward improved health status around the world. Morality and empathy are considered by-products of our evolutionary history as a human species. Idealism may be a trait that we may choose to preserve in our modern evolutionary history.

  1. Renal Preservation Therapy for Renal Cell Carcinoma

    Directory of Open Access Journals (Sweden)

    Yichun Chiu

    2012-01-01

    Full Text Available Renal preservation therapy has been a promising concept for the treatment of localized renal cell carcinoma (RCC for 20 years. Nowadays partial nephrectomy (PN is well accepted to treat the localized RCC and the oncological control is proved to be the same as the radical nephrectomy (RN. Under the result of well oncological control, minimal invasive method gains more popularity than the open PN, like laparoscopic partial nephrectomy (LPN and robot assisted laparoscopic partial nephrectomy (RPN. On the other hand, thermoablative therapy and cryoablation also play an important role in the renal preservation therapy to improve the patient procedural tolerance. Novel modalities, but limited to small number of patients, include high-intensity ultrasound (HIFU, radiosurgery, microwave therapy (MWT, laser interstitial thermal therapy (LITT, and pulsed cavitational ultrasound (PCU. Although initial results are encouraging, their real clinical roles are still under evaluation. On the other hand, active surveillance (AS has also been advocated by some for patients who are unfit for surgery. It is reasonable to choose the best therapeutic method among varieties of treatment modalities according to patients' age, physical status, and financial aid to maximize the treatment effect among cancer control, patient morbidity, and preservation of renal function.

  2. PRESERVATION OF DATA for the DIGITAL SOCIETY

    CERN Document Server

    SHIERS, J; VUERLI, C; MAGGI, M; DONVITO, G; BETKHE, S; KLUTH, S; KENNEDY, J

    2011-01-01

    The preservation of data for future re-use is a topic that is becoming increasingly important across a wide range of disciplines and is expected to become essential in the coming years as a cornerstone of the digital society. The strategy of this project is to combine the forces of several large-scale organizations to ensure that research work in this area is well coordinated and that the results are made available to a wide range of disciplines. The project aims to both document and verify techniques for the preservation of digital data with a strong focus on the continued ability to fully re-use the data, to raise awareness of the importance of this issue as widely as possible, to act as a forum for the interchange of information and best practices, and to develop a roadmap for the coming decade in order that digital preservation moves from being a challenge to a solution. Disciplines targeted range from Life Sciences to High Energy Physics – fields that have diverse needs in terms of data volume and life...

  3. Riverscape and Groundwater Preservation: A Choice Experiment

    Science.gov (United States)

    Tempesta, T.; Vecchiato, D.

    2013-12-01

    This study presents a quantitative approach to support policy decision making for the preservation of riverscapes, taking into account the EC Water Framework Directive (2000/60/EC) and the EC Nitrates Directive (91/676/EEC) concerning the protection of waters against nitrate pollution from agricultural sources. A choice experiment was applied to evaluate the benefits, as perceived by inhabitants, of the implementation of policies aiming to reduce the concentration of nitrates in groundwater, preserve the riverscape by maintaining a minimum water flow and increasing hedges and woods along the Serio River in central northern Italy. Findings suggested that people were particularly concerned about groundwater quality, probably because it is strongly linked to human health. Nevertheless, it was interesting to observe that people expressed a high willingness to pay for actions that affect the riverscape as a whole (such as the minimum water flow maintenance plus reforestation). This is probably due to the close connection between the riverscape and the functions of the river area for recreation, health purposes, and biodiversity preservation.

  4. Effects of wood preservative leachates from docks

    Energy Technology Data Exchange (ETDEWEB)

    Wendt, P.H.; Van Dolah, R.F.; Bobo, M.Y.; Mathews, T.D. [South Carolina Marine Resources Research Inst., Charleston, SC (United States)

    1994-12-31

    Recent evidence indicates that the wood preservative commonly used in dock pilings (chromated copper arsenate or CCA) is highly toxic to several estuarine organisms in laboratory experiments. Increasing demand for residential docks prompted a field study intended to complement these earlier laboratory investigations. Objectives of the study were to: (1) examine concentrations of Cu, Cr, and As in sediments and oysters from intertidal locations in several creeks with and without high densities of docks; (2) examine the bioaccumulation of wood preservative leachates by laboratory-reared oysters transferred to field sites near and distant from newly constructed docks; and (3) investigate the acute toxicity of wood preservative leachates for several species of estuarine fishes and invertebrates exposed to these compounds in the field. Preliminary results indicate that sediment concentrations of all three metals were well below ER-L levels reported by Long and Morgan at all but one dock site. In an ancillary study, 24h LC{sub 50} bioassays were performed using rotifers (Brachionus plicatilis) which were exposed to pore water from sediments in creeks with and without docks. Toxicities of bulk sediments from the same sites were examined using Microtox which measures decreases in bioluminescence of marine bacteria (Photobacterium phosphoreum) as a function of sediment concentration. Neither the rotifer nor the Microtox bioassays showed any significant differences in toxicity between creeks with and without docks.

  5. Establishment of a world food preservation center

    Directory of Open Access Journals (Sweden)

    Wilson Charles L

    2013-01-01

    Full Text Available Abstract A World Food Preservation Center (WFPC is proposed in response to a pending civilization-threatening food shortage and our limited ability to adequately increase food production. Some estimates put losses of food in developing countries after it is produced and before it is consumed at 50%. These losses are particularly threatening to individuals and farmers who are living in the midst of food insecurity. Although numerous organizations have attempted to address this problem worldwide, the magnitude of the effort has not come close to the enormity of the problem. Most of these programs are also short-term and require continuous input by postharvest specialists from developed countries in order to be sustainable. A critical need exists for a substantial and sustainable worldwide program that can significantly reduce losses and waste of food in developing countries. The World Food Preservation Center proposed here meets this need by educating young scientists in developing countries about low-input, appropriate technologies for preserving food postharvest. It also conducts research on postharvest technologies especially suited for application in developing countries such as biological control, solar refrigeration, and coordinated transport and marketing schemes that support and sustain the local production of food commodities.

  6. Microfilm and digitization as choices in preservation

    Directory of Open Access Journals (Sweden)

    Yola de Lusenet

    2003-06-01

    Full Text Available The first conference the European Commission on Preservation and Access (ECPA organized, 'Choosing to preserve', took place in Leipzig in 1996. For the keynote lecture we had invited a scholar, Professor Bernhard Fabian. This was a very deliberate choice, as the ECPA subscribed to the view that academic researchers, as users of the resources kept in libraries and archives, have to be involved in discussions about their preservation. The conference had attracted quite a crowd, around 150 people who were of course all there for the opening lecture. We invited Professor Fabian because he was a very good speaker, who could really present a convincing case to an audience, which he did also on that occasion. He devoted a large part of his presentation of 45 minutes to the horrors of microfilm, showing us pictures of illegible film, with bits missing, that was impossible to use. He explained how distressing it was for scholars to be forced to use surrogates that don't do justice to the originals that they need to study.

  7. Methods to preserve potentially toxigenic fungi

    Directory of Open Access Journals (Sweden)

    Lucas Costa Guimarães

    2014-01-01

    Full Text Available Microorganisms are a source of many high-value compounds which are useful to every living being, such as humans, plants and animals. Since the process of isolating and improving a microorganism can be lengthy and expensive, preserving the obtained characteristic is of paramount importance, so the process does not need to be repeated. Fungi are eukaryotic, achlorophyllous, heterotrophic organisms, usually filamentous, absorb their food, can be either macro or microscopic, propagate themselves by means of spores and store glycogen as a source of storage. Fungi, while infesting food, may produce toxic substances such as mycotoxins. The great genetic diversity of the Kingdom Fungi renders the preservation of fungal cultures for many years relevant. Several international reference mycological culture collections are maintained in many countries. The methodologies that are most fit for preserving microorganisms for extended periods are based on lowering the metabolism until it reaches a stage of artificial dormancy . The goal of this study was to analyze three methods for potentially toxigenic fungal conservation (Castellani's, continuous subculture and lyophilization and to identify the best among them.

  8. Hearing preservation in partial deafness treatment.

    Science.gov (United States)

    Skarzynski, Henryk; Lorens, Artur; Piotrowska, Anna; Skarzynski, Piotr Henryk

    2010-11-01

    Partial deafness (PD) is a condition in which hearing loss occurs in at least 1 frequency critical to speech understanding. Current options for partial deafness treatment (PDT) rely on preoperative hearing preservation, which, along with the use of different means of acoustic and electric stimulation, enable extending the indications for various assistive hearing devices. Possible solutions include acoustic methods only, the use of hearing aids or middle ear implants, electric complementation, and a combination of electric and acoustic stimulation. A total of 95 patients (63 adults, 32 children) with different types of PD were treated using selected types of electrodes and the optimal "round window" approach to the inner ear, with at least 36 months of observation. The extension of PDT indications created an opportunity for patients with different hearing impairments who obtained no benefit from a hearing aid and did not qualify for standard cochlear implant application. The authors' observations are based on the findings that preservation of preoperative hearing had been achieved in 97.1% of adult patients (8 years' observation) and in 100% of children (6 years' observation). Those results send the important message that PDT is feasible and effective. To allow comparison of PDT results from different studies, the authors developed the Skarzynski PDT classification system, which permits the comparison of postoperative results, including the degree of hearing preservation and, more importantly, the patient's understanding of speech after treatment.

  9. Penile-preserving surgery in penile carcinoma

    Directory of Open Access Journals (Sweden)

    B Gowardhan

    2006-01-01

    Full Text Available Penile cancer is an uncommon cancer involving the glans, prepuce or both in over 75% cases. Historically, the standard treatment of the primary tumor has been a partial or total penectomy. Although these are still widely practiced procedures for control of the disease, as our understanding of the natural history of the disease has evolved, the treatment options have broadened, focusing more and more on penile-preserving techniques such as Mohs′s micrographic surgery, wide local excision, subtotal and total glansectomy, laser, brachytherapy, external beam radiotherapy and topical application of chemotherapeutic agents such as 5-Fluorouracil. Penile-preserving options are increasingly being used as a first-line treatment, not restricted to Tis/Ta tumors, but for T1, T2 and even T3 tumors in selected cases. The metastatic stage of the tumor does not influence the treatment of the primary lesion. In this review, we discuss the various penile-preserving options currently available and their role in the management of penile carcinoma of various stages.

  10. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  11. Drug Induced Hearing Loss: Researchers Study Strategies to Preserve Hearing

    Science.gov (United States)

    ... JavaScript on. Feature: Drug-Induced Hearing Loss Researchers Study Strategies to Preserve Hearing Past Issues / Spring 2016 Table ... Read More "Drug Induced Hearing Loss" Articles Researchers Study Strategies to Preserve Hearing / What Is Ototoxicity? Spring 2016 ...

  12. When Should I Make Preservation Copies of Myself?

    CERN Document Server

    Cartledge, Charles L

    2012-01-01

    We investigate how different preservation policies ranging from least aggressive to Most aggressive affect the level of preservation achieved by autonomic processes used by smart digital objects (DOs). The mechanisms used to support preservation across different hosts can be used for automatic link generation and support preservation activities by moving data preservation from an archive centric perspective to a data centric preservation. Based on simulations of small-world graphs of DOs created using the Unsupervised Small-World algorithm, we report quantitative and qualitative results for graphs ranging in size from 10 to 5000 DOs. Our results show that a Most aggressive preservation policy makes the best use of distributed host resources while using one half of the number of messages of a Moderately aggressive preservation policy.

  13. Development of an oxygen carrier nanoemulsion for organ preservation

    CSIR Research Space (South Africa)

    Barnard, A

    2010-08-31

    Full Text Available The current key development focus in organ preservation for transplant purposes is preservation of organs at normothermic or subnormothermic temperatures (i.e at or slightly below physiological temperature) as opposed to cold storage. The current...

  14. Challenges of digital preservation in federal University libraries in ...

    African Journals Online (AJOL)

    The study revealed that the predominant challenges militating against successful preservation of digital information resources were lack of digital preservation policy inadequate power supply, unskilled professionals, technological obsolescence, poor maintenance culture, technophobia, storage media degradation, ...

  15. Preservation of the Larynx in Laryngeal and Hypopharyngeal Cancer

    NARCIS (Netherlands)

    A. Sewnaik (Aniel)

    2006-01-01

    textabstractIn the last decade the primary treatment of laryngeal and hypopharyngeal cancer was shifted towards organ preservation, i.e. preservation of the larynx. The treatment of laryngeal cancer was changed from standard radiotherapy towards hyperfractionated radiotherapy. Hypopharyngeal

  16. The ultrastructural characteristics of porcine hepatocytes donated after cardiac death and preserved with warm machine perfusion preservation.

    Science.gov (United States)

    Bochimoto, Hiroki; Matsuno, Naoto; Ishihara, Yo; Shonaka, Tatsuya; Koga, Daisuke; Hira, Yoshiki; Nishikawa, Yuji; Furukawa, Hiroyuki; Watanabe, Tsuyoshi

    2017-01-01

    The effects of warm machine perfusion preservation of liver grafts donated after cardiac death on the intracellular three-dimensional ultrastructure of the organelles in hepatocytes remain unclear. Here we analyzed comparatively the ultrastructure of the endomembrane systems in porcine hepatocytes under warm ischemia and successive hypothermic and midthermic machine perfusion preservation, a type of the warm machine perfusion. Porcine liver grafts which had a warm ischemia time of 60 minutes were perfused for 4 hours with modified University of Wisconsin gluconate solution. Group A grafts were preserved with hypothermic machine perfusion preservation at 8°C constantly for 4 hours. Group B grafts were preserved with rewarming up to 22°C by warm machine perfusion preservation for 4 hours. An analysis of hepatocytes after 60 minutes of warm ischemia by scanning electron microscope revealed the appearance of abnormal vacuoles and invagination of mitochondria. In the hepatocytes preserved by subsequent hypothermic machine perfusion preservation, strongly swollen mitochondria were observed. In contrast, the warm machine perfusion preservation could preserve the functional appearance of mitochondria in hepatocytes. Furthermore, abundant vacuoles and membranous structures sequestrating cellular organelles like autophagic vacuoles were frequently observed in hepatocytes after warm machine perfusion preservation. In conclusion, the ultrastructure of the endomembrane systems in the hepatocytes of liver grafts changed in accordance with the temperature conditions of machine perfusion preservation. In addition, temperature condition of the machine perfusion preservation may also affect the condition of the hepatic graft attributed to autophagy systems, and consequently alleviate the damage of the hepatocytes.

  17. Multi-Level Privacy Preservation Using Rotation Perturbation

    OpenAIRE

    R.PraveenaPriyadarsini; Dr. M.L. VALARMATHI; Dr.S.Sivakumari

    2014-01-01

    As the amount of data available and shared in the electronic media increases, the threat for its privacy and security also increases. Every organization publishes its data to many recipients for various reasons .Thus preserving the privacy of data during the process of data mining is the aim of Privacy Preserving Data Mining [PPDM]. Multi-trust level is a scenario in privacy preserving data mining where different versions of privacy preserved data are distributed to the users based on their t...

  18. Static analysis of topology-dependent broadcast networks

    DEFF Research Database (Denmark)

    Nanz, Sebastian; Nielson, Flemming; Nielson, Hanne Riis

    2010-01-01

    changing network topology is a crucial ingredient. In this paper, we develop a static analysis that automatically constructs an abstract transition system, labelled by actions and connectivity information, to yield a mobility-preserving finite abstraction of the behaviour of a network expressed...

  19. Implementing digital preservation in repositories: Knowledge and practices

    Directory of Open Access Journals (Sweden)

    Caterina Groposo Pavão

    2016-09-01

    Full Text Available Digital preservation has to be undertaken by institutional repositories, which are responsible for the preservation of the scientific output from academic institutions. However, due to the constant evolution of the field, to gain domain knowledge and recognise best practices is a complex task for people responsible for digital preservation in those institutions. Digital preservation research, practices and solutions address specific problems, such as formats, curation, reference models, authenticity, policies and preservation plans, tools, etc., while stakeholders need an integrated, contextualized and applicable overview. This paper focuses on the implementation of digital preservation in repositories, from the perspective of the team responsible for the project, regarding the necessary knowledge and best practices. Initially, it defines and contextualizes digital preservation repositories. The following section presents a conceptual model of digital preservation, synthesized from conceptual models developed in influential projects in the field, which allows us to identify the domain knowledge in digital preservation. Finally, aspects represented in the model are discussed in the light of the performance of teams implementing digital preservation repositories. It provides recommendations, guides and examples that may be useful for the implementation of digital preservation. It points to the need to strengthen the relationship between domain knowledge in digital preservation repositories with practices developed in numerous projects developed worldwide.

  20. Efficacy of copper borax preservative against wood decay

    Science.gov (United States)

    William Abbott; Bessie Woodward; Michael West

    2001-01-01

    In this study, a wood preservative containing active ingredients of 43.5% borax and 3.1% copper hydroxide was evaluated in soil-block tests in accordance with AWPA E10. Results suggested thatthe copper hydroxide was not contributing to fungal toxicity at preservative threshold levels. Thresholds determined for this preservative were very close to those previously...

  1. Perception of library staff on the preservation and conservation of ...

    African Journals Online (AJOL)

    The result also indicated high useful on the perceived usefulness of preservation of printed materials in the library. Availability of fire extinguisher in each unit was rated high as one of the preservative measure in place in the library. The challenges faced were lack of preservation policy as well as lack of funding to purchase ...

  2. Preserving South Africa's Paper Trail and Making Public Records ...

    African Journals Online (AJOL)

    Access to public records and archives in South Africa is diminishing rapidly largely due to inadequate preservation strategies and a dearth of knowledge of archival preservation techniques. Inadequate attention is being paid to preservation as a collection management strategy. Continued access to South African archives is ...

  3. Interconnected networks

    CERN Document Server

    2016-01-01

    This volume provides an introduction to and overview of the emerging field of interconnected networks which include multi layer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave – understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant – for example regarding diffusion, robustness and competition – the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.

  4. Coping with Algebraic Constraints in Power Networks

    NARCIS (Netherlands)

    Monshizadeh, Nima; De Persis, Claudio; van der Schaft, Abraham; Scherpen, Jacquelien M.A.

    2016-01-01

    In the intuitive modelling of the power network, the generators and the loads are located at different subset of nodes. This corresponds to the so-called structure preserving model which is naturally expressed in terms of differential algebraic equations (DAE). The algebraic constraints in the

  5. Towards a Standard for Provenance and Context for Preservation of Data for Earth System Science

    Science.gov (United States)

    Ramapriyan, H. K.; Moses, J. F.

    2011-12-01

    Long-term data sets with data from many missions are needed to study trends and validate model results that are typical in Earth System Science research. Data and derived products originate from multiple missions (spaceborne, airborne and/or in situ) and from multiple organizations. During the missions as well as well past their termination, it is essential to preserve the data and products to support future studies. Key aspects of preservation are: preserving bits and ensuring data are uncorrupted, preserving understandability with appropriate documentation, and preserving reproducibility of science with appropriate documentation and other artifacts. Computer technology provides adequate standards to ensure that, with proper engineering, bits are preserved as hardware evolves. However, to ensure understandability and reproducibility, it is essential to plan ahead to preserve all the relevant data and information. There are currently no standards to identify the content that needs to be preserved, leading to non-uniformity in content and users' not being sure of whether preserved content is comprehensive. Each project, program or agency can specify the items to be preserved as a part of its data management requirements. However, broader community consensus that cuts across organizational or national boundaries would be needed to ensure comprehensiveness, uniformity and long-term utility of archived data. The Federation of Earth Science Information Partners (ESIP), a diverse network of scientists, data stewards and technology developers, has a forum for ESIP members to collaborate on data preservation issues. During early 2011, members discussed the importance of developing a Provenance and Context Content Standard (PCCS) and developed an initial list of content items. This list is based on the outcome of a NASA and NOAA meeting held in 1998 under the auspices of the USGCRP, documentation requirements from NOAA and our experience with some of the NASA Earth science

  6. Preserving urban objects of historicaland architectural heritage

    Directory of Open Access Journals (Sweden)

    Bal'zannikova Ekaterina Mikhailovna

    2014-01-01

    Full Text Available Large cities of central Russia were built under the influence of the factors that played an important role in protecting their population; natural resources and opportunities for trading were also essential. The industrial development and construction of large industrial facilities were significant for the formation of urban environment. As a result architectural monuments of great historical value that have a significant influence on the formation of the modern city image were preserved.Nowadays, a great number of buildings of historical and architectural heritage turned out to be in poor condition. Funding and its efficient use are rational means of saving the most valuable objects of historical and cultural heritage. In order to do this it is necessary to solve the problems of developing complex and effective measures for preserving these objectsThe existing method of preserving urban objects does not focus on urban architectural objects of historical and architectural value. It does not cover the study of urban development features in architectural and town-planning environment surrounding this object, it does not determine the historical and architectural value of the object and it does not identify the relationship of the object and the surrounding objects as well as architectural frame of the total area. That is why the existing method cannot be considered an appropriate system for preserving the objects of historical and architectural heritage.In order to avoid the disadvantages mentioned above and to increase tourist interest to the architecturally valuable buildings in urban areas, the author has proposed a complex approach to improve the method of reconstructing urban objects of great historical and architectural significance.The existing method of preserving historical objects includes the preparatory period of studying the degree of historical and architectural heritage wear and decay, developing the techniques for strengthening

  7. Hearing Preservation Among Patients Undergoing Cochlear Implantation

    Science.gov (United States)

    Van Abel, Kathryn M.; Dunn, Camille C.; Sladen, Douglas P.; Oleson, Jacob J.; Beatty, Charles W.; Neff, Brian A.; Hansen, Marlan; Gantz, Bruce J.; Driscoll, Colin L. W.

    2015-01-01

    Introduction Despite successful preservation of low-frequency hearing in patients undergoing cochlear implantation (CI) with shorter electrode lengths, there is still controversy regarding which electrodes maximize hearing preservation (HP). The thin straight electrode array (TSEA) has been suggested as a full cochlear coverage option for HP. However, very little is known regarding its HP potential. Methods A retrospective review was performed at two tertiary academic medical centers, reviewing the electronic records for 52 patients (mean, 58.2 yr; range, 11–85 yr) implanted with the Cochlear Nucleus CI422 Slim Straight (Centennial, CO, USA) electrode array, referred to herein as the thin straight electrode array or TSEA. All patients had a preoperative low-frequency pure-tone average (LFPTA) of 85 dB HL or less. Hearing thresholds were measured at initial activation (t1) and 6 months after activation (t2). HP was assessed by evaluating functional HP using a cutoff level of 85 dB HL PTA. Results At t1, 54% of the subjects had functional hearing; 33% of these subjects had an LFPTA between 71 and 85 dB HL, and 17% had an LFPTA between 56 and 70 dB HL. At t2, 47% of the patients had functional hearing, with 31% having an LFPTA between 71 and 85 dB HL. Discussion Preliminary research suggests that the TSEA has the potential to preserve functional hearing in 54% of patients at t1. However, 22% (n = 6) of the patients who had functional hearing at t1 (n = 28) lost their hearing between t1 and t2. Further studies are needed to evaluate factors that influence HP with the TSEA electrode and determine the speech perception benefits using electric and acoustic hearing over electric alone. PMID:25575373

  8. Color to gray: visual cue preservation.

    Science.gov (United States)

    Song, Mingli; Tao, Dacheng; Chen, Chun; Li, Xuelong; Chen, Chang Wen

    2010-09-01

    Both commercial and scientific applications often need to transform color images into gray-scale images, e.g., to reduce the publication cost in printing color images or to help color blind people see visual cues of color images. However, conventional color to gray algorithms are not ready for practical applications because they encounter the following problems: 1) Visual cues are not well defined so it is unclear how to preserve important cues in the transformed gray-scale images; 2) some algorithms have extremely high time cost for computation; and 3) some require human-computer interactions to have a reasonable transformation. To solve or at least reduce these problems, we propose a new algorithm based on a probabilistic graphical model with the assumption that the image is defined over a Markov random field. Thus, color to gray procedure can be regarded as a labeling process to preserve the newly well--defined visual cues of a color image in the transformed gray-scale image. Visual cues are measurements that can be extracted from a color image by a perceiver. They indicate the state of some properties of the image that the perceiver is interested in perceiving. Different people may perceive different cues from the same color image and three cues are defined in this paper, namely, color spatial consistency, image structure information, and color channel perception priority. We cast color to gray as a visual cue preservation procedure based on a probabilistic graphical model and optimize the model based on an integral minimization problem. We apply the new algorithm to both natural color images and artificial pictures, and demonstrate that the proposed approach outperforms representative conventional algorithms in terms of effectiveness and efficiency. In addition, it requires no human-computer interactions.

  9. Nisin as a model food preservative.

    Science.gov (United States)

    Hansen, J N

    1994-01-01

    Nisin is a ribosomally synthesized peptide that has broad-spectrum antibacterial activity, including activity against many bacteria that are food-spoilage pathogens. Nisin is produced as a fermentation product of a food-grade bacterium, and the safety and efficacy of nisin as a food preservative have resulted in its widespread use throughout the world, including the U.S. Nisin is a member of the class of antimicrobial substances known as lantibiotics, so called because they contain the unusual amino acid lanthionine. Lantibiotics, in general, have considerable promise as food preservatives, although only nisin has been sufficiently well characterized to be used for this purpose. As the number of known natural lantibiotics has increased and their useful characteristics have been explored, it has become desirable to synthesize structural analogs of nisin and other lantibiotics that do not occur naturally. The fact that lantibiotics are gene-encoded peptides synthesized by transcription and translation allows structural variants to be generated by mutagenesis. This review focuses on the progress that has been made in the construction and biological expression of genetically engineered nisin structural analogs. For example, a host-vector pair has been engineered that permits the construction of mutants of the structural gene for subtilin, which is a naturally occurring structural analog of nisin. The vector is designed in such a way that the mutant gene can be substituted for the natural subtilin gene in the chromosome of Bacillus subtilis, which in turn directs the transcription, translation, posttranslational modifications, and secretion of the mature form of the structural analog. Several structural analogs have been constructed, and their properties have provided insight into some of the structure-function relationships in lantibiotics, as well as their mechanism of antimicrobial action. These advances are assessed together with potential problems in the future

  10. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  11. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  12. Mass Preserving Registration for lung CT

    DEFF Research Database (Denmark)

    Gorbunova, Vladlena; Lo, Pechin Chien Pau; Loeve, Martin

    2009-01-01

    intensities due to differences in inspiration level, we propose to adjust the intensity of lung tissue according to the local expansion or compression. An image registration method without intensity adjustment is compared to the proposed method. Both approaches are evaluated on a set of 10 pairs of expiration...... and inspiration CT scans of children with cystic fibrosis lung disease. The proposed method with mass preserving adjustment results in significantly better alignment of the vessel trees. Analysis of local volume change for regions with trapped air compared to normally ventilated regions revealed larger...

  13. Preserved musical semantic memory in semantic dementia.

    Science.gov (United States)

    Weinstein, Jessica; Koenig, Phyllis; Gunawardena, Delani; McMillan, Corey; Bonner, Michael; Grossman, Murray

    2011-02-01

    To understand the scope of semantic impairment in semantic dementia. Case study. Academic medical center. A man with semantic dementia, as demonstrated by clinical, neuropsychological, and imaging studies. Music performance and magnetic resonance imaging results. Despite profoundly impaired semantic memory for words and objects due to left temporal lobe atrophy, this semiprofessional musician was creative and expressive in demonstrating preserved musical knowledge. Long-term representations of words and objects in semantic memory may be dissociated from meaningful knowledge in other domains, such as music.

  14. Vitrification preserves proliferation capacity in human spermatogonia.

    Science.gov (United States)

    Poels, Jonathan; Van Langendonckt, Anne; Many, Marie-Christine; Wese, François-Xavier; Wyns, Christine

    2013-03-01

    Does vitrification of human immature testicular tissue (ITT) have potential benefits for future fertility preservation? Does vitrification of human ITT have potential benefits in an in vivo murine xenotransplantation model? Vitrification is able to maintain proliferation capacity in spermatogonial cells after 6 months of xenografting. Controlled slow-freezing is the procedure currently applied for ITT cryobanking in clinical practice. Vitrification has been proposed as a promising technique for long-term storage of ITT, with a view to preserving spermatogonial stem cells (SSCs) for future fertility restoration in young boys suffering from cancer. After vitrification of ITT, in vitro survival of SSCs was demonstrated, but their functionality was not evaluated. Ten ITT pieces issuing from 10 patients aged 2-12 years were used. Fragments of fresh tissue (serving as controls) and fresh, frozen-thawed and vitrified-warmed testicular pieces xenografted to the scrotum of nude mice for 6 months were compared. Upon graft removal, histological and immunohistochemical analyses were performed to evaluate spermatogonia (SG) (MAGE-A4), intratubular proliferation (Ki67), proliferating SG and Leydig cells (3β-HSD). The entire piece of grafted tissue was assessed in each case. Seminiferous tubules showed good integrity after cryopreservation and xenografting for 6 months in all three groups. Survival of SG and their ability to proliferate was observed by immunohistochemistry in all grafted groups. SG were able to initiate spermatogenesis, but blockage at the pachytene stage was observed. The recovery rate of SG was 3.4 ± 3.8, 4.1 ± 7.3 and 7.3 ± 6.3%, respectively, for fresh, slow-frozen and vitrified-warmed tissue after 6 months of xenografting. The study is limited by the low availability of ITT samples of human origin. The mouse xenotransplantation model needs to be refined to study human spermatogenesis. The findings of the present study have potential implications for

  15. [Fertility preservation and cancer in the male].

    Science.gov (United States)

    Leyvraz, Recrosio Céline; Vaucher, Laurent; Primi, Marie-Pierre

    2012-12-05

    Improvement in cancer treatments resulted in an increased number of men surviving cancer. Quality of life has become an important issue in these patients. Anti cancer treatments might have transient or definitive harmful effects on male fertility. Sperm cryoconservation is currently the only proven method to preserve fertility in patients undergoing oncologic treatment. It should be proposed to every patient at reproductive age before chemotherapy, radiotherapy or any surgery involving reproductive tract. Despite low use rate, this simple method could allow patients presenting infertility after treatment to father a child.

  16. Fernald Preserve 2015 Site Environmental Report

    Energy Technology Data Exchange (ETDEWEB)

    Voisard, Karen [Navarro Research and Engineering, Oak Ridge, TN (United States); Smiley, Sue [U.S. Department of Energy Office of Legacy Management, Washington, DC (United States)

    2016-05-01

    The Fernald Preserve 2015 Site Environmental Report provides stakeholders with the results from the Fernald, Ohio, Site’s environmental monitoring programs for 2015; a summary of the U.S. Department of Energy’s (DOE’s) activities conducted onsite; and a summary of the Fernald Preserve’s compliance with the various environmental regulations, compliance agreements, and DOE policies that govern site activities. This report has been prepared in accordance with the “Integrated Environmental Monitoring Plan,” which is Attachment D of the Comprehensive Legacy Management and Institutional Controls Plan (LMICP) (DOE 2016).

  17. Mechanism for Burgess Shale-type preservation

    DEFF Research Database (Denmark)

    Gaines, Robert R.; Hammarlund, Emma U.; Hou, Xianguang

    2012-01-01

    soft-bodied fossil assemblages has remained enigmatic since Walcott's initial discovery in 1909. Here, we demonstrate the mechanism of Burgess Shale-type preservation using sedimentologic and geochemical data from the Chengjiang, Burgess Shale, and five other principal Burgess Shale-type deposits....... Sulfur isotope evidence from sedimentary pyrites reveals that the exquisite fossilization of organic remains as carbonaceous compressions resulted from early inhibition of microbial activity in the sediments by means of oxidant deprivation. Low sulfate concentrations in the global ocean and low...

  18. Plasma Technology as a New Preservation Technique

    Science.gov (United States)

    Rincón, R.; Calzada, M. D.

    The preliminary results of using the surface wave discharge at the atmospheric pressure on groups of lentils and sherry Fino wine samples are presented. In this research, the capability of active species and UV radiation from the plasma, has been assessed on preservation of food. Besides, the generation and emission of both excited molecules in a metastable state N2}(B3Π {g-> A3}Σ u{+) and the de-excitation of species NO(A2}Σ {+) producing UV radiation have been also studied.

  19. Summary report on transverse emittance preservation

    Energy Technology Data Exchange (ETDEWEB)

    Chou, W.; Vos, L. [European Organization for Nuclear Research, Geneva (Switzerland)

    1997-12-01

    During the past years, significant progress has been made in understanding the beam transverse emittance blow-up and its preservation. However, one often finds him-/herself ignorant when he/she tries to explain what was observed in an existing machine or to predict what will happen in a machine under design. There are a number of such examples given in this report. Some of them are even fundamental. These are the challenges. But they are also the directions leading to new achievements. The workshop gladly acknowledged them and promised to work on them.

  20. Precise spatial coding is preserved along the longitudinal hippocampal axis.

    Science.gov (United States)

    Keinath, Alexander T; Wang, Melissa E; Wann, Ellen G; Yuan, Robin K; Dudman, Joshua T; Muzzio, Isabel A

    2014-12-01

    Compared with the dorsal hippocampus, relatively few studies have characterized neuronal responses in the ventral hippocampus. In particular, it is unclear whether and how cells in the ventral region represent space and/or respond to contextual changes. We recorded from dorsal and ventral CA1 neurons in freely moving mice exposed to manipulations of visuospatial and olfactory contexts. We found that ventral cells respond to alterations of the visuospatial environment such as exposure to novel local cues, cue rotations, and contextual expansion in similar ways to dorsal cells, with the exception of cue rotations. Furthermore, we found that ventral cells responded to odors much more strongly than dorsal cells, particularly to odors of high valence. Similar to earlier studies recording from the ventral hippocampus in CA3, we also found increased scaling of place cell field size along the longitudinal hippocampal axis. Although the increase in place field size observed toward the ventral pole has previously been taken to suggest a decrease in spatial information coded by ventral place cells, we hypothesized that a change in spatial scaling could instead signal a shift in representational coding that preserves the resolution of spatial information. To explore this possibility, we examined population activity using principal component analysis (PCA) and neural location reconstruction techniques. Our results suggest that ventral populations encode a distributed representation of space, and that the resolution of spatial information at the population level is comparable to that of dorsal populations of similar size. Finally, through the use of neural network modeling, we suggest that the redundancy in spatial representation along the longitudinal hippocampal axis may allow the hippocampus to overcome the conflict between memory interference and generalization inherent in neural network memory. Our results indicate that ventral population activity is well suited for

  1. Data Preservation, Information Preservation, and Lifecyle of Information Management at NASA GES DISC

    Science.gov (United States)

    Khayat, Mo; Kempler, Steve; Deshong, Barbara; Johnson, James; Gerasimov, Irina; Esfandiari, Ed; Berganski, Michael; Wei, Jennifer

    2014-01-01

    Data lifecycle management awareness is common today; planners are more likely to consider lifecycle issues at mission start. NASA remote sensing missions are typically subject to life cycle management plans of the Distributed Active Archive Center (DAAC), and NASA invests in these national centers for the long-term safeguarding and benefit of future generations. As stewards of older missions, it is incumbent upon us to ensure that a comprehensive enough set of information is being preserved to prevent the risk for information loss. This risk is greater when the original data experts have moved on or are no longer available. Preservation of items like documentation related to processing algorithms, pre-flight calibration data, or input-output configuration parameters used in product generation, are examples of digital artifacts that are sometimes not fully preserved. This is the grey area of information preservation; the importance of these items is not always clear and requires careful consideration. Missing important metadata about intermediate steps used to derive a product could lead to serious challenges in the reproducibility of results or conclusions. Organizations are rapidly recognizing that the focus of life-cycle preservation needs to be enlarged from the strict raw data to the more encompassing arena of information lifecycle management. By understanding what constitutes information, and the complexities involved, we are better equipped to deliver longer lasting value about the original data and derived knowledge (information) from them. The NASA Earth Science Data Preservation Content Specification is an attempt to define the content necessary for long-term preservation. It requires new lifecycle infrastructure approach along with content repositories to accommodate artifacts other than just raw data. The NASA Goddard Earth Sciences Data and Information Services Center (GES DISC) setup an open-source Preservation System capable of long-term archive of

  2. Social network sampling using spanning trees

    Science.gov (United States)

    Jalali, Zeinab S.; Rezvanian, Alireza; Meybodi, Mohammad Reza

    2016-12-01

    Due to the large scales and limitations in accessing most online social networks, it is hard or infeasible to directly access them in a reasonable amount of time for studying and analysis. Hence, network sampling has emerged as a suitable technique to study and analyze real networks. The main goal of sampling online social networks is constructing a small scale sampled network which preserves the most important properties of the original network. In this paper, we propose two sampling algorithms for sampling online social networks using spanning trees. The first proposed sampling algorithm finds several spanning trees from randomly chosen starting nodes; then the edges in these spanning trees are ranked according to the number of times that each edge has appeared in the set of found spanning trees in the given network. The sampled network is then constructed as a sub-graph of the original network which contains a fraction of nodes that are incident on highly ranked edges. In order to avoid traversing the entire network, the second sampling algorithm is proposed using partial spanning trees. The second sampling algorithm is similar to the first algorithm except that it uses partial spanning trees. Several experiments are conducted to examine the performance of the proposed sampling algorithms on well-known real networks. The obtained results in comparison with other popular sampling methods demonstrate the efficiency of the proposed sampling algorithms in terms of Kolmogorov-Smirnov distance (KSD), skew divergence distance (SDD) and normalized distance (ND).

  3. Network quotients: structural skeletons of complex systems.

    Science.gov (United States)

    Xiao, Yanghua; MacArthur, Ben D; Wang, Hui; Xiong, Momiao; Wang, Wei

    2008-10-01

    A defining feature of many large empirical networks is their intrinsic complexity. However, many networks also contain a large degree of structural repetition. An immediate question then arises: can we characterize essential network complexity while excluding structural redundancy? In this article we utilize inherent network symmetry to collapse all redundant information from a network, resulting in a coarse graining which we show to carry the essential structural information of the "parent" network. In the context of algebraic combinatorics, this coarse-graining is known as the "quotient." We systematically explore the theoretical properties of network quotients and summarize key statistics of a variety of "real-world" quotients with respect to those of their parent networks. In particular, we find that quotients can be substantially smaller than their parent networks yet typically preserve various key functional properties such as complexity (heterogeneity and hub vertices) and communication (diameter and mean geodesic distance), suggesting that quotients constitute the essential structural skeletons of their parent networks. We summarize with a discussion of potential uses of quotients in analysis of biological regulatory networks and ways in which using quotients can reduce the computational complexity of network algorithms.

  4. Analysis of complex networks using aggressive abstraction.

    Energy Technology Data Exchange (ETDEWEB)

    Colbaugh, Richard; Glass, Kristin.; Willard, Gerald

    2008-10-01

    This paper presents a new methodology for analyzing complex networks in which the network of interest is first abstracted to a much simpler (but equivalent) representation, the required analysis is performed using the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit abstractions that are simultaneously dramatically simplifying and property preserving we call these aggressive abstractions -- and which can therefore be analyzed using the proposed approach. We then introduce and develop two forms of aggressive abstraction: 1.) finite state abstraction, in which dynamical networks with uncountable state spaces are modeled using finite state systems, and 2.) onedimensional abstraction, whereby high dimensional network dynamics are captured in a meaningful way using a single scalar variable. In each case, the property preserving nature of the abstraction process is rigorously established and efficient algorithms are presented for computing the abstraction. The considerable potential of the proposed approach to complex networks analysis is illustrated through case studies involving vulnerability analysis of technological networks and predictive analysis for social processes.

  5. Network Ambivalence

    Directory of Open Access Journals (Sweden)

    Patrick Jagoda

    2015-08-01

    Full Text Available The language of networks now describes everything from the Internet to the economy to terrorist organizations. In distinction to a common view of networks as a universal, originary, or necessary form that promises to explain everything from neural structures to online traffic, this essay emphasizes the contingency of the network imaginary. Network form, in its role as our current cultural dominant, makes scarcely imaginable the possibility of an alternative or an outside uninflected by networks. If so many things and relationships are figured as networks, however, then what is not a network? If a network points towards particular logics and qualities of relation in our historical present, what others might we envision in the future? In  many ways, these questions are unanswerable from within the contemporary moment. Instead of seeking an avant-garde approach (to move beyond networks or opting out of networks (in some cases, to recover elements of pre-networked existence, this essay proposes a third orientation: one of ambivalence that operates as a mode of extreme presence. I propose the concept of "network aesthetics," which can be tracked across artistic media and cultural forms, as a model, style, and pedagogy for approaching interconnection in the twenty-first century. The following essay is excerpted from Network Ambivalence (Forthcoming from University of Chicago Press. 

  6. Epidemic spreading on complex networks with community structures

    CERN Document Server

    Stegehuis, Clara; van Leeuwaarden, Johan S H

    2016-01-01

    Many real-world networks display a community structure. We study two random graph models that create a network with similar community structure as a given network. One model preserves the exact community structure of the original network, while the other model only preserves the set of communities and the vertex degrees. These models show that community structure is an important determinant of the behavior of percolation processes on networks, such as information diffusion or virus spreading: the community structure can both \\textit{enforce} as well as \\textit{inhibit} diffusion processes. Our models further show that it is the mesoscopic set of communities that matters. The exact internal structures of communities barely influence the behavior of percolation processes across networks. This insensitivity is likely due to the relative denseness of the communities.

  7. Comparison of methods of preserving tissues for pesticide analysis.

    Science.gov (United States)

    Stickel, W H; Stickel, L F; Dyrland, R A; Hughes, D L

    1984-06-01

    Formalin preservation, freezing, spoiling followed by freezing, and phenoxyethanol were compared in terms of concentrations of DDT, DDD, DDE, endrin, and heptachlor epoxide measured in brain, liver and carcass of birds fed dietary dosages of pesticides and in spiked egg homogenate. Phenoxyethanol proved to be an unsatisfactory preservative; the amount of 'extractable lipid' was excessive, and measurements of concentrations in replicates were erratic. Concentrations of residues in formalin-preserved and frozen samples did not differ significantly in any tissue. Percentage lipid in brains and eggs, however, were significantly lower in formalin-preserved samples. Samples of muscle and liver that had been spoiled before freezing yielded less DDD, and muscle samples yielded more DDT than formalin-preserved samples. We conclude that formalin preservation is a satisfactory method for preservation of field samples and that the warming and spoiling of samples that may occur unavoidably in the field will not result in misleading analytical results.

  8. Network neuroscience.

    Science.gov (United States)

    Bassett, Danielle S; Sporns, Olaf

    2017-02-23

    Despite substantial recent progress, our understanding of the principles and mechanisms underlying complex brain function and cognition remains incomplete. Network neuroscience proposes to tackle these enduring challenges. Approaching brain structure and function from an explicitly integrative perspective, network neuroscience pursues new ways to map, record, analyze and model the elements and interactions of neurobiological systems. Two parallel trends drive the approach: the availability of new empirical tools to create comprehensive maps and record dynamic patterns among molecules, neurons, brain areas and social systems; and the theoretical framework and computational tools of modern network science. The convergence of empirical and computational advances opens new frontiers of scientific inquiry, including network dynamics, manipulation and control of brain networks, and integration of network processes across spatiotemporal domains. We review emerging trends in network neuroscience and attempt to chart a path toward a better understanding of the brain as a multiscale networked system.

  9. Organizational Networks

    DEFF Research Database (Denmark)

    Grande, Bård; Sørensen, Ole Henning

    1998-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept of organizational network are identified and critically discussed. Special focus is placed on how information and communication technologies as communication mediators and cognitive pictures influence...

  10. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data...... research community. With this workshop, participants were offered a way into network science based on authentic educational research data. The workshop was constructed as an inquiry lesson with emphasis on user autonomy. Learning activities had participants choose to work with one of two cases of networks...... network methodology in one’s research might supersede the perceived benefits of doing so. As a response to that problem, we argue that workshops can act as a road towards meaningful engagement with networks and highlight that network methodology promises new ways of interpreting data to answer questions...

  11. Preserved and impaired emotional memory in Alzheimer's disease

    Directory of Open Access Journals (Sweden)

    Yanica eKlein-Koerkamp

    2012-09-01

    Full Text Available Patients with early atrophy of both limbic structures involved in memory and emotion processing in Alzheimer’s disease (AD provide a unique clinical population for investigating how emotion is able to modulate retention processes. This review focuses on the emotional enhancement effect (EEE, defined as the improvement of memory for emotional events compared with neutral ones. The assessment of the EEE for different memory systems in AD suggests that the EEE could be preserved under specific retrieval instructions. The first part of this review examines these data in light of compelling evidence that the amygdala can modulate processes of hippocampus-dependent memory. We argue that the EEE could be a useful paradigm to reduce impairment in episodic memory tasks. In the second part, we discuss theoretical consequences of the findings in favor of an EEE, according to which a compensatory mechanism in patients with AD solicits greater amygdala functioning or additional networks, even when amygdala atrophy is present. These considerations emphasize the relevance of investigating patients with AD to understand the relationship between emotion and memory processes.

  12. Privacy-Preserving Task Assignment in Spatial Crowdsourcing

    KAUST Repository

    Liu, An

    2017-09-20

    With the progress of mobile devices and wireless networks, spatial crowdsourcing (SC) is emerging as a promising approach for problem solving. In SC, spatial tasks are assigned to and performed by a set of human workers. To enable effective task assignment, however, both workers and task requesters are required to disclose their locations to untrusted SC systems. In this paper, we study the problem of assigning workers to tasks in a way that location privacy for both workers and task requesters is preserved. We first combine the Paillier cryptosystem with Yao’s garbled circuits to construct a secure protocol that assigns the nearest worker to a task. Considering that this protocol cannot scale to a large number of workers, we then make use of Geohash, a hierarchical spatial index to design a more efficient protocol that can securely find approximate nearest workers. We theoretically show that these two protocols are secure against semi-honest adversaries. Through extensive experiments on two real-world datasets, we demonstrate the efficiency and effectiveness of our protocols.

  13. Technological Strategies to Preserve Burrata Cheese Quality

    Directory of Open Access Journals (Sweden)

    Cristina Costa

    2017-07-01

    Full Text Available Burrata cheese is a very perishable product due to microbial proliferation and undesirable sensory changes. In this work, a step-by-step optimization approach was used to design proper processing and packaging conditions for burrata in brine. In particular, four different steps were carried out to extend its shelf life. Different headspace gas compositions (MAP-1 30:70 CO2:N2; MAP-2 50:50 CO2:N2 and MAP-3 65:35 CO2:N2 were firstly tested. To further promote product preservation, a coating was also optimized. Then, antimicrobial compounds in the filling of the burrata cheese (lysozyme and Na2-EDTA and later in the coating (enzymatic complex and silver nanoparticles were analyzed. To evaluate the quality of the samples, in each step headspace gas composition, microbial population, and pH and sensory attributes were monitored during storage at 8 ± 1 °C. The results highlight that the antimicrobial compounds in the stracciatella, coating with silver nanoparticles, and packaging under MAP-3 represent effective conditions to guarantee product preservation, moving burrata shelf life from three days (control sample to ten days.

  14. Privacy-preserving heterogeneous health data sharing.

    Science.gov (United States)

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-05-01

    Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis.

  15. Endothelium Preserving Microwave Treatment for Atherosclerosis

    Science.gov (United States)

    Carl, James R. (Inventor); Arndt, G. Dickey (Inventor); Fink, Patrick W. (Inventor); Beer, N. Reginald (Inventor); Henry, Phillip D. (Inventor); Pacifico, Antonio (Inventor); Raffoul, George W. (Inventor)

    2001-01-01

    Method and apparatus are provided to treat atherosclerosis wherein the artery is partially closed by dilating the artery while preserving the vital and sensitive endothelial layer thereof. Microwave energy having a frequency from 3 GHz to 300 GHz is propagated into the arterial wall to produce a desired temperature profile therein at tissue depths sufficient for thermally necrosing connective tissue and softening fatty and waxy plaque while limiting heating of surrounding tissues including the endothelial layer and/or other healthy tissue, organs, and blood. The heating period for raising the temperature a potentially desired amount, about 20 C. within the atherosclerotic lesion may be less than about one second. In one embodiment of the invention, a radically beveled waveguide antenna is used to deliver microwave energy at frequencies from 25 GHz or 30 GHz to about 300 GHz and is focused towards a particular radial sector of the artery. Because the atherosclerotic lesions are often asymmetrically disposed directable or focussed heating preserves healthy sectors of the artery and applies energy to the asymmetrically positioned lesion faster than a non-directed beam. A computer simulation predicts isothermic temperature profiles for the given conditions and may be used in selecting power, pulse duration, beam width, and frequency of operation to maximize energy deposition and control heat rise within the atherosclerotic lesion without harming healthy tissues or the sensitive endothelium cells.

  16. Endothelium Preserving Microwave Treatment for Atherosclerois

    Science.gov (United States)

    Carl, James R. (Inventor); Arndt, G. Dickey (Inventor); Fink, Patrick W. (Inventor); Beer, N. Reginald (Inventor); Henry, Phillip D. (Inventor); Pacifico, Antonio (Inventor); Raffoul, George W. (Inventor)

    2001-01-01

    Method and apparatus are provided to treat atherosclerosis wherein the artery is partially closed by dilating the artery while preserving the vital and sensitive endothelial layer thereof. Microwave energy having a frequency from 3 GHz to 300 GHz is propagated into the arterial wall to produce a desired temperature profile therein at tissue depths sufficient for thermally necrosing connective tissue and softening fatty and waxy plaque while limiting heating of surrounding tissues including the endothelial layer and/or other healthy tissue, organs, and blood. The heating period for raising the temperature a potentially desired amount about 20 C, with the atherosclerotic lesion may be less than about one second. In one embodiment of the invention, a radically beveled waveguide antenna is used to deliver microwave energy at frequencies from 25 GHz or 30 GHz to about 300 GHz and is focused towards a particular radical sector of the artery. Because the atherosclerotic lesions are often asymmetrically disposed, directable or focussed heating preserves healthy sectors of the artery and applies energy to the asymmetrically positioned lesion faster than a non-directed beam. A computer simulation predicts isothermic temperature profiles for the given conditions and may be used in selecting power, pulse duration, beam width, and frequency of operation to maximize energy deposition and control heat rise within the atherosclerotic lesion without harming healthy tissues or the sensitive endothelium cells.

  17. BREASTFEEDING AS AN ENVIRONMENT PRESERVING FACTOR

    Directory of Open Access Journals (Sweden)

    Lucas Amaral Martins

    2012-03-01

    Full Text Available OBJECTIVES: to determine the knowledge on breastfeeding acquired by women during the pregnant and puerperal period and to check if the breastfeeding benefits for the environment preservation were referred by the mothers. METHODS: this is a documental, descriptive and quantitative by nature research, with secondary data, collected from records of “Vamos amamentar, mamãe?” ("Let's breastfeed, mom?" extension project, resultant from the mothers monitoring during the 2008 year, with a total of 116 mothers. RESULTS: most mothers are in the age group from 14 to 18 years (31.89%; 57.75% have only primary level; 62.06% have stable relationship/married; 92.24% report having received information about breastfeeding during prenatal care, among which the highlights were: exclusive breastfeeding until 6 months (45.68%; pregnant women feeding (47.41%; breasts care 28 (24.13%, while: milking, myths’ clarification and non-use of bottles and pacifiers each submitted, only (0.86%, noting also that breastfeeding as an environment preservation factor was not mentioned. CONCLUSION: the mothers hold a reasonable knowledge of breastfeeding. Health professionals have an important role in stimulating and implementing new works focused on a practice that considers this subject from a multidimensional perspective, considering the complex bio-psycho-socio-culturalenvironmental-emotional factors involving breastfeeding.

  18. Breastfeeding as an environment preserving facto

    Directory of Open Access Journals (Sweden)

    Lucas Amaral Martins

    2012-01-01

    Full Text Available OBJECTIVES: to determine the knowledge on breastfeeding acquired by women during the pregnant and puerperal period and to check if the breastfeeding benefits for the environment preservation were referred by the mothers. METHODS: this is a documental, descriptive and quantitative by nature research, with secondary data, collected from records of “Vamos amamentar, mamãe?” ("Let's breastfeed, mom?" extension project, resultant from the mothers monitoring during the 2008 year, with a total of 116 mothers. RESULTS: most mothers are in the age group from 14 to 18 years (31.89%; 57.75% have only primary level; 62.06% have stable relationship/married; 92.24% report having received information about breastfeeding during prenatal care, among which the highlights were: exclusive breastfeeding until 6 months (45.68%; pregnant women feeding (47.41%; breasts care 28 (24.13%, while: milking, myths’ clarification and non-use of bottles and pacifiers each submitted, only (0.86%, noting also that breastfeeding as an environment preservation factor was not mentioned. CONCLUSION: the mothers hold a reasonable knowledge of breastfeeding. Health professionals have an important role in stimulating and implementing new works focused on a practice that considers this subject from a multidimensional perspective, considering the complex bio-psycho-socio-cultural-environmental-emotional factors involving breastfeeding.

  19. On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme

    Science.gov (United States)

    Zhang, Qianli; Wang, Jilong; Li, Xing

    Traffic traces are generally anonymized before used in analysis. Prefix-preserving anonymization is often used to avoid privacy issues as well as preserve prefix relationship after anonymization. To facilitate research on real time high speed network traffic, address anonymization algorithm should be fast and consistent. In this paper, the bit string based algorithm and the embedded bit string algorithm will be introduced. Bit string based algorithm uses precomputed bit string to improve the anonymization performance. Instead of only using the LSB of each Rijndael output, the embedded bit string algorithm will take advantage of the full size Rijndael output to anonymize several bits at the same time. The implementation can be downloaded from https://sourceforge.net/projects/ipanon.

  20. Efficient Secure and Privacy-Preserving Route Reporting Scheme for VANETs

    Science.gov (United States)

    Zhang, Yuanfei; Pei, Qianwen; Dai, Feifei; Zhang, Lei

    2017-10-01

    Vehicular ad-hoc network (VANET) is a core component of intelligent traffic management system which could provide various of applications such as accident prediction, route reporting, etc. Due to the problems caused by traffic congestion, route reporting becomes a prospective application which can help a driver to get optimal route to save her travel time. Before enjoying the convenience of route reporting, security and privacy-preserving issues need to be concerned. In this paper, we propose a new secure and privacy-preserving route reporting scheme for VANETs. In our scheme, only an authenticated vehicle can use the route reporting service provided by the traffic management center. Further, a vehicle may receive the response from the traffic management center with low latency and without violating the privacy of the vehicle. Experiment results show that our scheme is much more efficiency than the existing one.

  1. Social Networks

    OpenAIRE

    Martí, Joan; Zenou, Yves

    2009-01-01

    We survey the literature on social networks by putting together the economics, sociological and physics/applied mathematics approaches, showing their similarities and differences. We expose, in particular, the two main ways of modeling network formation. While the physics/applied mathematics approach is capable of reproducing most observed networks, it does not explain why they emerge. On the contrary, the economics approach is very precise in explaining why networks emerge but does a poor jo...

  2. Network Coding

    Indian Academy of Sciences (India)

    Network coding is a technique to increase the amount of information °ow in a network by mak- ing the key observation that information °ow is fundamentally different from commodity °ow. Whereas, under traditional methods of opera- tion of data networks, intermediate nodes are restricted to simply forwarding their incoming.

  3. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  4. Local resource based approach to maintaining and preserving rural local access roads assets: Siyatentela institutional framework and governance case study discourses

    CSIR Research Space (South Africa)

    Chakwizira, J

    2010-10-01

    Full Text Available sector (Chakwizira et al, 2008)  4th SARF / IRF Regional Conference for Africa"Preserving Africa's Road Network" 11 - 13 October 2010 ISBN: 978-1-920017-50-7 Somerset West, Cape Town, South Africa105 The History of Local Resource Based Approach... of Peru World Bank (2008) Transport business Strategy (2008-2012) Washington DC    4th SARF / IRF Regional Conference for Africa "Preserving Africa's Road Network" 11 - 13 October 2010 ISBN: 978-1-920017-50-7 Somerset West, Cape Town, South Africa...

  5. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  6. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  7. Seniors' self-preservation by maintaining established self and defying deterioration - A grounded theory.

    Science.gov (United States)

    Eriksson, Jeanette Källstrand; Hildingh, Cathrine; Buer, Nina; Thulesius, Hans

    2016-01-01

    The purpose of this classic grounded theory study was to understand how seniors who are living independently resolve issues influenced by visual impairment and high fall risk. We interviewed and observed 13 seniors with visual impairment in their homes. We also interviewed six visual instructors with experience from many hundreds of relevant incidents from the same group of seniors. We found that the seniors are resolving their main concern of "remaining themselves as who they used to be" by self-preservation. Within this category, the strategies maintaining the established self and defying deterioration emerged as the most prominent in our data. The theme maintaining the established self is mostly guided by change inertia and includes living the past (retaining past activities, reminiscing, and keeping the home intact) and facading (hiding impairment, leading to avoidance of becoming a burden and to risk juggling). Defying deterioration is a proactive scheme and involves moving (by exercising, adapting activities, using walking aids, driving), adapting (by finding new ways), and networking by sustaining old support networks or finding new networks. Self-preservation is generic human behavior and modifying this theory to other fields may therefore be worthwhile. In addition, health care providers may have use for the theory in fall preventive planning.

  8. La Serra d'Almos (Tarragona): an example of phenological data rescue and preservation in Catalonia

    Science.gov (United States)

    Busto, Montserrat; Cunillera, Jordi; de Yzaguirre, Xavi; Borrell, Josep

    2016-04-01

    The interruption of important phenological series and the progressive disappearance of phenological observations in Catalonia led the Meteorological Service of Catalonia (SMC) to design and impulse a new phenological network promoted by the Climate Change Unit of this Met Service. The "Fenocat" network was born in March 2013, and currently has around fifty observers distributed throughout Catalonia that observe plants, birds and butterflies. We are providing data from different plant phenophases to PEP725 database. Besides this new phenological network (Fenocat), one of the aims of SMC is to rescue and preserve historical data from different observation points in Catalonia. We show in this poster the example of rescue and preservation of phenological data from la Serra d'Almos (in Tivissa, near Tarragona, Catalonia, NE Iberian Peninsula), an observation series that began in 1973. After digitalization process and quality control tasks, we show preliminary results of this phenological series, and we compare them with those of similar European series. We show the evolution trends for different observed species, such as almond tree (Prunus dulcis), hazel (Corylus avellana), plum (Prunus domestica), olive tree (Olea europea), apple tree (Malus domestica) or vineyard (Vitis vinifera).

  9. Seniors’ self-preservation by maintaining established self and defying deterioration – A grounded theory

    Directory of Open Access Journals (Sweden)

    Jeanette Källstrand Eriksson

    2016-05-01

    Full Text Available The purpose of this classic grounded theory study was to understand how seniors who are living independently resolve issues influenced by visual impairment and high fall risk. We interviewed and observed 13 seniors with visual impairment in their homes. We also interviewed six visual instructors with experience from many hundreds of relevant incidents from the same group of seniors. We found that the seniors are resolving their main concern of “remaining themselves as who they used to be” by self-preservation. Within this category, the strategies maintaining the established self and defying deterioration emerged as the most prominent in our data. The theme maintaining the established self is mostly guided by change inertia and includes living the past (retaining past activities, reminiscing, and keeping the home intact and facading (hiding impairment, leading to avoidance of becoming a burden and to risk juggling. Defying deterioration is a proactive scheme and involves moving (by exercising, adapting activities, using walking aids, driving, adapting (by finding new ways, and networking by sustaining old support networks or finding new networks. Self-preservation is generic human behavior and modifying this theory to other fields may therefore be worthwhile. In addition, health care providers may have use for the theory in fall preventive planning.

  10. The Distributed Network Processor: a novel off-chip and on-chip interconnection network architecture

    OpenAIRE

    Biagioni, Andrea; Cicero, Francesca Lo; Lonardo, Alessandro; Paolucci, Pier Stanislao; Perra, Mersia; Rossetti, Davide; Sidore, Carlo; Simula, Francesco; Tosoratto, Laura; Vicini, Piero

    2012-01-01

    One of the most demanding challenges for the designers of parallel computing architectures is to deliver an efficient network infrastructure providing low latency, high bandwidth communications while preserving scalability. Besides off-chip communications between processors, recent multi-tile (i.e. multi-core) architectures face the challenge for an efficient on-chip interconnection network between processor's tiles. In this paper, we present a configurable and scalable architecture, based on...

  11. Structure Preserving Anonymization of Router Configuration Data

    Science.gov (United States)

    2009-04-01

    evaluation and a new cryptography -based scheme,” in Proc. International Conference on Network Protocols, October 2002. [7] Y. Rekhter, B. Moskowitz, D...Sweeney, “k-anonymity: a model for protecting privacy,” Interna- tional Journal on Uncertainty, Fuzziness and Knowledge-based Sys- tems,, vol. 10, no

  12. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  13. Preservation of fertility in nature and ART.

    Science.gov (United States)

    Gosden, Roger; Nagano, Makoto

    2002-01-01

    Individuals may regard reproduction as optional but sufficient number of them must be productive to perpetuate the species. The reproductive system is surprisingly vulnerable and depends, among other things, on a limited endowment of oocytes, controlled proliferation of spermatogonial stem cells and the genetic integrity of both. The developmental competence of oocytes and spermatogonial stem cells is maintained by evolved mechanisms for cellular detoxification and genomic stability, and excess or damaged cells are eliminated by apoptosis. Gonadal failure as a result of germ cell depletion can occur at any age, and from the effects of chemical cytotoxicity, disease and infection as well as genetic predisposition. Among extrinsic factors, alkylating agents and ionizing radiation are important causes of iatrogenic gonadal failure in young women and men. In animal models, there is evidence that hormonal manipulation, deletion of genes involved in apoptotic pathways and dietary manipulation can protect against natural and induced germ cell loss, but evidence in humans is absent or unclear. Assisted reproductive technologies (ARTs) provide an ensemble of strategies for preserving fertility in patients and commercially valuable or endangered species. Semen cryopreservation was the first technology for preserving male fertility, but this cannot serve prepubertal boys, for whom banking of testicular biopsies may provide a future option. In sterilized rodents, cryopreserved spermatogonial stem cells can recolonize seminiferous tubules and reinitiate spermatogenesis, and subcutaneous implantation of intact tubules can generate spermatozoa for fertilization in vitro by intracytoplasmic sperm injection. Transplantation of frozen-banked ovarian tissue is well-established for restoring cyclicity and fertility and is currently undergoing clinical evaluation for cancer patients. When restoration of natural fertility is unnecessary or reimplantation is unsafe, it is desirable to

  14. Strides in Preservation of Malawi's Natural Stone

    Science.gov (United States)

    Kamanga, Tamara; Chisenga, Chikondi; Katonda, Vincent

    2017-04-01

    , metamorphic and sedimentary rocks are also used as dimension stones. Discovery and preservation of more natural stone deposits through research is essential in the country .Natural stone preservation has not only the potential to generate significant direct and indirect economic benefits for Malawi but also to preserve its heritage .

  15. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  16. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  17. Fertility preservation in young patients′ with cancer

    Directory of Open Access Journals (Sweden)

    Sharmila Dudani

    2014-01-01

    Full Text Available Preservation of fertility is an important issue in the management of young cancer patients. Though embryo cryostorage is a well-established procedure, it can only be availed by couples. Recent studies have indicated increasing success rates with mature and immature oocyte cryopreservation. Cryostorage induces injuries on the human oocytes which can be minimized by slow freezing and vitrification. Selection of candiidates is crucial so that the most suitable technique can be offered without any delay in initiation of cancer therapy. Factors affecting suitability are age of patient, assessment of ovarian reserve, hormonal status and type and stage of neoplastic disease. Encouraging results have been obtained with oocyte in vitro maturation (IVM followed by vitrification for cryostorage. Data on the use of vitrified eggs in routine in vitro fertilization (IVF show that pregnancy rates can be comparable to those achieved with fresh oocytes.

  18. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    A receiver-anonymous channel allows a sender to send a message to a receiver without an adversary learning for whom the message is intended. Wireless broadcast channels naturally provide receiver anonymity, as does multi-casting one message to a receiver population containing the intended receiver....... While anonymity and confidentiality appear to be orthogonal properties, making anonymous communication confidential is more involved than one might expect, since the ciphertext might reveal which public key has been used to encrypt. To address this problem, public-key cryptosystems with enhanced...... security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...

  19. Irradiation preservation of Hangzhou White Chrysanthemum

    Science.gov (United States)

    Liu-gen, Huang; Rong-min, Huang

    1993-07-01

    A study on the irradiation preservation of Hangzhou White Chrysanthemum (HWC for short) was carried out to keep the quality of HWC and prolong its shelf life. The results showed that: 1). γ-irradiation with proper dosage was one of the key steps to prolong the shelf-life of HWC. After γ - treatment at the dose level of 3-5kGy, the laminated plastic film packed HWC could be stored in ambient temperature for over 300 days, remaining its original colour, aroma and taste. 2). Different dose rate had no effect on the treatment results. 3). The main quality indexes of HWC treated with 10.0 kGy γ - rays were not changed, moreover, it had the higher hygienic qualities.

  20. Neighborhood-preserving mapping between trees

    DEFF Research Database (Denmark)

    Baumbach, Jan; Ibragimov, R.; Guo, Jian-Ying

    2013-01-01

    We introduce a variation of the graph isomorphism problem, where, given two graphs G = (V,E) and G = (V,E) and three integers l, d, and k, we seek for a set ⊆ V and a one-to-one mapping f:V → V such that |D| ≤ k and for every vertex v ∈ V \\ D and every vertex u ∈ N (v) \\ D we have f(u) ∈ N (f......(v)). Here, for a graph G and a vertex v, we use N(v) to denote the set of vertices which have distance at most i to v in G. We call this problem Neighborhood-Preserving Mapping (NPM). The main result of this paper is a complete dichotomy of the classical complexity of NPM on trees with respect to different...

  1. Preserving neural function under extreme scaling.

    Directory of Open Access Journals (Sweden)

    Hermann Cuntz

    Full Text Available Important brain functions need to be conserved throughout organisms of extremely varying sizes. Here we study the scaling properties of an essential component of computation in the brain: the single neuron. We compare morphology and signal propagation of a uniquely identifiable interneuron, the HS cell, in the blowfly (Calliphora with its exact counterpart in the fruit fly (Drosophila which is about four times smaller in each dimension. Anatomical features of the HS cell scale isometrically and minimise wiring costs but, by themselves, do not scale to preserve the electrotonic behaviour. However, the membrane properties are set to conserve dendritic as well as axonal delays and attenuation as well as dendritic integration of visual information. In conclusion, the electrotonic structure of a neuron, the HS cell in this case, is surprisingly stable over a wide range of morphological scales.

  2. Memory preservation made prestigious but easy

    Science.gov (United States)

    Fageth, Reiner; Debus, Christina; Sandhaus, Philipp

    2011-01-01

    Preserving memories combined with story-telling using either photo books for multiple images or high quality products such as one or a few images printed on canvas or images mounted on acryl to create high-quality wall decorations are gradually becoming more popular than classical 4*6 prints and classical silver halide posters. Digital printing via electro photography and ink jet is increasingly replacing classical silver halide technology as the dominant production technology for these kinds of products. Maintaining a consistent and comparable quality of output is becoming more challenging than using silver halide paper for both, prints and posters. This paper describes a unique approach of combining both desktop based software to initiate a compelling project and the use of online capabilities in order to finalize and optimize that project in an online environment in a community process. A comparison of the consumer behavior between online and desktop based solutions for generating photo books will be presented.

  3. The lover, the devourer and the preserver

    Directory of Open Access Journals (Sweden)

    Luca Parmeggiani

    2011-12-01

    Full Text Available This article is not intended for dwelling on small distinctions and nuances, then I hope the necessary oversemplification of the subject will be forgiven. The purpose is to try to identify three approaches: the first  one describes the decline of a model of town that was born with the Industrial Revolution and has lived up to the present day. The second one aim is to present some possible guidelines able to create a conceivable proposal for the structure of a city, by identifying strengths and weaknesses of the contemporary town. The third one shows how the “dress” - the look that the city can dress or undress - reflects the human quality of those that are called upon to shape, distort or preserve our environment.

  4. Defocus cue and saliency preserving video compression

    Science.gov (United States)

    Khanna, Meera Thapar; Chaudhury, Santanu; Lall, Brejesh

    2016-11-01

    There are monocular depth cues present in images or videos that aid in depth perception in two-dimensional images or videos. Our objective is to preserve the defocus depth cue present in the videos along with the salient regions during compression application. A method is provided for opportunistic bit allocation during the video compression using visual saliency information comprising both the image features, such as color and contrast, and the defocus-based depth cue. The method is divided into two steps: saliency computation followed by compression. A nonlinear method is used to combine pure and defocus saliency maps to form the final saliency map. Then quantization values are assigned on the basis of these saliency values over a frame. The experimental results show that the proposed scheme yields good results over standard H.264 compression as well as pure and defocus saliency methods.

  5. Organic solderability preservation evaluation. Topical report

    Energy Technology Data Exchange (ETDEWEB)

    Becka, G.A.; McHenry, M.R.; Slanina, J.T.

    1997-03-01

    An evaluation was conducted to determine the possible replacement of the hot air solder leveling (HASL) process used in the Allied Signal Federal Manufacturing & Technologies (FM&T) Printed Wiring Board Facility with an organic solderability preservative (OSP). The drivers for replacing HASL include (1) Eliminating lead from PWB fabrication processes; (2) Potential legislation restricting use of lead, (3) Less expensive processing utilizing OSP rather than HASL processing; (4) Avoiding solder dross disposal inherent with HASL processing, (5) OSP provides flat, planar surface required for surface mount technology product, and (6) Trend to thinner PWB designs. A reduction in the cost of nonconformance (CONC) due to HASL defects (exposed copper, solderability, dewetting and non-wetting) would be realized with the incorporation of the OSP process. Several supplier HASL replacement candidates were initially evaluated. One supplier chemistry was chosen for potential use in the FM&T PWB and assembly areas.

  6. Digital preservation putting it to work

    CERN Document Server

    Ogryczak, Włodzimierz; Pałka, Piotr; Śliwiński, Tomasz

    2017-01-01

    This book addresses the process of maintaining digital objects through time to ensure continued access, an aspect that has become a crucial issue in recent years. It offers a concise yet comprehensive discussion of key concepts and requirements for long-term digital preservation, and presents a pioneering framework for digital repositories that enables the long-term archiving and metadata management for large volumes of digital resources based on a system that has already been completely designed and launched. In the framework, the reliability of information readouts is ensured by the repository with two-level data recording replication and monitoring mechanisms in the repository management system (RMS) and the file systems, and by the RMS’s distributed nature. The advanced RMS allows operations on the archival storage to be scheduled, while also taking into account low energy consumption requirements. After presenting the framework in detail, the book assesses and demonstrates the approach’s viability ...

  7. Registering, indexing and digitally preserving RDBCI: Production indicators of 2003 to 2016

    Directory of Open Access Journals (Sweden)

    Gildenir Carolino Santos

    2016-09-01

    Full Text Available The question of explosion and digital preservation issues are totally in vogue today. In this context, the aim of this study is to analyze bibliographically the typeset production and published the “RDBCI: Revista Digital de Biblioteconomia e Ciência da Informação” in these its thirteen years of existence, in order to disclose the analysis of published scientific production, featuring the themes of articles and the most representative authors, contributing to the community area in question as well as enhance the importance of the magazine to the field of Library and Information Science. The journal is entirely digital, born and incubated on free platform OJS/SEER, provided by IBICT since 2004. Moreover, in these years of experience the magazine is effective information vehicle of the area and its existence confirms that electronic publications born in this format, survive in the digital world. From 2013, the RDBCI began to integrate Cariniana Network (IBICT, digitally preserving your entire collection through the LOCKSS software, and other institutions aggregated to the network, and in March 2016 began to integrate The Keepers Registry, making If the first Brazilian publication to be part of this international digital preservation network. The methodology adopted was through a survey of articles published from 2003 to 2016, collecting data such as access numbers, downloads, and other statistical and qualitative indicators, making use of tools such as Google Analytics, Altmetrics, Index h and alternative metrics as well as databases, directories, portals and indexes where the journal is indexed. We believe the result of this work serves as a qualitative analysis model for other periodicals and promotes growth of more national and international scientific publications with open access.

  8. Preserving noble gases in a convecting mantle.

    Science.gov (United States)

    Gonnermann, Helge M; Mukhopadhyay, Sujoy

    2009-05-28

    High (3)He/(4)He ratios sampled at many ocean islands are usually attributed to an essentially undegassed lower-mantle reservoir with high (3)He concentrations. A large and mostly undegassed mantle reservoir is also required to balance the Earth's (40)Ar budget, because only half of the (40)Ar produced from the radioactive decay of (40)K is accounted for by the atmosphere and upper mantle. However, geophysical and geochemical observations suggest slab subduction into the lower mantle, implying that most or all of Earth's mantle should have been processed by partial melting beneath mid-ocean ridges and hotspot volcanoes. This should have left noble gases in both the upper and the lower mantle extensively outgassed, contrary to expectations from (3)He/(4)He ratios and the Earth's (40)Ar budget. Here we suggest a simple solution: recycling and mixing of noble-gas-depleted slabs dilutes the concentrations of noble gases in the mantle, thereby decreasing the rate of mantle degassing and leaving significant amounts of noble gases in the processed mantle. As a result, even when the mass flux across the 660-km seismic discontinuity is equivalent to approximately one lower-mantle mass over the Earth's history, high (3)He contents, high (3)He/(4)He ratios and (40)Ar concentrations high enough to satisfy the (40)Ar mass balance of the Earth can be preserved in the lower mantle. The differences in (3)He/(4)He ratios between mid-ocean-ridge basalts and ocean island basalts, as well as high concentrations of (3)He and (40)Ar in the mantle source of ocean island basalts, can be explained within the framework of different processing rates for the upper and the lower mantle. Hence, to preserve primitive noble gas signatures, we find no need for hidden reservoirs or convective isolation of the lower mantle for any length of time.

  9. Privacy preserving interactive record linkage (PPIRL).

    Science.gov (United States)

    Kum, Hye-Chung; Krishnamurthy, Ashok; Machanavajjhala, Ashwin; Reiter, Michael K; Ahalt, Stanley

    2014-01-01

    Record linkage to integrate uncoordinated databases is critical in biomedical research using Big Data. Balancing privacy protection against the need for high quality record linkage requires a human-machine hybrid system to safely manage uncertainty in the ever changing streams of chaotic Big Data. In the computer science literature, private record linkage is the most published area. It investigates how to apply a known linkage function safely when linking two tables. However, in practice, the linkage function is rarely known. Thus, there are many data linkage centers whose main role is to be the trusted third party to determine the linkage function manually and link data for research via a master population list for a designated region. Recently, a more flexible computerized third-party linkage platform, Secure Decoupled Linkage (SDLink), has been proposed based on: (1) decoupling data via encryption, (2) obfuscation via chaffing (adding fake data) and universe manipulation; and (3) minimum information disclosure via recoding. We synthesize this literature to formalize a new framework for privacy preserving interactive record linkage (PPIRL) with tractable privacy and utility properties and then analyze the literature using this framework. Human-based third-party linkage centers for privacy preserving record linkage are the accepted norm internationally. We find that a computer-based third-party platform that can precisely control the information disclosed at the micro level and allow frequent human interaction during the linkage process, is an effective human-machine hybrid system that significantly improves on the linkage center model both in terms of privacy and utility.

  10. Preserving Healthy Muscle during Weight Loss.

    Science.gov (United States)

    Cava, Edda; Yeat, Nai Chien; Mittendorfer, Bettina

    2017-05-01

    Weight loss is the cornerstone of therapy for people with obesity because it can ameliorate or completely resolve the metabolic risk factors for diabetes, coronary artery disease, and obesity-associated cancers. The potential health benefits of diet-induced weight loss are thought to be compromised by the weight-loss-associated loss of lean body mass, which could increase the risk of sarcopenia (low muscle mass and impaired muscle function). The objective of this review is to provide an overview of what is known about weight-loss-induced muscle loss and its implications for overall physical function (e.g., ability to lift items, walk, and climb stairs). The currently available data in the literature show the following: 1) compared with persons with normal weight, those with obesity have more muscle mass but poor muscle quality; 2) diet-induced weight loss reduces muscle mass without adversely affecting muscle strength; 3) weight loss improves global physical function, most likely because of reduced fat mass; 4) high protein intake helps preserve lean body and muscle mass during weight loss but does not improve muscle strength and could have adverse effects on metabolic function; 5) both endurance- and resistance-type exercise help preserve muscle mass during weight loss, and resistance-type exercise also improves muscle strength. We therefore conclude that weight-loss therapy, including a hypocaloric diet with adequate (but not excessive) protein intake and increased physical activity (particularly resistance-type exercise), should be promoted to maintain muscle mass and improve muscle strength and physical function in persons with obesity. © 2017 American Society for Nutrition.

  11. [Preserving the cultural heritage of health in Brazil: an emerging question].

    Science.gov (United States)

    Serres, Juliane Conceição Primon

    2015-12-01

    In a discussion that applies the category "heritage" to goods within the realm of health, the article problematizes the recent recognition and incipient protection of the cultural heritage of health in Brazil. It presents a roster of assets that receive federal protection through Brazil's Instituto do Patrimônio Histórico e Artístico Nacional (IPHAN), including hospitals and health-related buildings as well as inventories conducted in a number of state capitals by the Brazilian Network for Cultural Heritage in Health. This approach suggests that preserving this valuable heritage is a matter of importance for the history of health in Brazil.

  12. Topographical maps as complex networks

    Science.gov (United States)

    da Fontoura Costa, Luciano; Diambra, Luis

    2005-02-01

    The neuronal networks in the mammalian cortex are characterized by the coexistence of hierarchy, modularity, short and long range interactions, spatial correlations, and topographical connections. Particularly interesting, the latter type of organization implies special demands on developing systems in order to achieve precise maps preserving spatial adjacencies, even at the expense of isometry. Although the object of intensive biological research, the elucidation of the main anatomic-functional purposes of the ubiquitous topographical connections in the mammalian brain remains an elusive issue. The present work reports on how recent results from complex network formalism can be used to quantify and model the effect of topographical connections between neuronal cells over the connectivity of the network. While the topographical mapping between two cortical modules is achieved by connecting nearest cells from each module, four kinds of network models are adopted for implementing intramodular connections, including random, preferential-attachment, short-range, and long-range networks. It is shown that, though spatially uniform and simple, topographical connections between modules can lead to major changes in the network properties in some specific cases, depending on intramodular connections schemes, fostering more effective intercommunication between the involved neuronal cells and modules. The possible implications of such effects on cortical operation are discussed.

  13. Cost Model for Digital Preservation: Cost of Digital Migration

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2011-01-01

    The Danish Ministry of Culture has funded a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project was to increase cost effectiveness of digital preservation activities and to provide a basis...... for comparing and estimating future cost requirements for digital preservation. In this study we describe an activity-based costing methodology for digital preservation based on the Open Archice Information System (OAIS) Reference Model. Within this framework, which we denote the Cost Model for Digital...... Preservation (CMDP), the focus is on costing the functional entity Preservation Planning from the OAIS and digital migration activities. In order to estimate these costs we have identified cost-critical activities by analysing the functions in the OAIS model and the flows between them. The analysis has been...

  14. The ultrastructural characteristics of porcine hepatocytes donated after cardiac death and preserved with warm machine perfusion preservation.

    Directory of Open Access Journals (Sweden)

    Hiroki Bochimoto

    Full Text Available The effects of warm machine perfusion preservation of liver grafts donated after cardiac death on the intracellular three-dimensional ultrastructure of the organelles in hepatocytes remain unclear. Here we analyzed comparatively the ultrastructure of the endomembrane systems in porcine hepatocytes under warm ischemia and successive hypothermic and midthermic machine perfusion preservation, a type of the warm machine perfusion. Porcine liver grafts which had a warm ischemia time of 60 minutes were perfused for 4 hours with modified University of Wisconsin gluconate solution. Group A grafts were preserved with hypothermic machine perfusion preservation at 8°C constantly for 4 hours. Group B grafts were preserved with rewarming up to 22°C by warm machine perfusion preservation for 4 hours. An analysis of hepatocytes after 60 minutes of warm ischemia by scanning electron microscope revealed the appearance of abnormal vacuoles and invagination of mitochondria. In the hepatocytes preserved by subsequent hypothermic machine perfusion preservation, strongly swollen mitochondria were observed. In contrast, the warm machine perfusion preservation could preserve the functional appearance of mitochondria in hepatocytes. Furthermore, abundant vacuoles and membranous structures sequestrating cellular organelles like autophagic vacuoles were frequently observed in hepatocytes after warm machine perfusion preservation. In conclusion, the ultrastructure of the endomembrane systems in the hepatocytes of liver grafts changed in accordance with the temperature conditions of machine perfusion preservation. In addition, temperature condition of the machine perfusion preservation may also affect the condition of the hepatic graft attributed to autophagy systems, and consequently alleviate the damage of the hepatocytes.

  15. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Hansen, Jonas; Roetter, Daniel Enrique Lucani; Krigslund, Jeppe

    2015-01-01

    . The inherent flexibility of both SDN and NC provides fertile ground to envision more efficient, robust, and secure networking designs, which may also incorporate content caching and storage, all of which are key challenges of the upcoming 5G networks. This article not only proposes the fundamentals......Software defined networking has garnered large attention due to its potential to virtualize services in the Internet, introducing flexibility in the buffering, scheduling, processing, and routing of data in network routers. SDN breaks the deadlock that has kept Internet network protocols stagnant...... for decades, while applications and physical links have evolved. This article advocates for the use of SDN to bring about 5G network services by incorporating network coding (NC) functionalities. The latter constitutes a major leap forward compared to the state-of-the- art store and forward Internet paradigm...

  16. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage....... This paper advocates for the use of SDN to bring about future Internet and 5G network services by incorporating network coding (NC) functionalities. The inherent flexibility of both SDN and NC provides a fertile ground to envision more efficient, robust, and secure networking designs, that may also...... incorporate content caching and storage, all of which are key challenges of the future Internet and the upcoming 5G networks. This paper proposes some of the keys behind this intersection and supports it with use cases as well as a an implementation that integrated the Kodo library (NC) into OpenFlow (SDN...

  17. Wellbore Integrity Network

    Energy Technology Data Exchange (ETDEWEB)

    Carey, James W. [Los Alamos National Laboratory; Bachu, Stefan [Alberta Innovates

    2012-06-21

    In this presentation, we review the current state of knowledge on wellbore integrity as developed in the IEA Greenhouse Gas Programme's Wellbore Integrity Network. Wells are one of the primary risks to the successful implementation of CO{sub 2} storage programs. Experimental studies show that wellbore materials react with CO{sub 2} (carbonation of cement and corrosion of steel) but the impact on zonal isolation is unclear. Field studies of wells in CO{sub 2}-bearing fields show that CO{sub 2} does migrate external to casing. However, rates and amounts of CO{sub 2} have not been quantified. At the decade time scale, wellbore integrity is driven by construction quality and geomechanical processes. Over longer time-scales (> 100 years), chemical processes (cement degradation and corrosion) become more important, but competing geomechanical processes may preserve wellbore integrity.

  18. Muscle torque preservation and physical activity in individuals with stroke.

    Science.gov (United States)

    Eng, Janice J; Lomaglio, Melanie J; Macintyre, Donna L

    2009-07-01

    A greater percent loss of concentric versus eccentric muscle torque (i.e., relative eccentric muscle torque preservation) has been reported in the paretic limb of individuals with stroke and has been attributed to hypertonia and/or cocontractions. Stroke provides a unique condition for examining mechanisms underlying eccentric muscle preservation because both limbs experience similar amounts of general physical activity, but the paretic side is impaired directly by the brain lesion. The purpose of this study was to determine 1) whether eccentric preservation also exists in the nonparetic limb and 2) the relationship of eccentric or concentric torque preservation with physical activity in stroke. We hypothesized that the nonparetic muscles would demonstrate eccentric muscle preservation, which would suggest that nonneural mechanisms may also contribute to its relative preservation. Eighteen patients who had stroke and 18 healthy control subjects (age- and sex-matched) completed a physical activity questionnaire. Maximum voluntary concentric and eccentric joint torques of the ankle, knee, and hip flexors and extensors were measured using an isokinetic dynamometer at 30 degrees x s(-1) for the paretic and nonparetic muscles. Relative concentric and eccentric peak torque preservations were expressed as a percentage of control subject torque. Relative eccentric torque was higher (more preserved) than relative concentric torque for paretic and nonparetic muscles. Physical activity correlated with paretic (r = 0.640, P = 0.001) and nonparetic concentric torque preservation (r = 0.508, P = 0.009) but not with eccentric torque preservation for either leg. The relative preservation of eccentric torque in the nonparetic muscles suggest a role of nonneural mechanisms and could also explain the preservation observed in other chronic health conditions. Loss of concentric, but not eccentric, muscle torque was related to physical inactivity in stroke.

  19. Treatability of SPF framing lumber with CCA and borate preservatives

    Science.gov (United States)

    Cherilyn Hatfield

    2005-01-01

    There is increasing interest in preservative pressure-treatment of framing lumber to prevent attack by decay fungi and insects. However, the Spruce– pine–Fir species group that is often used in framing construction can be difficult to penetrate with preservatives. We compared solution uptake and penetration of boron and copper from a borax–copper (BC) preservative to...

  20. DCC Digital Curation Manual: Preservation Strategies for Digital Libraries

    OpenAIRE

    Holdsworth, David

    2007-01-01

    Ensuring that digital data remain accessible and reusable over time requires the implementation of proactive, scalable and sustainable preservation strategies. To be of greatest effect, preservation issues must be considered from the point of creation and throughout the entire life-cycle of the digital resource. This chapter will examine some of the technical issues surrounding digital preservation and also explore some of the philosophical issues that may hinder effective upta...

  1. Direct Counting of Bacteria Preserved with Lugol Iodine Solution

    OpenAIRE

    Pomroy, A. J.

    1984-01-01

    Lugol iodine solution was compared with glutaraldehyde as a preservative for marine bacteria. Direct counts with the fluorochrome 4′,6-diamidino-2-phenylindole show no significant difference between the preservatives, but the use of Lugol solution has several advantages over glutaraldehyde, especially in the handling and storage of samples. Bacteria were counted in water samples that were preserved with Lugol iodine solution and stored at room temperature for 4 years. Microprotozoa were also ...

  2. First Integrals of Dynamical Systems And Their Numerical Preservation

    OpenAIRE

    Irshad, W.; Habib, Y.; Farooq, M. U.

    2017-01-01

    We calculate Noether like operators and first integrals of scalar equation y'' = -k^2 y using complex Lie symmetry method, by taking values of k and y to be real as well as complex. We numerically integrate the equations using a symplectic Runge-Kutta method and check for preservation of these first integrals. It is seen that these structure preserving numerical methods provide qualitatively correct numerical results and good preservation of first integrals is obtained.

  3. PrePARe teaching modules in digital preservation

    OpenAIRE

    PrePARe project team

    2012-01-01

    The JISC-funded PrePARe project aimed to encourage researchers to take an interest and responsibility in digital preservation of their research outputs. Training materials in digital preservation have been designed to slot into existing training courses on related areas, such as Information Literacy and reference management. Five short modules provide an introduction to why digital preservation matters, and cover the issues of safe storage of digital materials, documentation and metadata, dat...

  4. The modelling of a digital forensic readiness approach for wireless local area networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2012-06-01

    Full Text Available generated by the mobile stations and to conduct a proper digital forensic investigation. This paper attempts to address this issue by proposing a wireless digital forensic readiness model designed to monitor, log and preserve wireless network traffic...

  5. Effects of Energy Storage Systems Grid Code Requirements on Interface Protection Performances in Low Voltage Networks

    National Research Council Canada - National Science Library

    Fabio Bignucolo; Alberto Cerretti; Massimiliano Coppo; Andrea Savio; Roberto Turri

    2017-01-01

    ...), with negative impact on the safety of medium voltage (MV) and low voltage (LV) systems. With the scope of preserving the main network stability, international and national grid connection codes have been updated recently...

  6. On the security of an anonymous roaming protocol in UMTS mobile networks

    Directory of Open Access Journals (Sweden)

    Shuhua Wu

    2012-02-01

    Full Text Available In this communication, we first show that the privacy-preserving roaming protocol recently proposed for mobile networks cannot achieve the claimed security level. Then we suggest an improved protocol to remedy its security problems.

  7. Preservation vs Innovation. Sustainable rehabilitation in architectural preservation contexts: knowledge, techniques, languages

    Directory of Open Access Journals (Sweden)

    Riccardo Gulli

    2012-12-01

    Full Text Available The theme of the preservation of the characteristics of protected architectural heritage must nowadays be correlated to new requirements for the adaptation of existing buildings to performance standards. This subject raises new questions about the theoretical assumptions and tools to be adopted to coherently answer that request. Focusing on the theme of energy requalification of heritage buildings - the primary focus of interest for the reduction of pollution emissions, according to Horizon 2020 objectives - the preservation of the meanings of an architecture work and of its linguistic, typological and material characteristics proofs to be essential for protection interventions on buildings. However this can’t be considered exhaustive, as the raised issue necessarily requires to be further addressed within the speculative domain of Technique, or rather to open out to the contribution that innovation processes and methods belonging to the field of scientific knowledge could offer.

  8. The displacement of archaeological structures in Spain. Relocate to preserve, preserve to present

    Directory of Open Access Journals (Sweden)

    Víctor Manuel López-Menchero Bendicho

    2011-01-01

    Full Text Available Clearly it is not always feasible to conserve and exhibit the archaeological remains in situ, either for lack of funds in some cases, or for manifest incompatibility with the new land uses in others. This second case mix, ie the need to "free" land for new uses, sentences, in most cases, the archaeological remains to suffer a partial destruction since only movable materials are extracted, preserved and in some cases presented to the public, while the unmovable archaeological heritage, ie fixed archaeological structures, is destroyed, once it has been "properly" documented. However, in this field there is a kind of third way in which archaeological remains, including structures, are preserved and on display, while clearing the ground originally occupied. It is the displacement of archaeological structures. This article discusses the long history of such interventions in the Spanish case, making a typological classification proposal and finally a critical appraisal.

  9. Biological Sample Ambient Preservation (BioSAP) Device Project

    Data.gov (United States)

    National Aeronautics and Space Administration — To address NASA's need for alternative methods for ambient preservation of human biological samples collected during extended spaceflight and planetary operations,...

  10. Preserving and reusing high-energy-physics data analyses

    CERN Document Server

    Simko, Tibor; Dasler, Robin; Fokianos, Pamfilos; Kuncar, Jiri; Lavasa, Artemis; Mattmann, Annemarie; Rodriguez, Diego; Trzcinska, Anna; Tsanaktsidis, Ioannis

    2017-01-01

    The revalidation, reuse and reinterpretation of data analyses require having access to the original virtual environments, datasets and software that was used to produce the original scientific result. The CERN Analysis Preservation pilot project is developing a set of tools that support particle physics researchers in preserving the knowledge around analyses so that capturing, sharing, reusing and reinterpreting data becomes easier. In this talk, we shall notably focus on the aspects of reusing a preserved analysis. We describe a system that permits to instantiate the preserved analysis workflow on the computing cloud, paving the way to allowing researchers to revalidate and reinterpret research data even many years after the original publication.

  11. Conundrum of an Immigrant: Assimilation versus Cultural Preservation

    National Research Council Canada - National Science Library

    Joanna Diane Caytas

    2012-01-01

    .... The fundamental polarity remains between the traditional model of assimilation as compared to the cultural preservation under various models of multiculturalism - aside, of course, from hybrid forms...

  12. Anterior cruciate ligament remnant and its values for preservation

    Directory of Open Access Journals (Sweden)

    Takeshi Muneta

    2017-01-01

    Full Text Available Controversy surrounds the remnant-preserving anterior cruciate ligament surgery. Advantages of remnant preservation have been reported in regard to better healing and knee function, although no consensus has been reached. This review article discussed the value and meaning of anterior cruciate ligament remnant preservation in several sections such as effects on healing, remnant classification, biomechanical evaluation, relation to proprioception, animal studies, and clinical studies. We hope that this review will facilitate further discussion and investigation for better treatment of anterior cruciate ligament injuries. So far, the current reviews have not provided sufficient scientific evidence to support the value of preserving the remnant.

  13. Direct counting of bacteria preserved with lugol iodine solution.

    Science.gov (United States)

    Pomroy, A J

    1984-05-01

    Lugol iodine solution was compared with glutaraldehyde as a preservative for marine bacteria. Direct counts with the fluorochrome 4',6-diamidino-2-phenylindole show no significant difference between the preservatives, but the use of Lugol solution has several advantages over glutaraldehyde, especially in the handling and storage of samples. Bacteria were counted in water samples that were preserved with Lugol iodine solution and stored at room temperature for 4 years. Microprotozoa were also counted in samples preserved with Lugol iodine solution by using the fluorochrome fluorescein isothiocyanate.

  14. Telecommunication Networks

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Balachandran, Kartheepan; Hald, Sara Ligaard

    2014-01-01

    In this chapter, we look into the role of telecommunication networks and their capability of supporting critical infrastructure systems and applications. The focus is on smart grids as the key driving example, bearing in mind that other such systems do exist, e.g., water management, traffic control......, etc. First, the role of basic communication is examined with a focus on critical infrastructures. We look at heterogenic networks and standards for smart grids, to give some insight into what has been done to ensure inter-operability in this direction. We then go to the physical network, and look...... at the deployment of the physical layout of the communication network and the related costs. This is an important aspect as one option to use existing networks is to deploy dedicated networks. Following this, we look at some generic models that describe reliability for accessing dynamic information. This part...

  15. Networked Identities

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Larsen, Malene Charlotte

    2008-01-01

    In this article we take up a critique of the concept of Communities of Practice (CoP) voiced by several authors, who suggest that networks may provide a better metaphor to understand social forms of organisation and learning. Through a discussion of the notion of networked learning and the critique...... of CoPs we shall argue that the metaphor or theory of networked learning is itself confronted with some central tensions and challenges that need to be addressed. We then explore these theoretical and analytic challenges to the network metaphor, through an analysis of a Danish social networking site. We...... argue that understanding meaning-making and ‘networked identities’ may be relevant analytic entry points in navigating the challenges....

  16. Preserving syntactic processing across the adult life span: the modulation of the frontotemporal language system in the context of age-related atrophy.

    Science.gov (United States)

    Tyler, Lorraine K; Shafto, Meredith A; Randall, Billi; Wright, Paul; Marslen-Wilson, William D; Stamatakis, Emmanuel A

    2010-02-01

    Although widespread neural atrophy is an inevitable consequence of normal aging, not all cognitive abilities decline as we age. For example, spoken language comprehension tends to be preserved, despite atrophy in neural regions involved in language function. Here, we combined measures of behavior, functional activation, and gray matter (GM) change in a younger (19-34 years) and older group (49-86 years) of participants to identify the mechanisms leading to preserved language comprehension across the adult life span. We focussed primarily on syntactic functions because these are strongly left lateralized, providing the potential for contralateral recruitment. In an functional magnetic resonance imaging study, we used a word-monitoring task to minimize working memory demands, manipulating the availability of semantics and syntax to ask whether syntax is preserved in aging because of the functional recruitment of other brain regions, which successfully compensate for neural atrophy. Performance in the older group was preserved despite GM loss. This preservation was related to increased activity in right hemisphere frontotemporal regions, which was associated with age-related atrophy in the left hemisphere frontotemporal network activated in the young. We argue that preserved syntactic processing across the life span is due to the shift from a primarily left hemisphere frontotemporal system to a bilateral functional language network.

  17. Wireless Networks

    OpenAIRE

    Samaka, Mohammed; Khan, Khaled M.D.

    2007-01-01

    Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks with the potential to provide high-speed, high-quality information exchange between two or more portable devices without any wire or conductors. Wireless networks can simply be characterized as the technology that provides seamless access to information, anywhere, anyplace, an...

  18. Enterpreneurial network

    OpenAIRE

    Thoma, Antonela; Nguyen, Lien; Kupsyte, Valdone

    2014-01-01

    Network has become more and more indispensable in the entrepreneurial world. Especially in startup businesses, network is crucial for new entrepreneurs. This project looks at how entrepreneurs in different sectors use network to become successful. We chose to work with three entrepreneurs from three companies that have been operational for a few years and conducted face to face interviews with them. Through the data from the interviews, we analyzed firstly what type of entrepreneurs they are,...

  19. LTE OFFLOADING THROUGH WiFi NETWORKS

    Directory of Open Access Journals (Sweden)

    A. N. Steputin

    2015-11-01

    Full Text Available The subject of the article is Wi-Fi offloading of LTE networks as one of the methods for solving a problem of the lack of availability of network resources in the future. Comparison of mobile networks offloading technologies, such as femtocells, Small Cells and Wi-Fi, is given. Architecture of cooperative LTE+Wi-Fi network including both new network components and new functions for standard LTE network components is presented as well as interaction between components. Special attention is paid to the usage of mobile IP protocols providing connection to the LTE Core both by trusted and untrusted Wi-Fi access. Evaluation of implementation effectiveness and prospective of the technology is given. The relation between amounts of users reconnected to Wi-Fi, data rate of LTE network and amount of access points are submitted as a part of the simulation of user’s equipment transition process from LTE to Wi-Fi network. A conclusion based on the research is made that stepwise phase-in of this technology enables to solve the problem of mobile network resources shortage in metropolises due to permanent traffic growth. It is presented that access points addition and transference of the customers to Wi-Fi network significantly reduce the overload on the base station herewith it increases some data rate with preservation of quality of provided services.

  20. Tension and robustness in multitasking cellular networks.

    Directory of Open Access Journals (Sweden)

    Jeffrey V Wong

    Full Text Available Cellular networks multitask by exhibiting distinct, context-dependent dynamics. However, network states (parameters that generate a particular dynamic are often sub-optimal for others, defining a source of "tension" between them. Though multitasking is pervasive, it is not clear where tension arises, what consequences it has, and how it is resolved. We developed a generic computational framework to examine the source and consequences of tension between pairs of dynamics exhibited by the well-studied RB-E2F switch regulating cell cycle entry. We found that tension arose from task-dependent shifts in parameters associated with network modules. Although parameter sets common to distinct dynamics did exist, tension reduced both their accessibility and resilience to perturbation, indicating a trade-off between "one-size-fits-all" solutions and robustness. With high tension, robustness can be preserved by dynamic shifting of modules, enabling the network to toggle between tasks, and by increasing network complexity, in this case by gene duplication. We propose that tension is a general constraint on the architecture and operation of multitasking biological networks. To this end, our work provides a framework to quantify the extent of tension between any network dynamics and how it affects network robustness. Such analysis would suggest new ways to interfere with network elements to elucidate the design principles of cellular networks.

  1. Tension and Robustness in Multitasking Cellular Networks

    Science.gov (United States)

    Wong, Jeffrey V.; Li, Bochong; You, Lingchong

    2012-01-01

    Cellular networks multitask by exhibiting distinct, context-dependent dynamics. However, network states (parameters) that generate a particular dynamic are often sub-optimal for others, defining a source of “tension” between them. Though multitasking is pervasive, it is not clear where tension arises, what consequences it has, and how it is resolved. We developed a generic computational framework to examine the source and consequences of tension between pairs of dynamics exhibited by the well-studied RB-E2F switch regulating cell cycle entry. We found that tension arose from task-dependent shifts in parameters associated with network modules. Although parameter sets common to distinct dynamics did exist, tension reduced both their accessibility and resilience to perturbation, indicating a trade-off between “one-size-fits-all” solutions and robustness. With high tension, robustness can be preserved by dynamic shifting of modules, enabling the network to toggle between tasks, and by increasing network complexity, in this case by gene duplication. We propose that tension is a general constraint on the architecture and operation of multitasking biological networks. To this end, our work provides a framework to quantify the extent of tension between any network dynamics and how it affects network robustness. Such analysis would suggest new ways to interfere with network elements to elucidate the design principles of cellular networks. PMID:22577355

  2. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  3. Networking Japan

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    HIDA). Many of these alumni have and will in the future exchange ideas and keep contact not only to Japan, but also to fellow alumni around the globe and, thereby, practice south-south exchanges, which are made possible and traceable by their established alumni network and the World Network of Friends...... (WNF). Through the alumni network, Japan continues to infuse ideas to participants and alumni, who interpret and disseminate these ideas through alumni society networks and activities, but their discussions nationally and regionally also get reported back to Japan and affect future policies...

  4. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  5. Knowledge, change and the preservation of progress.

    Science.gov (United States)

    Morales-gomez, D A

    1993-04-01

    Respect for traditional knowledge is urges as a source of learning to understand where societies originate. A Western understanding of traditional cultural knowledge must go beyond an understanding of fundamental values that give meaning; there must be a change in the cultural perception of development. There operates a complex interaction among artistic and spiritual practices, language and communication, patterns of social reproduction, practices in community governance, and management of natural and human resources. There are contradictions because cultural expression is a diverse combination of individual and collective capacities to manage the social, political, economic, and environmental aspects of life. Quick solutions sometimes lead to romanticized notions of cultural knowledge, rather than being systematic and historical and part of the cultural milieu. From the ethnic perspective, traditional knowledge is seen as "indigenous" or an expression of "curious" traditions and practices of native peoples which are different from one's own perspective. Viewing traditional knowledge in this fashion detaches it from rites, languages, and community practices. When reduced to a utilitarian economic notion, traditional knowledge is separated from the lessons drawn from survival strategies and practices of "materially impoverished peoples." Sometimes, the application of this knowledge bypasses recognition of the part played by traditional peoples. People in the North or industrialized countries neglect the human and sociocultural basis of knowledge, even though there have been attempts to reclaim cultural knowledge as part of development efforts. There remain many questions about how to better understand traditional knowledge, how to preserve it in a meaningful way, and how to apply it to sustain development. There is no consensus about what traditional knowledge is and how it is "genuinely" expressed. The definition of traditional knowledge is as a body of

  6. Educating for the Preservation of Dark Skies

    Science.gov (United States)

    Preston, Sandra Lee; Cianciolo, Frank; Wetzel, Marc; Finkelstein, Keely; Wren, William; Nance, Craig

    2015-08-01

    The stars at night really are big and bright deep in the heart of Texas at the McDonald Observatory near Fort Davis, Texas. Each year 80,000 visitors from all over the world make the pilgrimage to the Observatory to attend one of the three-times-a-week star parties. Many experience, for the first time, the humbling, splendor of a truly dark night sky. Over the last several years, the Observatory has experienced dramatic increases in visitation demonstrating the public’s appetite for science education, in general, and interest in the night sky, in particular. This increasing interest in astronomy is, ironically, occurring at a time when most of humanity’s skies are becoming increasingly light-polluted frustrating this natural interest. Dark skies and knowledgeable education and outreach staff are an important resource in maintaining the public’s interest in astronomy, support for astronomical research, and local tourism.This year Observatory educators were inspired by the observance of the International Year of Light to promote healthy outdoor lighting through its popular Astronomy Day distance learning program. This program reaches tens of thousands of K-12 students in Texas and other states with a message of how they can take action to preserve dark skies. As well, more than a thousand Boy Scouts visiting during the summer months receive a special program, which includes activities focusing on good lighting practices, thereby earning them credits toward an astronomy badge.The Observatory also offers a half-a-dozen K-12 teacher professional development workshops onsite each year, which provide about 90 teachers with dark skies information, best-practice lighting demonstrations, and red flashlights. Multi-year workshops for National Park and State of Texas Parks personnel are offered on dark sky preservation and sky interpretation at McDonald and a Dark Skies fund for retrofitting lights in the surrounding area has been established. The Observatory also uses

  7. Secure and privacy-preserving data communication in Internet of Things

    CERN Document Server

    Zhu, Liehuang; Xu, Chang

    2017-01-01

    This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader’s horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.

  8. Randomizing bipartite networks: the case of the World Trade Web

    CERN Document Server

    Saracco, Fabio; Gabrielli, Andrea; Squartini, Tiziano

    2015-01-01

    Within the last fifteen years, network theory has been successfully applied both to natural sciences and to socioeconomic disciplines. In particular, bipartite networks have been recognized to provide a particularly insightful representation of many systems, ranging from mutualistic networks in ecology to trade networks in economy, whence the need of a pattern detection-oriented analysis in order to identify statistically-significant structural properties. Such an analysis rests upon the definition of suitable null models, i.e. upon the choice of the portion of network structure to be preserved while randomizing everything else. However, quite surprisingly, little work has been done so far to define null models for real bipartite networks. The aim of the present work is to fill this gap, extending a recently-proposed method to randomize monopartite networks to bipartite networks. While the proposed formalism is perfectly general, we apply our method to the binary, undirected, bipartite representation of the W...

  9. Factors influencing organic carbon preservation in marine sediments

    Science.gov (United States)

    Canfield, D. E.

    1994-01-01

    The organic matter that escapes decomposition is buried and preserved in marine sediments, with much debate as to whether the amount depends on bottom-water O2 concentration. One group argues that decomposition is more efficient with O2, and hence, organic carbon will be preferentially oxidized in its presence, and preserved in its absence. Another group argues that the kinetics of organic matter decomposition are similar in the presence and absence of O2, and there should be no influence of O2 on preservation. A compilation of carbon preservation shows that both groups are right, depending on the circumstances of deposition. At high rates of deposition, such as near continental margins, little difference in preservation is found with varying bottom-water O2. It is important that most carbon in these sediments decomposes by anaerobic pathways regardless of bottom-water O2. Hence, little influence of bottom-water O2 on preservation would, in fact, be expected. As sedimentation rate drops, sediments deposited under oxygenated bottom water become progressively more aerobic, while euxinic sediments remain anaerobic. Under these circumstances, the relative efficiencies of aerobic and anaerobic decomposition could affect preservation. Indeed, enhanced preservation is observed in low-O2 and euxinic environments. To explore in detail the factors contributing to this enhanced carbon preservation, aspects of the biochemistries of the aerobic and anaerobic process are reviewed. Other potential influences on preservation are also explored. Finally, a new model for organic carbon decomposition, the "pseudo-G" model, is developed. This model couples the degradation of refractory organic matter to the overall metabolic activity of the sediment, and has consequences for carbon preservation due to the mixing together of labile and refractory organic matter by bioturbation.

  10. Identifying and preserving high-water mark data

    Science.gov (United States)

    Koenig, Todd A.; Bruce, Jennifer L.; O'Connor, Jim; McGee, Benton D.; Holmes, Robert R.; Hollins, Ryan; Forbes, Brandon T.; Kohn, Michael S.; Schellekens, Mathew; Martin, Zachary W.; Peppler, Marie C.

    2016-03-08

    High-water marks provide valuable data for understanding recent and historical flood events. The proper collection and recording of high-water mark data from perishable and preserved evidence informs flood assessments, research, and water resource management. Given the high cost of flooding in developed areas, experienced hydrographers, using the best available techniques, can contribute high-quality data toward efforts such as public education of flood risk, flood inundation mapping, flood frequency computations, indirect streamflow measurement, and hazard assessments.This manual presents guidance for skilled high-water mark identification, including marks left behind in natural and man-made environments by tranquil and rapid flowing water. This manual also presents pitfalls and challenges associated with various types of flood evidence that help hydrographers identify the best high-water marks and assess the uncertainty associated with a given mark. Proficient high-water mark data collection contributes to better understanding of the flooding process and reduces risk through greater ability to estimate flood probability.The U.S. Geological Survey, operating the Nation’s premier water data collection network, encourages readers of this manual to familiarize themselves with the art and science of high-water mark collection. The U.S. Geological survey maintains a national database at http://water.usgs.gov/floods/FEV/ that includes high-water mark information for many flood events, and local U.S. Geological Survey Water Science Centers can provide information to interested readers about participation in data collection and flood documentation efforts as volunteers or observers.

  11. Aldolases Utilize Different Oligomeric States To Preserve Their Functional Dynamics.

    Science.gov (United States)

    Katebi, Ataur R; Jernigan, Robert L

    2015-06-09

    Aldolases are essential enzymes in the glycolysis pathway and catalyze the reaction cleaving fructose/tagatose 1,6-bisphosphate into dihydroxyacetone phosphate and glyceraldehyde 3-phosphate. To determine how the aldolase motions relate to its catalytic process, we studied the dynamics of three different class II aldolase structures through simulations. We employed coarse-grained elastic network normal-mode analyses to investigate the dynamics of Escherichia coli fructose 1,6-bisphosphate aldolase, E. coli tagatose 1,6-bisphosphate aldolase, and Thermus aquaticus fructose 1,6-bisphosphate aldolase and compared their motions in different oligomeric states. The first one is a dimer, and the second and third are tetramers. Our analyses suggest that oligomerization not only stabilizes the aldolase structures, showing fewer fluctuations at the subunit interfaces, but also allows the enzyme to achieve the required dynamics for its functional loops. The essential mobility of these loops in the functional oligomeric states can facilitate the enzymatic mechanism, substrate recruitment in the open state, bringing the catalytic residues into their required configuration in the closed bound state, and moving back to the open state to release the catalytic products and repositioning the enzyme for its next catalytic cycle. These findings suggest that the aldolase global motions are conserved among aldolases having different oligomeric states to preserve its catalytic mechanism. The coarse-grained approaches taken permit an unprecedented view of the changes in the structural dynamics and how these relate to the critical structural stabilities essential for catalysis. The results are supported by experimental findings from many previous studies.

  12. Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM.

    Science.gov (United States)

    Zhu, Hui; Liu, Xiaoxia; Lu, Rongxing; Li, Hui

    2017-05-01

    With the advances of machine learning algorithms and the pervasiveness of network terminals, the online medical prediagnosis system, which can provide the diagnosis of healthcare provider anywhere anytime, has attracted considerable interest recently. However, the flourish of online medical prediagnosis system still faces many challenges including information security and privacy preservation. In this paper, we propose an e fficient and privacy-preserving online medical prediagnosis framework, called eDiag, by using nonlinear kernel support vector machine (SVM). With eDiag, the sensitive personal health information can be processed without privacy disclosure during online prediagnosis service. Specifically, based on an improved expression for the nonlinear SVM, an efficient and privacy-preserving classification scheme is introduced with lightweight multiparty random masking and polynomial aggregation techniques. The encrypted user query is directly operated at the service provider without decryption, and the diagnosis result can only be decrypted by user. Through extensive analysis, we show that eDiag can ensure that users' health information and healthcare provider's prediction model are kept confidential, and has significantly less computation and communication overhead than existing schemes. In addition, performance evaluations via implementing eDiag on smartphone and computer demonstrate eDiag's effectiveness in term of real online environment.

  13. Preserved morphological processing in semantic dementia.

    Science.gov (United States)

    Kavé, Gitit; Heinik, Jeremia; Biran, Iftah

    2012-01-01

    Individuals with semantic dementia (SD) show progressive worsening of lexical-conceptual single word knowledge alongside preservation of nonsemantic aspects of language. The current study examines morphological processing in SD. S.H.S., a Hebrew-speaking person with SD, completed eight tasks that tested inflection, linear derivation, and nonlinear derivation at three time points over six and a half years. S.H.S. correctly produced plural nouns and judged the grammaticality of noun-verb and noun-adjective inflectional agreement. A steeper decline was seen in the ability to judge irregularly versus regularly inflected forms. S.H.S. judged nationality suffixes accurately and produced diminutive and agentive suffixes successfully. He also relied on morphological decomposition when performing lexical decision. Judgement of sentences consisting of derived verbal participles was intact with regard to morphological considerations alone, but impaired when semantic considerations determined grammaticality. S.H.S.'s performance suggests that structural aspects of word knowledge might be functional in the face of a severe semantic impairment.

  14. Radiation preservation of low nitrite bacon

    Science.gov (United States)

    Singh, Harwant

    Sodium nitrite, a key ingredient of the mix used to cure bacon and other meats, promotes and fixes bacon's characteristic pink color, inhibits lipid peroxidation and prevents growth of microorganisms, particularly Clostridium botulinum spores. Unfortunately, nitrite leads to the formation of carcinogenic nitrosamines in bacon. This has led to a search for alternatives to the use of nitrite. Irradiation with reduced level of nitrite is a promising alternative. Radurization of bacon containing 20 to 40 mg/kg of nitrite in evacuated packages, irradiated and stored at 4°C, gives a product with good organoleptic qualities and extended shelf life of ⩾ 90 days, as opposed to ˜ 30 days for the conventionally treated bacon. Radappertization of bacon containing 20 mg/kg of nitrite at a dose of about 30 kGy, irradiated at temperature of -20° or lower in evacuated packages, results in a product that is shelf stable at room temperature for months to years. It has organoleptic qualities comparable to commercial bacon in terms of color, flavor, odor and texture. Irradiation also reduces the nitrite and preformed nitrosamines present in bacon. Various aspects of preservation of bacon are reviewed in this report with emphasis on radiation processing.

  15. Microelectromechanically tunable multiband metamaterial with preserved isotropy.

    Science.gov (United States)

    Pitchappa, Prakash; Ho, Chong Pei; Qian, You; Dhakar, Lokesh; Singh, Navab; Lee, Chengkuo

    2015-06-26

    We experimentally demonstrate a micromachined reconfigurable metamaterial with polarization independent characteristics for multiple resonances in terahertz spectral region. The metamaterial unit cell consists of eight out-of-plane deformable microcantilevers placed at each corner of an octagon ring. The octagon shaped unit cell geometry provides the desired rotational symmetry, while the out-of-plane movable cantilevers preserves the symmetry at different configurations of the metamaterial. The metamaterial is shown to provide polarization independent response for both electrical inductive-capacitive (eLC) resonance and dipolar resonance at all states of actuation. The proposed metamaterial has a switching range of 0.16 THz and 0.37 THz and a transmission intensity change of more than 0.2 and 0.7 for the eLC and dipolar resonances, respectively for both TE and TM modes. Further optimization of the metal layer thickness, provides an improvement of up to 80% modulation at 0.57 THz. The simultaneously tunable dual band isotropic metamaterial will enable the realization of high performance electro-optic devices that would facilitate numerous terahertz applications such as compressive terahertz imaging, miniaturized terahertz spectroscopy and next generation high speed wireless communication possible in the near future.

  16. Preserving cell shape under environmental stress.

    Science.gov (United States)

    Cook, Boaz; Hardy, Robert W; McConnaughey, William B; Zuker, Charles S

    2008-03-20

    Maintaining cell shape and tone is crucial for the function and survival of cells and tissues. Mechanotransduction relies on the transformation of minuscule mechanical forces into high-fidelity electrical responses. When mechanoreceptors are stimulated, mechanically sensitive cation channels open and produce an inward transduction current that depolarizes the cell. For this process to operate effectively, the transduction machinery has to retain integrity and remain unfailingly independent of environmental changes. This is particularly challenging for poikilothermic organisms, where changes in temperature in the environment may impact the function of mechanoreceptor neurons. Thus, we wondered how insects whose habitat might quickly vary over several tens of degrees of temperature manage to maintain highly effective mechanical senses. We screened for Drosophila mutants with defective mechanical responses at elevated ambient temperatures, and identified a gene, spam, whose role is to protect the mechanosensory organ from massive cellular deformation caused by heat-induced osmotic imbalance. Here we show that Spam protein forms an extracellular shield that guards mechanosensory neurons from environmental insult. Remarkably, heterologously expressed Spam protein also endowed other cells with superb defence against physically and chemically induced deformation. We studied the mechanical impact of Spam coating and show that spam-coated cells are up to ten times stiffer than uncoated controls. Together, these results help explain how poikilothermic organisms preserve the architecture of critical cells during environmental stress, and illustrate an elegant and simple solution to such challenge.

  17. Functional Dehydrated Foods for Health Preservation

    Directory of Open Access Journals (Sweden)

    R. M. S. C. Morais

    2018-01-01

    Full Text Available The market of functional foods has experienced a huge growth in the last decades due to the increased consumers’ awareness in a healthy lifestyle. Dried fruits constitute good snacks, in alternative to salty or sweet ones, and food ingredients due to their taste and nutritional/health benefits. Bioactive molecules are interesting sources to develop functional foods, as they play a major role in improving the health status and minimizing disease risks. The bioactive compounds most widely discussed in literature are presented in this review, for example, polyphenols, phytosterols, and prebiotics. Different technologies to dry bioproducts for producing functional foods or ingredients are presented. New drying techniques for the preservation of bioactive compounds are proposed, focusing more specifically on dielectric drying. A discussion on the techniques that can be used to optimize drying processes is performed. An overview on dehydrated plant based foods with probiotics is provided. The microorganisms used, impregnation procedures, drying methods, and evaluated parameters are presented and discussed. The principal bioactive compounds responsible for nutritional and health benefits of plant derived dried food products—fruits and vegetables, fruits and vegetables by-products, grains, nuts, and algae—are presented. Phytochemical losses occurring during pretreatments and/or drying processes are also discussed.

  18. Fossil oak galls preserve ancient multitrophic interactions.

    Science.gov (United States)

    Stone, Graham N; van der Ham, Raymond W J M; Brewer, Jan G

    2008-10-07

    Trace fossils of insect feeding have contributed substantially to our understanding of the evolution of insect-plant interactions. The most complex phenotypes of herbivory are galls, whose diagnostic morphologies often allow the identification of the gall inducer. Although fossil insect-induced galls over 300Myr old are known, most are two-dimensional impressions lacking adequate morphological detail either for the precise identification of the causer or for detection of the communities of specialist parasitoids and inquilines inhabiting modern plant galls. Here, we describe the first evidence for such multitrophic associations in Pleistocene fossil galls from the Eemian interglacial (130000-115000 years ago) of The Netherlands. The exceptionally well-preserved fossils can be attributed to extant species of Andricus gallwasps (Hymenoptera: Cynipidae) galling oaks (Quercus), and provide the first fossil evidence of gall attack by herbivorous inquiline gallwasps. Furthermore, phylogenetic placement of one fossil in a lineage showing obligate host plant alternation implies the presence of a second oak species, Quercus cerris, currently unknown from Eemian fossils in northwestern Europe. This contrasts with the southern European native range of Q. cerris in the current interglacial and suggests that gallwasp invasions following human planting of Q. cerris in northern Europe may represent a return to preglacial distribution limits.

  19. Working memory is partially preserved during sleep.

    Directory of Open Access Journals (Sweden)

    Jérôme Daltrozzo

    Full Text Available Although several cognitive processes, including speech processing, have been studied during sleep, working memory (WM has never been explored up to now. Our study assessed the capacity of WM by testing speech perception when the level of background noise and the sentential semantic length (SSL (amount of semantic information required to perceive the incongruence of a sentence were modulated. Speech perception was explored with the N400 component of the event-related potentials recorded to sentence final words (50% semantically congruent with the sentence, 50% semantically incongruent. During sleep stage 2 and paradoxical sleep: (1 without noise, a larger N400 was observed for (short and long SSL sentences ending with a semantically incongruent word compared to a congruent word (i.e. an N400 effect; (2 with moderate noise, the N400 effect (observed at wake with short and long SSL sentences was attenuated for long SSL sentences. Our results suggest that WM for linguistic information is partially preserved during sleep with a smaller capacity compared to wake.

  20. Energy Preserved Sampling for Compressed Sensing MRI

    Directory of Open Access Journals (Sweden)

    Yudong Zhang

    2014-01-01

    Full Text Available The sampling patterns, cost functions, and reconstruction algorithms play important roles in optimizing compressed sensing magnetic resonance imaging (CS-MRI. Simple random sampling patterns did not take into account the energy distribution in k-space and resulted in suboptimal reconstruction of MR images. Therefore, a variety of variable density (VD based samplings patterns had been developed. To further improve it, we propose a novel energy preserving sampling (ePRESS method. Besides, we improve the cost function by introducing phase correction and region of support matrix, and we propose iterative thresholding algorithm (ITA to solve the improved cost function. We evaluate the proposed ePRESS sampling method, improved cost function, and ITA reconstruction algorithm by 2D digital phantom and 2D in vivo MR brains of healthy volunteers. These assessments demonstrate that the proposed ePRESS method performs better than VD, POWER, and BKO; the improved cost function can achieve better reconstruction quality than conventional cost function; and the ITA is faster than SISTA and is competitive with FISTA in terms of computation time.