WorldWideScience

Sample records for range identifying key

  1. Using Range-Wide Abundance Modeling to Identify Key Conservation Areas for the Micro-Endemic Bolson Tortoise (Gopherus flavomarginatus.

    Directory of Open Access Journals (Sweden)

    Cinthya A Ureña-Aranda

    Full Text Available A widespread biogeographic pattern in nature is that population abundance is not uniform across the geographic range of species: most occurrence sites have relatively low numbers, whereas a few places contain orders of magnitude more individuals. The Bolson tortoise Gopherus flavomarginatus is endemic to a small region of the Chihuahuan Desert in Mexico, where habitat deterioration threatens this species with extinction. In this study we combined field burrows counts and the approach for modeling species abundance based on calculating the distance to the niche centroid to obtain range-wide abundance estimates. For the Bolson tortoise, we found a robust, negative relationship between observed burrows abundance and distance to the niche centroid, with a predictive capacity of 71%. Based on these results we identified four priority areas for the conservation of this microendemic and threatened tortoise. We conclude that this approach may be a useful approximation for identifying key areas for sampling and conservation efforts in elusive and rare species.

  2. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  3. BENCHMARKING - PRACTICAL TOOLS IDENTIFY KEY SUCCESS FACTORS

    Directory of Open Access Journals (Sweden)

    Olga Ju. Malinina

    2016-01-01

    Full Text Available The article gives a practical example of the application of benchmarking techniques. The object of study selected fashion store Company «HLB & M Hennes & Mauritz», located in the shopping center «Gallery», Krasnodar. Hennes & Mauritz. The purpose of this article is to identify the best ways to develop a fashionable brand clothing store Hennes & Mauritz on the basis of benchmarking techniques. On the basis of conducted market research is a comparative analysis of the data from different perspectives. The result of the author’s study is a generalization of the ndings, the development of the key success factors that will allow to plan a successful trading activities in the future, based on the best experience of competitors.

  4. Identifying Key Attributes for Protein Beverages.

    Science.gov (United States)

    Oltman, A E; Lopetcharat, K; Bastian, E; Drake, M A

    2015-06-01

    This study identified key attributes of protein beverages and evaluated effects of priming on liking of protein beverages. An adaptive choice-based conjoint study was conducted along with Kano analysis to gain insight on protein beverage consumers (n = 432). Attributes evaluated included label claim, protein type, amount of protein, carbohydrates, sweeteners, and metabolic benefits. Utility scores for levels and importance scores for attributes were determined. Subsequently, two pairs of clear acidic whey protein beverages were manufactured that differed by age of protein source or the amount of whey protein per serving. Beverages were evaluated by 151 consumers on two occasions with or without priming statements. One priming statement declared "great flavor," the other priming statement declared 20 g protein per serving. A two way analysis of variance was applied to discern the role of each priming statement. The most important attribute for protein beverages was sweetener type, followed by amount of protein, followed by type of protein followed by label claim. Beverages with whey protein, naturally sweetened, reduced sugar and ≥15 g protein per serving were most desired. Three consumer clusters were identified, differentiated by their preferences for protein type, sweetener and amount of protein. Priming statements positively impacted concept liking (P 0.05). Consistent with trained panel profiles of increased cardboard flavor with higher protein content, consumers liked beverages with 10 g protein more than beverages with 20 g protein (6.8 compared with 5.7, P appeal. © 2015 Institute of Food Technologists®

  5. Research Note Identifying key grazing indicators to monitor trends in ...

    African Journals Online (AJOL)

    Research Note Identifying key grazing indicators to monitor trends in the veld condition of Lambert's Bay Strandveld, South Africa. ... from which a minimum number of species necessary to monitor trends in the condition of the veld were determined, making it user-friendly for land-users, extension officers and others. The key ...

  6. Social Network Analysis Identifies Key Participants in Conservation Development.

    Science.gov (United States)

    Farr, Cooper M; Reed, Sarah E; Pejchar, Liba

    2018-05-01

    Understanding patterns of participation in private lands conservation, which is often implemented voluntarily by individual citizens and private organizations, could improve its effectiveness at combating biodiversity loss. We used social network analysis (SNA) to examine participation in conservation development (CD), a private land conservation strategy that clusters houses in a small portion of a property while preserving the remaining land as protected open space. Using data from public records for six counties in Colorado, USA, we compared CD participation patterns among counties and identified actors that most often work with others to implement CDs. We found that social network characteristics differed among counties. The network density, or proportion of connections in the network, varied from fewer than 2 to nearly 15%, and was higher in counties with smaller populations and fewer CDs. Centralization, or the degree to which connections are held disproportionately by a few key actors, was not correlated strongly with any county characteristics. Network characteristics were not correlated with the prevalence of wildlife-friendly design features in CDs. The most highly connected actors were biological and geological consultants, surveyors, and engineers. Our work demonstrates a new application of SNA to land-use planning, in which CD network patterns are examined and key actors are identified. For better conservation outcomes of CD, we recommend using network patterns to guide strategies for outreach and information dissemination, and engaging with highly connected actor types to encourage widespread adoption of best practices for CD design and stewardship.

  7. Identifying key hospital service quality factors in online health communities.

    Science.gov (United States)

    Jung, Yuchul; Hur, Cinyoung; Jung, Dain; Kim, Minki

    2015-04-07

    The volume of health-related user-created content, especially hospital-related questions and answers in online health communities, has rapidly increased. Patients and caregivers participate in online community activities to share their experiences, exchange information, and ask about recommended or discredited hospitals. However, there is little research on how to identify hospital service quality automatically from the online communities. In the past, in-depth analysis of hospitals has used random sampling surveys. However, such surveys are becoming impractical owing to the rapidly increasing volume of online data and the diverse analysis requirements of related stakeholders. As a solution for utilizing large-scale health-related information, we propose a novel approach to identify hospital service quality factors and overtime trends automatically from online health communities, especially hospital-related questions and answers. We defined social media-based key quality factors for hospitals. In addition, we developed text mining techniques to detect such factors that frequently occur in online health communities. After detecting these factors that represent qualitative aspects of hospitals, we applied a sentiment analysis to recognize the types of recommendations in messages posted within online health communities. Korea's two biggest online portals were used to test the effectiveness of detection of social media-based key quality factors for hospitals. To evaluate the proposed text mining techniques, we performed manual evaluations on the extraction and classification results, such as hospital name, service quality factors, and recommendation types using a random sample of messages (ie, 5.44% (9450/173,748) of the total messages). Service quality factor detection and hospital name extraction achieved average F1 scores of 91% and 78%, respectively. In terms of recommendation classification, performance (ie, precision) is 78% on average. Extraction and

  8. Key clinical features to identify girls with CDKL5 mutations.

    Science.gov (United States)

    Bahi-Buisson, Nadia; Nectoux, Juliette; Rosas-Vargas, Haydeé; Milh, Mathieu; Boddaert, Nathalie; Girard, Benoit; Cances, Claude; Ville, Dorothée; Afenjar, Alexandra; Rio, Marlène; Héron, Delphine; N'guyen Morel, Marie Ange; Arzimanoglou, Alexis; Philippe, Christophe; Jonveaux, Philippe; Chelly, Jamel; Bienvenu, Thierry

    2008-10-01

    Mutations in the human X-linked cyclin-dependent kinase-like 5 (CDKL5) gene have been shown to cause infantile spasms as well as Rett syndrome (RTT)-like phenotype. To date, less than 25 different mutations have been reported. So far, there are still little data on the key clinical diagnosis criteria and on the natural history of CDKL5-associated encephalopathy. We screened the entire coding region of CDKL5 for mutations in 183 females with encephalopathy with early seizures by denaturing high liquid performance chromatography and direct sequencing, and we identified in 20 unrelated girls, 18 different mutations including 7 novel mutations. These mutations were identified in eight patients with encephalopathy with RTT-like features, five with infantile spasms and seven with encephalopathy with refractory epilepsy. Early epilepsy with normal interictal EEG and severe hypotonia are the key clinical features in identifying patients likely to have CDKL5 mutations. Our study also indicates that these patients clearly exhibit some RTT features such as deceleration of head growth, stereotypies and hand apraxia and that these RTT features become more evident in older and ambulatory patients. However, some RTT signs are clearly absent such as the so called RTT disease profile (period of nearly normal development followed by regression with loss of acquired fine finger skill in early childhood and characteristic intensive eye communication) and the characteristic evolution of the RTT electroencephalogram. Interestingly, in addition to the overall stereotypical symptomatology (age of onset and evolution of the disease) resulting from CDKL5 mutations, atypical forms of CDKL5-related conditions have also been observed. Our data suggest that phenotypic heterogeneity does not correlate with the nature or the position of the mutations or with the pattern of X-chromosome inactivation, but most probably with the functional transcriptional and/or translational consequences of CDKL5

  9. Identifying key genes associated with acute myocardial infarction.

    Science.gov (United States)

    Cheng, Ming; An, Shoukuan; Li, Junquan

    2017-10-01

    This study aimed to identify key genes associated with acute myocardial infarction (AMI) by reanalyzing microarray data. Three gene expression profile datasets GSE66360, GSE34198, and GSE48060 were downloaded from GEO database. After data preprocessing, genes without heterogeneity across different platforms were subjected to differential expression analysis between the AMI group and the control group using metaDE package. P FI) network. Then, DEGs in each module were subjected to pathway enrichment analysis using DAVID. MiRNAs and transcription factors predicted to regulate target DEGs were identified. Quantitative real-time polymerase chain reaction (RT-PCR) was applied to verify the expression of genes. A total of 913 upregulated genes and 1060 downregulated genes were identified in the AMI group. A FI network consists of 21 modules and DEGs in 12 modules were significantly enriched in pathways. The transcription factor-miRNA-gene network contains 2 transcription factors FOXO3 and MYBL2, and 2 miRNAs hsa-miR-21-5p and hsa-miR-30c-5p. RT-PCR validations showed that expression levels of FOXO3 and MYBL2 were significantly increased in AMI, and expression levels of hsa-miR-21-5p and hsa-miR-30c-5p were obviously decreased in AMI. A total of 41 DEGs, such as SOCS3, VAPA, and COL5A2, are speculated to have roles in the pathogenesis of AMI; 2 transcription factors FOXO3 and MYBL2, and 2 miRNAs hsa-miR-21-5p and hsa-miR-30c-5p may be involved in the regulation of the expression of these DEGs.

  10. Identifying the key concerns of Irish persons with intellectual disability.

    Science.gov (United States)

    García Iriarte, Edurne; O'Brien, Patricia; McConkey, Roy; Wolfe, Marie; O'Doherty, Siobhain

    2014-11-01

    Internationally, people with intellectual disability are socially marginalized, and their rights under the United Nations Convention for the Rights of Persons with Disabilities (CRPD) are often ignored. This paper aims to define the key concerns of adults with an intellectual disability in relation to their participation in society using an inclusive research strategy for both data gathering and data analysis. A national study involving 23 focus groups and 168 persons was conducted on the island of Ireland with people with intellectual disability as co-facilitators. A thematic content analysis was undertaken of the verbatim transcripts initially by university co-researchers, and 19 themes were identified. Co-researchers with intellectual disability joined in identifying the eight core themes. These were as follows: living options, employment, relationships, citizenship, leisure time, money management, self-advocacy, and communication. The concerns are discussed within the framework of the CRPD, and implications for transforming service policy are drawn. Why we did the research In many countries, people with intellectual disability have difficulties doing things other people without disabilities do, for example to study, to get a job or to live independently. They also find that their rights are not respected under the Convention on the Rights of Persons with Disabilities (the Convention). We did this study to Learn what are the main issues for adults with intellectual disability in Ireland. Do research with people with intellectual disability. How we did the research People with intellectual disability and their supporters worked with university researchers to plan and do the research. We met with people in groups and 168 people told us about things important to them. What we found out We found that there were very important things that people talked about in the groups. We chose the most important: living options, employment, relationships, rights, leisure, money

  11. Risk and Performance Technologies: Identifying the Keys to Successful Implementation

    International Nuclear Information System (INIS)

    McClain, Lynn; Smith, Art; O'Regan, Patrick

    2002-01-01

    The nuclear power industry has been utilizing risk and performance based technologies for over thirty years. Applications of these technologies have included risk assessment (e.g. Individual Plant Examinations), burden reduction (e.g. Risk-Informed Inservice Inspection, RI-ISI) and risk management (Maintenance Rule, 10CFR50.65). Over the last five to ten years the number of risk-informed (RI) burden reduction initiatives has increased. Unfortunately, the efficiencies of some of these applications have been questionable. This paper investigates those attributes necessary to support successful, cost-effective RI-applications. The premise to this paper is that by understanding the key attributes that support one successful application, insights can be gleaned that will streamline/coordinate future RI-applications. This paper is an extension to a paper presented at the Pressure Vessel and Piping (PVP-2001) Conference. In that paper, a number issues and opportunities were identified that needed to be assessed in order to support future (and efficient) RI-applications. It was noted in the paper that a proper understanding and resolution of these issues will facilitate implementation of risk and performance technology in the operation, maintenance and design disciplines. In addition, it will provide the foundation necessary to support regulatory review and approval. (authors)

  12. A Sensitivity Analysis Approach to Identify Key Environmental Performance Factors

    Directory of Open Access Journals (Sweden)

    Xi Yu

    2014-01-01

    Full Text Available Life cycle assessment (LCA is widely used in design phase to reduce the product’s environmental impacts through the whole product life cycle (PLC during the last two decades. The traditional LCA is restricted to assessing the environmental impacts of a product and the results cannot reflect the effects of changes within the life cycle. In order to improve the quality of ecodesign, it is a growing need to develop an approach which can reflect the changes between the design parameters and product’s environmental impacts. A sensitivity analysis approach based on LCA and ecodesign is proposed in this paper. The key environmental performance factors which have significant influence on the products’ environmental impacts can be identified by analyzing the relationship between environmental impacts and the design parameters. Users without much environmental knowledge can use this approach to determine which design parameter should be first considered when (redesigning a product. A printed circuit board (PCB case study is conducted; eight design parameters are chosen to be analyzed by our approach. The result shows that the carbon dioxide emission during the PCB manufacture is highly sensitive to the area of PCB panel.

  13. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  14. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  15. Key Clinical Features to Identify Girls with "CDKL5" Mutations

    Science.gov (United States)

    Bahi-Buisson, Nadia; Nectoux, Juliette; Rosas-Vargas, Haydee; Milh, Mathieu; Boddaert, Nathalie; Girard, Benoit; Cances, Claude; Ville, Dorothee; Afenjar, Alexandra; Rio, Marlene; Heron, Delphine; Morel, Marie Ange N'Guyen; Arzimanoglou, Alexis; Philippe, Christophe; Jonveaux, Philippe; Chelly, Jamel; Bienvenu, Thierry

    2008-01-01

    Mutations in the human X-linked cyclin-dependent kinase-like 5 ("CDKL5") gene have been shown to cause infantile spasms as well as Rett syndrome (RTT)-like phenotype. To date, less than 25 different mutations have been reported. So far, there are still little data on the key clinical diagnosis criteria and on the natural history of…

  16. Human-automation collaboration in manufacturing: identifying key implementation factors

    OpenAIRE

    Charalambous, George; Fletcher, Sarah; Webb, Philip

    2013-01-01

    Human-automation collaboration refers to the concept of human operators and intelligent automation working together interactively within the same workspace without conventional physical separation. This concept has commanded significant attention in manufacturing because of the potential applications, such as the installation of large sub-assemblies. However, the key human factors relevant to human-automation collaboration have not yet been fully investigated. To maximise effective implement...

  17. Identifying the Key Weaknesses in Network Security at Colleges.

    Science.gov (United States)

    Olsen, Florence

    2000-01-01

    A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)

  18. Identifying key nodes in multilayer networks based on tensor decomposition.

    Science.gov (United States)

    Wang, Dingjie; Wang, Haitao; Zou, Xiufen

    2017-06-01

    The identification of essential agents in multilayer networks characterized by different types of interactions is a crucial and challenging topic, one that is essential for understanding the topological structure and dynamic processes of multilayer networks. In this paper, we use the fourth-order tensor to represent multilayer networks and propose a novel method to identify essential nodes based on CANDECOMP/PARAFAC (CP) tensor decomposition, referred to as the EDCPTD centrality. This method is based on the perspective of multilayer networked structures, which integrate the information of edges among nodes and links between different layers to quantify the importance of nodes in multilayer networks. Three real-world multilayer biological networks are used to evaluate the performance of the EDCPTD centrality. The bar chart and ROC curves of these multilayer networks indicate that the proposed approach is a good alternative index to identify real important nodes. Meanwhile, by comparing the behavior of both the proposed method and the aggregated single-layer methods, we demonstrate that neglecting the multiple relationships between nodes may lead to incorrect identification of the most versatile nodes. Furthermore, the Gene Ontology functional annotation demonstrates that the identified top nodes based on the proposed approach play a significant role in many vital biological processes. Finally, we have implemented many centrality methods of multilayer networks (including our method and the published methods) and created a visual software based on the MATLAB GUI, called ENMNFinder, which can be used by other researchers.

  19. Parallel sort with a ranged, partitioned key-value store in a high perfomance computing environment

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary; Torres, Aaron; Poole, Stephen W.

    2016-01-26

    Improved sorting techniques are provided that perform a parallel sort using a ranged, partitioned key-value store in a high performance computing (HPC) environment. A plurality of input data files comprising unsorted key-value data in a partitioned key-value store are sorted. The partitioned key-value store comprises a range server for each of a plurality of ranges. Each input data file has an associated reader thread. Each reader thread reads the unsorted key-value data in the corresponding input data file and performs a local sort of the unsorted key-value data to generate sorted key-value data. A plurality of sorted, ranged subsets of each of the sorted key-value data are generated based on the plurality of ranges. Each sorted, ranged subset corresponds to a given one of the ranges and is provided to one of the range servers corresponding to the range of the sorted, ranged subset. Each range server sorts the received sorted, ranged subsets and provides a sorted range. A plurality of the sorted ranges are concatenated to obtain a globally sorted result.

  20. Identifying key performance indicators for nursing and midwifery care using a consensus approach.

    Science.gov (United States)

    McCance, Tanya; Telford, Lorna; Wilson, Julie; Macleod, Olive; Dowd, Audrey

    2012-04-01

    The aim of this study was to gain consensus on key performance indicators that are appropriate and relevant for nursing and midwifery practice in the current policy context. There is continuing demand to demonstrate effectiveness and efficiency in health and social care and to communicate this at boardroom level. Whilst there is substantial literature on the use of clinical indicators and nursing metrics, there is less evidence relating to indicators that reflect the patient experience. A consensus approach was used to identify relevant key performance indicators. A nominal group technique was used comprising two stages: a workshop involving all grades of nursing and midwifery staff in two HSC trusts in Northern Ireland (n = 50); followed by a regional Consensus Conference (n = 80). During the workshop, potential key performance indicators were identified. This was used as the basis for the Consensus Conference, which involved two rounds of consensus. Analysis was based on aggregated scores that were then ranked. Stage one identified 38 potential indicators and stage two prioritised the eight top-ranked indicators as a core set for nursing and midwifery. The relevance and appropriateness of these indicators were confirmed with nurses and midwives working in a range of settings and from the perspective of service users. The eight indicators identified do not conform to the majority of other nursing metrics generally reported in the literature. Furthermore, they are strategically aligned to work on the patient experience and are reflective of the fundamentals of nursing and midwifery practice, with the focus on person-centred care. Nurses and midwives have a significant contribution to make in determining the extent to which these indicators are achieved in practice. Furthermore, measurement of such indicators provides an opportunity to evidence of the unique impact of nursing/midwifery care on the patient experience. © 2011 Blackwell Publishing Ltd.

  1. Identifying Key Stakeholder Groups for Implementing a Place Branding Policy in Saint Petersburg

    Directory of Open Access Journals (Sweden)

    Kulibanova V. V.

    2017-10-01

    Full Text Available Regional brands have become a valuable intangible asset and a crucial competitive resource for forging partnerships. An effective place branding policy is impossible without a precise understanding of the interests of stakeholder groups. It is essential to realize that each region is unique in its own way. Territories differ in the structure of stakeholders, their influence on regional development, and the range of leverages over regional decision-makers. This study aims to give a more precise definition of key groups of stakeholders in Saint Petersburg place branding, and to identify them. The authors employ the method of theoretical and empirical typology of a territory’s stakeholders within a theoretical framework proposed by E. Freeman, P. Kotler, S. Zenker, and E. Brown. The article defines the concept of key regional stakeholders and identifies them. The proposed target audience (stakeholder group model for a place branding policy is tested on the case of Saint Petersburg. The authors show that each target audience of place marketing requires an individual policy. This is explained by the fact that each group enjoys its unique features that should be taken into account when creating and transmitting messages.

  2. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  3. Using sensitivity analysis to identify key factors for the propagation of a plant epidemic.

    Science.gov (United States)

    Rimbaud, Loup; Bruchou, Claude; Dallot, Sylvie; Pleydell, David R J; Jacquot, Emmanuel; Soubeyrand, Samuel; Thébaud, Gaël

    2018-01-01

    Identifying the key factors underlying the spread of a disease is an essential but challenging prerequisite to design management strategies. To tackle this issue, we propose an approach based on sensitivity analyses of a spatiotemporal stochastic model simulating the spread of a plant epidemic. This work is motivated by the spread of sharka, caused by plum pox virus , in a real landscape. We first carried out a broad-range sensitivity analysis, ignoring any prior information on six epidemiological parameters, to assess their intrinsic influence on model behaviour. A second analysis benefited from the available knowledge on sharka epidemiology and was thus restricted to more realistic values. The broad-range analysis revealed that the mean duration of the latent period is the most influential parameter of the model, whereas the sharka-specific analysis uncovered the strong impact of the connectivity of the first infected orchard. In addition to demonstrating the interest of sensitivity analyses for a stochastic model, this study highlights the impact of variation ranges of target parameters on the outcome of a sensitivity analysis. With regard to sharka management, our results suggest that sharka surveillance may benefit from paying closer attention to highly connected patches whose infection could trigger serious epidemics.

  4. Exploring the effects of spatial autocorrelation when identifying key drivers of wildlife crop-raiding.

    Science.gov (United States)

    Songhurst, Anna; Coulson, Tim

    2014-03-01

    Few universal trends in spatial patterns of wildlife crop-raiding have been found. Variations in wildlife ecology and movements, and human spatial use have been identified as causes of this apparent unpredictability. However, varying spatial patterns of spatial autocorrelation (SA) in human-wildlife conflict (HWC) data could also contribute. We explicitly explore the effects of SA on wildlife crop-raiding data in order to facilitate the design of future HWC studies. We conducted a comparative survey of raided and nonraided fields to determine key drivers of crop-raiding. Data were subsampled at different spatial scales to select independent raiding data points. The model derived from all data was fitted to subsample data sets. Model parameters from these models were compared to determine the effect of SA. Most methods used to account for SA in data attempt to correct for the change in P-values; yet, by subsampling data at broader spatial scales, we identified changes in regression estimates. We consequently advocate reporting both model parameters across a range of spatial scales to help biological interpretation. Patterns of SA vary spatially in our crop-raiding data. Spatial distribution of fields should therefore be considered when choosing the spatial scale for analyses of HWC studies. Robust key drivers of elephant crop-raiding included raiding history of a field and distance of field to a main elephant pathway. Understanding spatial patterns and determining reliable socio-ecological drivers of wildlife crop-raiding is paramount for designing mitigation and land-use planning strategies to reduce HWC. Spatial patterns of HWC are complex, determined by multiple factors acting at more than one scale; therefore, studies need to be designed with an understanding of the effects of SA. Our methods are accessible to a variety of practitioners to assess the effects of SA, thereby improving the reliability of conservation management actions.

  5. A User Centered Innovation Approach Identifying Key User Values for the E-Newspaper

    OpenAIRE

    Carina Ihlström Eriksson; Jesper Svensson

    2009-01-01

    We have studied the pre-adoption phase of the e-newspaper, i.e. a newspaper published with e-paper technology. The research question of this article is: In what way can a user centered innovation process contribute to identifying key values in mobile innovations? The aim of this article is threefold: firstly, to identify key values for the e-newspaper, secondly, to examine the intention to adopt a new possible innovation and thirdly, to explore user centered design processes ability to captur...

  6. Key Issues in Empirically Identifying Chronically Low-Performing and Turnaround Schools

    Science.gov (United States)

    Hansen, Michael

    2012-01-01

    One of the US Department of Education's key priorities is turning around the nation's persistently low-achieving schools, yet exactly how to identify low-performing schools is a task left to state policy makers, and a myriad of definitions have been utilized. In addition, exactly how to recognize when a school begins to turn around is not well…

  7. Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Kramer, Sharon; Previsic, Mirko; Nelson, Peter; Woo, Sheri

    2010-06-17

    Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: 4 wave energy generation technologies 3 tidal energy generation technologies 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal

  8. Identifying the impacts of climate change on key pests and diseases of plant and animal industries

    International Nuclear Information System (INIS)

    Luck, Jo; Aurambout, Jean-Philippe; Finlay, Kyla; Azuloas, Joe; Constable, Fiona; Rijswijk, Bonny Rowles-Van

    2007-01-01

    Full text: Full text: Climate change is increasingly recognised as a major threat to natural and agricultural systems. Understanding these threats will enable government and primary industries to better prepare and adapt to climate change. While observations of climate change are well documented, the potential effects on pests, pathogens and their hosts are not clearly understood. To address this, a review of the potential impacts on plant biosecurity was undertaken to determine the effects of climate change on the behaviour and distribution of emergent plant pests and pathogens. The review identified increasing C02 and temperature, decreasing frost events, heavy and unseasonal rains, increased humidity, drought, cyclones and hurricanes, and warmer winter temperatures as influencing the behaviour of plant pests and pathogens. To study the effects of these changes in detail, three key plant biosecurity threats were analysed in case studies; wheat stripe rust, silver leaf whitefly and citrus canker. The predicted distribution of citrus canker was examined with increasing temperature scenarios using the bioclimatic model CLIMEX. The model predicted a southerly shift in the geographic range of the causal organism which would threaten the major southern citrus growing regions in future climates. A similar study on Bluetongue disease of sheep, spread by the Culicoides midge, also predicted a southerly shift in the vector's geographic range. Significant limitations were identified with bioclimatic modelling when examining the effects of climate change on pests and diseases. The model was unable to assess the plant and animal response to increasing temperature in conjunction with the pest. Also the influence of temperature on the life cycle of the organism, pathogenicity of strains, competition with other species, host coverage and the general effect on the biology of the organism could not be assessed. To begin to address this, a dynamic model was constructed using daily

  9. Integrated systems approach identifies risk regulatory pathways and key regulators in coronary artery disease.

    Science.gov (United States)

    Zhang, Yan; Liu, Dianming; Wang, Lihong; Wang, Shuyuan; Yu, Xuexin; Dai, Enyu; Liu, Xinyi; Luo, Shanshun; Jiang, Wei

    2015-12-01

    Coronary artery disease (CAD) is the most common type of heart disease. However, the molecular mechanisms of CAD remain elusive. Regulatory pathways are known to play crucial roles in many pathogenic processes. Thus, inferring risk regulatory pathways is an important step toward elucidating the mechanisms underlying CAD. With advances in high-throughput data, we developed an integrated systems approach to identify CAD risk regulatory pathways and key regulators. Firstly, a CAD-related core subnetwork was identified from a curated transcription factor (TF) and microRNA (miRNA) regulatory network based on a random walk algorithm. Secondly, candidate risk regulatory pathways were extracted from the subnetwork by applying a breadth-first search (BFS) algorithm. Then, risk regulatory pathways were prioritized based on multiple CAD-associated data sources. Finally, we also proposed a new measure to prioritize upstream regulators. We inferred that phosphatase and tensin homolog (PTEN) may be a key regulator in the dysregulation of risk regulatory pathways. This study takes a closer step than the identification of disease subnetworks or modules. From the risk regulatory pathways, we could understand the flow of regulatory information in the initiation and progression of the disease. Our approach helps to uncover its potential etiology. We developed an integrated systems approach to identify risk regulatory pathways. We proposed a new measure to prioritize the key regulators in CAD. PTEN may be a key regulator in dysregulation of the risk regulatory pathways.

  10. Iterative key-residues interrogation of a phytase with thermostability increasing substitutions identified in directed evolution.

    Science.gov (United States)

    Shivange, Amol V; Roccatano, Danilo; Schwaneberg, Ulrich

    2016-01-01

    Bacterial phytases have attracted industrial interest as animal feed supplement due to their high activity and sufficient thermostability (required for feed pelleting). We devised an approach named KeySIDE,  an iterative Key-residues interrogation of the wild type with Substitutions Identified in Directed Evolution for improving Yersinia mollaretii phytase (Ymphytase) thermostability by combining key beneficial substitutions and elucidating their individual roles. Directed evolution yielded in a discovery of nine positions in Ymphytase and combined iteratively to identify key positions. The "best" combination (M6: T77K, Q154H, G187S, and K289Q) resulted in significantly improved thermal resistance; the residual activity improved from 35 % (wild type) to 89 % (M6) at 58 °C and 20-min incubation. Melting temperature increased by 3 °C in M6 without a loss of specific activity. Molecular dynamics simulation studies revealed reduced flexibility in the loops located next to helices (B, F, and K) which possess substitutions (Helix-B: T77K, Helix-F: G187S, and Helix-K: K289E/Q). Reduced flexibility in the loops might be caused by strengthened hydrogen bonding network (e.g., G187S and K289E/K289Q) and a salt bridge (T77K). Our results demonstrate a promising approach to design phytases in food research, and we hope that the KeySIDE might become an attractive approach for understanding of structure-function relationships of enzymes.

  11. Postsecondary Students With Psychiatric Disabilities Identify Core Services and Key Ingredients to Supporting Education Goals.

    Science.gov (United States)

    Biebel, Kathleen; Mizrahi, Raphael; Ringeisen, Heather

    2017-10-26

    Accessing and successfully completing postsecondary educational opportunities may be challenging for those living with psychiatric disabilities. This exploratory study highlights the experiences of individuals with psychiatric disabilities participating in postsecondary educational support initiatives. Investigators conducted case studies with 3 education support initiatives across the United States. Focus groups revealed what concrete supported education services were helpful and key ingredients in delivering education supports. Access to specialists, mindfulness techniques, help with time management and procrastination, and facilitating classroom accommodations were identified as critical. Developing authentic relationships with supported education staff, flexibility in service delivery and access to student peers living with psychiatric disabilities were noted as key ingredients in service delivery. Incorporating the voice of students with psychiatric disabilities into supported education services can increase access, involvement, and retention, therein providing more supports to students with psychiatric disabilities achieving their postsecondary education goals. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  12. Methods of Developing User-Friendly Keys to Identify Green Sea Turtles (Chelonia mydas L. from Photographs

    Directory of Open Access Journals (Sweden)

    Jane R. Lloyd

    2012-01-01

    Full Text Available Identifying individual animals is important in understanding their ecology and behaviour, as well as providing estimates of population sizes for conservation efforts. We produce identification keys from photographs of green sea turtles to identify them while foraging in Akumal Bay, Mexico. We create three keys, which (a minimise the length of the key, (b present the most obvious differential characteristics first, and (c remove the strict dichotomy from key b. Keys were capable of identifying >99% of turtles in >2500 photographs during the six-month study period. The keys differed significantly in success rate for students to identify individual turtles, with key (c being the best with >70% success and correctly being followed further than other keys before making a mistake. User-friendly keys are, therefore, a suitable method for the photographic identification of turtles and could be used for other large marine vertebrates in conservation or behavioural studies.

  13. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana

    OpenAIRE

    Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original mult...

  14. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana.

    Science.gov (United States)

    Engel, Julien; Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original multi-access electronic key for the identification of 389 tree genera occurring in French Guiana terra-firme forests, based on a set of 79 morphological characters related to vegetative, floral and fruit characters. Its purpose is to help Amazonian tree identification and to support the dissemination of botanical knowledge to non-specialists, including forest workers, students and researchers from other scientific disciplines. The electronic key is accessible with the free access software Xper ², and the database is publicly available on figshare: https://figshare.com/s/75d890b7d707e0ffc9bf (doi: 10.6084/m9.figshare.2682550).

  15. Identifying and characterizing key nodes among communities based on electrical-circuit networks.

    Science.gov (United States)

    Zhu, Fenghui; Wang, Wenxu; Di, Zengru; Fan, Ying

    2014-01-01

    Complex networks with community structures are ubiquitous in the real world. Despite many approaches developed for detecting communities, we continue to lack tools for identifying overlapping and bridging nodes that play crucial roles in the interactions and communications among communities in complex networks. Here we develop an algorithm based on the local flow conservation to effectively and efficiently identify and distinguish the two types of nodes. Our method is applicable in both undirected and directed networks without a priori knowledge of the community structure. Our method bypasses the extremely challenging problem of partitioning communities in the presence of overlapping nodes that may belong to multiple communities. Due to the fact that overlapping and bridging nodes are of paramount importance in maintaining the function of many social and biological networks, our tools open new avenues towards understanding and controlling real complex networks with communities accompanied with the key nodes.

  16. Identifying and weighting of key performance indicators of knowledge management2.0 in organizations

    Directory of Open Access Journals (Sweden)

    Saeed Khalilazar

    2016-03-01

    Full Text Available Main purpose of this research is identifying and weighting of key performance indicators of knowledge management2.0 in organizations. According to widespread permeation of technology, especially social media in different organizational dimensions and functional view to this phenomenon in knowledge management, performance measurement of this kind of media in order to meet organizational goals seems necessary. KM2.0 key performance indicators in this article has been identified and weighted through Delphi methodology, via questionnaire in three rounds. KM2.0 KPIs which are identified and weighted in this article are applicable in organizations that are eager to implement KM2.0 initiative and they can measure the performance of KM2.0 activities therefore this research is applicable in goal oriented approach. According to the results, KM2.0 participation process consists of 3 stages and 8 steps as mentioned below: First stage which is presence, consists of 3 steps which are registration, visit and download. Second stage which is feedback consists of 3 steps which are conversation, applause and amplification. Finally, third stage which is creation consists of 2 steps which are codification and personalization. Ultimate contribution of this research is identifying and weighting KPIs of KM2.0 in conceptual framework of KM2.0. Based on developing a conceptual framework and participation process in KM2.0 and listing related KPIs as an applicable solution in order to measure and improve the performance of organizational social media, this research has unique innovation among related and other articles.

  17. Identifying Key Drivers of Return Reversal with Dynamical Bayesian Factor Graph.

    Directory of Open Access Journals (Sweden)

    Shuai Zhao

    Full Text Available In the stock market, return reversal occurs when investors sell overbought stocks and buy oversold stocks, reversing the stocks' price trends. In this paper, we develop a new method to identify key drivers of return reversal by incorporating a comprehensive set of factors derived from different economic theories into one unified dynamical Bayesian factor graph. We then use the model to depict factor relationships and their dynamics, from which we make some interesting discoveries about the mechanism behind return reversals. Through extensive experiments on the US stock market, we conclude that among the various factors, the liquidity factors consistently emerge as key drivers of return reversal, which is in support of the theory of liquidity effect. Specifically, we find that stocks with high turnover rates or high Amihud illiquidity measures have a greater probability of experiencing return reversals. Apart from the consistent drivers, we find other drivers of return reversal that generally change from year to year, and they serve as important characteristics for evaluating the trends of stock returns. Besides, we also identify some seldom discussed yet enlightening inter-factor relationships, one of which shows that stocks in Finance and Insurance industry are more likely to have high Amihud illiquidity measures in comparison with those in other industries. These conclusions are robust for return reversals under different thresholds.

  18. Identifying key radiogenomic associations between DCE-MRI and micro-RNA expressions for breast cancer

    Science.gov (United States)

    Samala, Ravi K.; Chan, Heang-Ping; Hadjiiski, Lubomir; Helvie, Mark A.; Kim, Renaid

    2017-03-01

    Understanding the key radiogenomic associations for breast cancer between DCE-MRI and micro-RNA expressions is the foundation for the discovery of radiomic features as biomarkers for assessing tumor progression and prognosis. We conducted a study to analyze the radiogenomic associations for breast cancer using the TCGA-TCIA data set. The core idea that tumor etiology is a function of the behavior of miRNAs is used to build the regression models. The associations based on regression are analyzed for three study outcomes: diagnosis, prognosis, and treatment. The diagnosis group consists of miRNAs associated with clinicopathologic features of breast cancer and significant aberration of expression in breast cancer patients. The prognosis group consists of miRNAs which are closely associated with tumor suppression and regulation of cell proliferation and differentiation. The treatment group consists of miRNAs that contribute significantly to the regulation of metastasis thereby having the potential to be part of therapeutic mechanisms. As a first step, important miRNA expressions were identified and their ability to classify the clinical phenotypes based on the study outcomes was evaluated using the area under the ROC curve (AUC) as a figure-of-merit. The key mapping between the selected miRNAs and radiomic features were determined using least absolute shrinkage and selection operator (LASSO) regression analysis within a two-loop leave-one-out cross-validation strategy. These key associations indicated a number of radiomic features from DCE-MRI to be potential biomarkers for the three study outcomes.

  19. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    Directory of Open Access Journals (Sweden)

    Hualin Xie

    2014-02-01

    Full Text Available Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability.

  20. [Key effect genes responding to nerve injury identified by gene ontology and computer pattern recognition].

    Science.gov (United States)

    Pan, Qian; Peng, Jin; Zhou, Xue; Yang, Hao; Zhang, Wei

    2012-07-01

    In order to screen out important genes from large gene data of gene microarray after nerve injury, we combine gene ontology (GO) method and computer pattern recognition technology to find key genes responding to nerve injury, and then verify one of these screened-out genes. Data mining and gene ontology analysis of gene chip data GSE26350 was carried out through MATLAB software. Cd44 was selected from screened-out key gene molecular spectrum by comparing genes' different GO terms and positions on score map of principal component. Function interferences were employed to influence the normal binding of Cd44 and one of its ligands, chondroitin sulfate C (CSC), to observe neurite extension. Gene ontology analysis showed that the first genes on score map (marked by red *) mainly distributed in molecular transducer activity, receptor activity, protein binding et al molecular function GO terms. Cd44 is one of six effector protein genes, and attracted us with its function diversity. After adding different reagents into the medium to interfere the normal binding of CSC and Cd44, varying-degree remissions of CSC's inhibition on neurite extension were observed. CSC can inhibit neurite extension through binding Cd44 on the neuron membrane. This verifies that important genes in given physiological processes can be identified by gene ontology analysis of gene chip data.

  1. Identifying the key personnel in a nurse-initiated hospital waste reduction program.

    Science.gov (United States)

    McDermott-Levy, Ruth; Fazzini, Carol

    2010-01-01

    Hospitals in the United States generate more than 6600 tons of trash a day and approximately 85% of the waste is nonhazardous solid waste such as food, cardboard, and plastic. Treatment and management of hospital waste can lead to environmental problems for the communities that receive the waste. One health system's shared governance model provided the foundation to develop a nurse-led hospital waste reduction program that focused on point-of-care waste management. Waste reduction program development required working with a variety of departments within and external to the health system. The interdisciplinary approach informed the development of the waste reduction program. This article identifies the key departments that were necessary to include when developing a hospital waste reduction program.

  2. Identifying Determinants of Organizational Development as the Key Developers of Employee Soft Skill

    Directory of Open Access Journals (Sweden)

    Shahjahan Laghari

    2016-10-01

    Full Text Available The purpose of this article is to identify the determinants of organizational development as the key developers of employee soft skills. Various studies have been taken where determinants of organizational development defining soft skills in employees are discussed. However, the current study is different in Pakistani industry context as the link was missing about the determinants of organizational development which in synchronized way help in developing soft skills in employees of firm. This research uses explanatory approach; incorporating secondary data extracted under the light of existing school of thoughts paired with quantification through data collected from respondents in Pakistani corporate sector. Hypotheses are tested using structural equation model (SEM technique. Results This research showed an affirmative link between determinants of organizational development and development of soft skills in employees. Finally, the study proposes enriching insights on few missing links that can be researched and triggered achieving maximized outcomes.

  3. A mouse model of alcoholic liver fibrosis-associated acute kidney injury identifies key molecular pathways

    International Nuclear Information System (INIS)

    Furuya, Shinji; Chappell, Grace A.; Iwata, Yasuhiro; Uehara, Takeki; Kato, Yuki; Kono, Hiroshi; Bataller, Ramon; Rusyn, Ivan

    2016-01-01

    Clinical data strongly indicate that acute kidney injury (AKI) is a critical complication in alcoholic hepatitis, an acute-on-chronic form of liver failure in patients with advanced alcoholic fibrosis. Development of targeted therapies for AKI in this setting is hampered by the lack of an animal model. To enable research into molecular drivers and novel therapies for fibrosis- and alcohol-associated AKI, we aimed to combine carbon tetrachloride (CCl 4 )-induced fibrosis with chronic intra-gastric alcohol feeding. Male C57BL/6J mice were administered a low dose of CCl 4 (0.2 ml/kg 2 × week/6 weeks) followed by alcohol intragastrically (up to 25 g/kg/day for 3 weeks) and with continued CCl 4 . We observed that combined treatment with CCl 4 and alcohol resulted in severe liver injury, more pronounced than using each treatment alone. Importantly, severe kidney injury was evident only in the combined treatment group. This mouse model reproduced distinct pathological features consistent with AKI in human alcoholic hepatitis. Transcriptomic analysis of kidneys revealed profound effects in the combined treatment group, with enrichment for damage-associated pathways, such as apoptosis, inflammation, immune-response and hypoxia. Interestingly, Havcr1 and Lcn2, biomarkers of AKI, were markedly up-regulated. Overall, this study established a novel mouse model of fibrosis- and alcohol-associated AKI and identified key mechanistic pathways. - Highlights: • Acute kidney injury (AKI) is a critical complication in alcoholic hepatitis • We developed a novel mouse model of fibrosis- and alcohol-associated AKI • This model reproduces key molecular and pathological features of human AKI • This animal model can help identify new targeted therapies for alcoholic hepatitis

  4. A mouse model of alcoholic liver fibrosis-associated acute kidney injury identifies key molecular pathways

    Energy Technology Data Exchange (ETDEWEB)

    Furuya, Shinji; Chappell, Grace A.; Iwata, Yasuhiro [Department of Veterinary Integrative Biosciences, Texas A& M University, College Station, TX (United States); Uehara, Takeki; Kato, Yuki [Laboratory of Veterinary Pathology, Osaka Prefecture University, Osaka (Japan); Kono, Hiroshi [First Department of Surgery, University of Yamanashi, Yamanashi (Japan); Bataller, Ramon [Division of Gastroenterology & Hepatology, Department of Medicine, University of North Carolina, Chapel Hill, NC (United States); Rusyn, Ivan, E-mail: irusyn@tamu.edu [Department of Veterinary Integrative Biosciences, Texas A& M University, College Station, TX (United States)

    2016-11-01

    Clinical data strongly indicate that acute kidney injury (AKI) is a critical complication in alcoholic hepatitis, an acute-on-chronic form of liver failure in patients with advanced alcoholic fibrosis. Development of targeted therapies for AKI in this setting is hampered by the lack of an animal model. To enable research into molecular drivers and novel therapies for fibrosis- and alcohol-associated AKI, we aimed to combine carbon tetrachloride (CCl{sub 4})-induced fibrosis with chronic intra-gastric alcohol feeding. Male C57BL/6J mice were administered a low dose of CCl{sub 4} (0.2 ml/kg 2 × week/6 weeks) followed by alcohol intragastrically (up to 25 g/kg/day for 3 weeks) and with continued CCl{sub 4}. We observed that combined treatment with CCl{sub 4} and alcohol resulted in severe liver injury, more pronounced than using each treatment alone. Importantly, severe kidney injury was evident only in the combined treatment group. This mouse model reproduced distinct pathological features consistent with AKI in human alcoholic hepatitis. Transcriptomic analysis of kidneys revealed profound effects in the combined treatment group, with enrichment for damage-associated pathways, such as apoptosis, inflammation, immune-response and hypoxia. Interestingly, Havcr1 and Lcn2, biomarkers of AKI, were markedly up-regulated. Overall, this study established a novel mouse model of fibrosis- and alcohol-associated AKI and identified key mechanistic pathways. - Highlights: • Acute kidney injury (AKI) is a critical complication in alcoholic hepatitis • We developed a novel mouse model of fibrosis- and alcohol-associated AKI • This model reproduces key molecular and pathological features of human AKI • This animal model can help identify new targeted therapies for alcoholic hepatitis.

  5. Predictive model identifies key network regulators of cardiomyocyte mechano-signaling.

    Directory of Open Access Journals (Sweden)

    Philip M Tan

    2017-11-01

    Full Text Available Mechanical strain is a potent stimulus for growth and remodeling in cells. Although many pathways have been implicated in stretch-induced remodeling, the control structures by which signals from distinct mechano-sensors are integrated to modulate hypertrophy and gene expression in cardiomyocytes remain unclear. Here, we constructed and validated a predictive computational model of the cardiac mechano-signaling network in order to elucidate the mechanisms underlying signal integration. The model identifies calcium, actin, Ras, Raf1, PI3K, and JAK as key regulators of cardiac mechano-signaling and characterizes crosstalk logic imparting differential control of transcription by AT1R, integrins, and calcium channels. We find that while these regulators maintain mostly independent control over distinct groups of transcription factors, synergy between multiple pathways is necessary to activate all the transcription factors necessary for gene transcription and hypertrophy. We also identify a PKG-dependent mechanism by which valsartan/sacubitril, a combination drug recently approved for treating heart failure, inhibits stretch-induced hypertrophy, and predict further efficacious pairs of drug targets in the network through a network-wide combinatorial search.

  6. Modelling Creativity: Identifying Key Components through a Corpus-Based Approach.

    Science.gov (United States)

    Jordanous, Anna; Keller, Bill

    2016-01-01

    Creativity is a complex, multi-faceted concept encompassing a variety of related aspects, abilities, properties and behaviours. If we wish to study creativity scientifically, then a tractable and well-articulated model of creativity is required. Such a model would be of great value to researchers investigating the nature of creativity and in particular, those concerned with the evaluation of creative practice. This paper describes a unique approach to developing a suitable model of how creative behaviour emerges that is based on the words people use to describe the concept. Using techniques from the field of statistical natural language processing, we identify a collection of fourteen key components of creativity through an analysis of a corpus of academic papers on the topic. Words are identified which appear significantly often in connection with discussions of the concept. Using a measure of lexical similarity to help cluster these words, a number of distinct themes emerge, which collectively contribute to a comprehensive and multi-perspective model of creativity. The components provide an ontology of creativity: a set of building blocks which can be used to model creative practice in a variety of domains. The components have been employed in two case studies to evaluate the creativity of computational systems and have proven useful in articulating achievements of this work and directions for further research.

  7. Identifying Key Performance Indicators for Holistic Hospital Management with a Modified DEMATEL Approach.

    Science.gov (United States)

    Si, Sheng-Li; You, Xiao-Yue; Liu, Hu-Chen; Huang, Jia

    2017-08-19

    Performance analysis is an important way for hospitals to achieve higher efficiency and effectiveness in providing services to their customers. The performance of the healthcare system can be measured by many indicators, but it is difficult to improve them simultaneously due to the limited resources. A feasible way is to identify the central and influential indicators to improve healthcare performance in a stepwise manner. In this paper, we propose a hybrid multiple criteria decision making (MCDM) approach to identify key performance indicators (KPIs) for holistic hospital management. First, through integrating evidential reasoning approach and interval 2-tuple linguistic variables, various assessments of performance indicators provided by healthcare experts are modeled. Then, the decision making trial and evaluation laboratory (DEMATEL) technique is adopted to build an interactive network and visualize the causal relationships between the performance indicators. Finally, an empirical case study is provided to demonstrate the proposed approach for improving the efficiency of healthcare management. The results show that "accidents/adverse events", "nosocomial infection", ''incidents/errors", "number of operations/procedures" are significant influential indicators. Also, the indicators of "length of stay", "bed occupancy" and "financial measures" play important roles in performance evaluation of the healthcare organization. The proposed decision making approach could be considered as a reference for healthcare administrators to enhance the performance of their healthcare institutions.

  8. Computational modeling identifies key gene regulatory interactions underlying phenobarbital-mediated tumor promotion

    Science.gov (United States)

    Luisier, Raphaëlle; Unterberger, Elif B.; Goodman, Jay I.; Schwarz, Michael; Moggs, Jonathan; Terranova, Rémi; van Nimwegen, Erik

    2014-01-01

    Gene regulatory interactions underlying the early stages of non-genotoxic carcinogenesis are poorly understood. Here, we have identified key candidate regulators of phenobarbital (PB)-mediated mouse liver tumorigenesis, a well-characterized model of non-genotoxic carcinogenesis, by applying a new computational modeling approach to a comprehensive collection of in vivo gene expression studies. We have combined our previously developed motif activity response analysis (MARA), which models gene expression patterns in terms of computationally predicted transcription factor binding sites with singular value decomposition (SVD) of the inferred motif activities, to disentangle the roles that different transcriptional regulators play in specific biological pathways of tumor promotion. Furthermore, transgenic mouse models enabled us to identify which of these regulatory activities was downstream of constitutive androstane receptor and β-catenin signaling, both crucial components of PB-mediated liver tumorigenesis. We propose novel roles for E2F and ZFP161 in PB-mediated hepatocyte proliferation and suggest that PB-mediated suppression of ESR1 activity contributes to the development of a tumor-prone environment. Our study shows that combining MARA with SVD allows for automated identification of independent transcription regulatory programs within a complex in vivo tissue environment and provides novel mechanistic insights into PB-mediated hepatocarcinogenesis. PMID:24464994

  9. Identifying key areas for active interprofessional learning partnerships: A facilitated dialogue.

    Science.gov (United States)

    Steven, Kathryn; Angus, Allyson; Breckenridge, Jenna; Davey, Peter; Tully, Vicki; Muir, Fiona

    2016-11-01

    Student and service user involvement is recognised as an important factor in creating interprofessional education (IPE) opportunities. We used a team-based learning approach to bring together undergraduate health professional students, early career professionals (ECPs), public partners, volunteers, and carers to explore learning partnerships. Influenced by evaluative inquiry, this qualitative study used a free text response to allow participants to give their own opinion. A total of 153 participants (50 public partners and 103 students and professionals representing 11 healthcare professions) took part. Participants were divided into mixed groups of six (n = 25) and asked to identify areas where students, professionals, and public could work together to improve health professional education. Each group documented their discussions by summarising agreed areas and next steps. Responses were collected and transcribed for inductive content analysis. Seven key themes (areas for joint working) were identified: communication, public as partners, standards of conduct, IPE, quality improvement, education, and learning environments. The team-based learning format enabled undergraduate and postgraduate health professionals to achieve consensus with public partners on areas for IPE and collaboration. Some of our results may be context-specific but the approach is generalisable to other areas.

  10. Key identifiers and spelling conventions in MXit-lingo as found in conversations with Dr Math

    Directory of Open Access Journals (Sweden)

    Laurie Butgereit

    2012-07-01

    Full Text Available Different human languages look different from other human languages. To use a term from the computer industry, each human language has its own “look and feel”. European English speakers can easily recognise a phrase such as “Comment allez-vous?” as being written in French while the phrase “¿Habla usted español?” is written in Spanish. Each language has its own letter frequencies, word frequencies and other identifiers. This paper describes key identifiers in MXit lingo as found in Dr Math conversations. MXit is a mobile instant messaging system which originated in South Africa and is expanding to other countries. Dr Math is a mobile tutoring system which uses MXit as a communication protocol. Primary and secondary school pupils can receive help with the mathematics homework using the Dr Math tutoring system. The pupils use MXit on their cell phones and the tutors use traditional Internet workstations. After exploring how MXit lingo is written, this paper will briefly explore why MXit lingo is written the way it is. By identifying and describing the orthographic conventions visible in the spelling of MXit lingo, although with some theoretical support, insight into the purposeful and functional nature of written, mobile communication will be revealed. In highlighting spelling that is influenced by Black South African English, an attempt will be made to contribute to the empirical development of a field of study that explores the construction of words used in South African mobile communication. Keywords: MXit, Math, letters, writing, orthography Disciplines: Linguistics, mathematics, information technology

  11. Identifying key drivers of greenhouse gas emissions from biomass feedstocks for energy production

    International Nuclear Information System (INIS)

    Johnson, David R.; Curtright, Aimee E.; Willis, Henry H.

    2013-01-01

    Highlights: • Production emissions dominate transportation and processing emissions. • Choice of feedstock, geographic location and prior land use drive emissions profile. • Within scenarios, emissions variability is driven by uncertainty in yields. • Favorable scenarios maximize carbon storage from direct land-use change. • Similarly, biomass production should attempt to minimize indirect land-use change. -- Abstract: Many policies in the United States, at both the federal and state levels, encourage the adoption of renewable energy from biomass. Though largely motivated by a desire to reduce greenhouse gas emissions, these policies do not explicitly identify scenarios in which the use of biomass will produce the greatest benefits. We have modeled “farm-to-hopper” emissions associated with seven biomass feedstocks, under a wide variety of scenarios and production choices, to characterize the uncertainty in emissions. We demonstrate that only a handful of factors have a significant impact on life cycle emissions: choice of feedstock, geographic location, prior land use, and time dynamics. Within a given production scenario, the remaining variability in emissions is driven by uncertainty in feedstock yields and the release rate of N 2 O into the atmosphere from nitrogen fertilizers. With few exceptions, transport and processing choices have relatively little impact on total emissions. These results illustrate the key decisions that will determine the success of biomass programs in reducing the emissions profile of energy production, and our publicly available model provides a useful tool for identifying the most beneficial production scenarios. While model data and results are restricted to biomass production in the contiguous United States, we provide qualitative guidance for identifying favorable production scenarios that should be applicable in other regions

  12. Experimental infections with Mycoplasma agalactiae identify key factors involved in host-colonization.

    Directory of Open Access Journals (Sweden)

    Eric Baranowski

    Full Text Available Mechanisms underlying pathogenic processes in mycoplasma infections are poorly understood, mainly because of limited sequence similarities with classical, bacterial virulence factors. Recently, large-scale transposon mutagenesis in the ruminant pathogen Mycoplasma agalactiae identified the NIF locus, including nifS and nifU, as essential for mycoplasma growth in cell culture, while dispensable in axenic media. To evaluate the importance of this locus in vivo, the infectivity of two knock-out mutants was tested upon experimental infection in the natural host. In this model, the parental PG2 strain was able to establish a systemic infection in lactating ewes, colonizing various body sites such as lymph nodes and the mammary gland, even when inoculated at low doses. In these PG2-infected ewes, we observed over the course of infection (i the development of a specific antibody response and (ii dynamic changes in expression of M. agalactiae surface variable proteins (Vpma, with multiple Vpma profiles co-existing in the same animal. In contrast and despite a sensitive model, none of the knock-out mutants were able to survive and colonize the host. The extreme avirulent phenotype of the two mutants was further supported by the absence of an IgG response in inoculated animals. The exact role of the NIF locus remains to be elucidated but these data demonstrate that it plays a key role in the infectious process of M. agalactiae and most likely of other pathogenic mycoplasma species as many carry closely related homologs.

  13. The Use of Key Informant Method for Identifying Children with Blindness and Severe Visual Impairment in Developing Countries.

    Science.gov (United States)

    du Toit, Rènée; Courtright, Paul; Lewallen, Susan

    2017-06-01

    An estimated 19 million children are visually impaired; of these, 1.4 million are irreversibly blind. A key challenge is to identify them early in life to benefit maximally from visual rehabilitation, and/or treatment. This aggregative review and structured literature analysis summarizes evidence of what it is about the key informant (KI) approach that works to identify children with blindness or severe visual impairment (B/SVI) in the community (for whom, to what extent, in what circumstances, in what respect, how and why). Peer-reviewed (PubMed, hand search) and grey literature (Google, World Health Organization website, academic theses, direct requests) were included, and methods and criteria used for identification, productivity (number of children referred per KI), accuracy of referrals (positive predictive value, PPV), age of children with B/SVI, KI definition, sex, information about cost and comparisons aggregated. We included 31 documents describing 22 unique KI programs. Mostly KIs identified children with B/SVI in 1-3 weeks, i.e. "campaign mode." In 60%, KIs were community volunteers, others formal health sector workers (FHSW). Around 0.02-1.56 children per KI (median = 0.25) were successfully recruited. PPV ranged from 12 to 66%. In two studies comparing FHSWs and community KIs, the latter were 8 and 10 times more productive. KIs working in campaign mode may provide an effective approach to identifying children with B/SVI in communities. Including identification of ocular problems and/or other impairments has been recommended. Research on factors that influence effectiveness and on whether KIs continue to contribute could inform programs.

  14. Preparedness for physiotherapy in private practice: Novices identify key factors in an interpretive description study.

    Science.gov (United States)

    Atkinson, Robyn; McElroy, Theresa

    2016-04-01

    Physiotherapists in Australia deliver services to a diverse range of clients, across many settings, however little research exists examining graduate preparedness for practice, even in the populous field of private practice. To explore novice physiotherapist perspectives on preparedness for work in private practice. The qualitative approach of interpretive description was used to guide in-depth interviews with 8 novice physiotherapists from 3 universities working in 5 private practices in Melbourne. All interviews were digitally recorded, transcribed verbatim and analyzed thematically. Four main themes influencing graduate preparedness for work in private practice were identified: 1) non-curricular experiences (e.g. sports training) 2) elective curricular: practicum experiences; 3) curricular: attainment of skills specific to private practice; and 4) the private practice setting: supportive colleagues. This combination of non-curricular, curricular, and practice setting factors offered the necessary scaffolding for the graduates to report feeling prepared for work in private practice. Non-curricular activities, radiological instruction, clinical placements, building supportive colleague relations and professional development in private practice are recommended as potential means of building preparedness in novice therapists. Findings have implications for physiotherapy students, educators and private practice clinics looking to recruit new graduates. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Challenges in identifying sites climatically matched to the native ranges of animal invaders

    Science.gov (United States)

    Rodda, G.H.; Jarnevich, C.S.; Reed, R.N.

    2011-01-01

    Background: Species distribution models are often used to characterize a species' native range climate, so as to identify sites elsewhere in the world that may be climatically similar and therefore at risk of invasion by the species. This endeavor provoked intense public controversy over recent attempts to model areas at risk of invasion by the Indian Python (Python molurus). We evaluated a number of MaxEnt models on this species to assess MaxEnt's utility for vertebrate climate matching. Methodology/Principal Findings: Overall, we found MaxEnt models to be very sensitive to modeling choices and selection of input localities and background regions. As used, MaxEnt invoked minimal protections against data dredging, multi-collinearity of explanatory axes, and overfitting. As used, MaxEnt endeavored to identify a single ideal climate, whereas different climatic considerations may determine range boundaries in different parts of the native range. MaxEnt was extremely sensitive to both the choice of background locations for the python, and to selection of presence points: inclusion of just four erroneous localities was responsible for Pyron et al.'s conclusion that no additional portions of the U.S. mainland were at risk of python invasion. When used with default settings, MaxEnt overfit the realized climate space, identifying models with about 60 parameters, about five times the number of parameters justifiable when optimized on the basis of Akaike's Information Criterion. Conclusions/Significance: When used with default settings, MaxEnt may not be an appropriate vehicle for identifying all sites at risk of colonization. Model instability and dearth of protections against overfitting, multi-collinearity, and data dredging may combine with a failure to distinguish fundamental from realized climate envelopes to produce models of limited utility. A priori identification of biologically realistic model structure, combined with computational protections against these

  16. Challenges in identifying sites climatically matched to the native ranges of animal invaders.

    Directory of Open Access Journals (Sweden)

    Gordon H Rodda

    Full Text Available BACKGROUND: Species distribution models are often used to characterize a species' native range climate, so as to identify sites elsewhere in the world that may be climatically similar and therefore at risk of invasion by the species. This endeavor provoked intense public controversy over recent attempts to model areas at risk of invasion by the Indian Python (Python molurus. We evaluated a number of MaxEnt models on this species to assess MaxEnt's utility for vertebrate climate matching. METHODOLOGY/PRINCIPAL FINDINGS: Overall, we found MaxEnt models to be very sensitive to modeling choices and selection of input localities and background regions. As used, MaxEnt invoked minimal protections against data dredging, multi-collinearity of explanatory axes, and overfitting. As used, MaxEnt endeavored to identify a single ideal climate, whereas different climatic considerations may determine range boundaries in different parts of the native range. MaxEnt was extremely sensitive to both the choice of background locations for the python, and to selection of presence points: inclusion of just four erroneous localities was responsible for Pyron et al.'s conclusion that no additional portions of the U.S. mainland were at risk of python invasion. When used with default settings, MaxEnt overfit the realized climate space, identifying models with about 60 parameters, about five times the number of parameters justifiable when optimized on the basis of Akaike's Information Criterion. CONCLUSIONS/SIGNIFICANCE: When used with default settings, MaxEnt may not be an appropriate vehicle for identifying all sites at risk of colonization. Model instability and dearth of protections against overfitting, multi-collinearity, and data dredging may combine with a failure to distinguish fundamental from realized climate envelopes to produce models of limited utility. A priori identification of biologically realistic model structure, combined with computational protections

  17. Challenges in identifying sites climatically matched to the native ranges of animal invaders.

    Science.gov (United States)

    Rodda, Gordon H; Jarnevich, Catherine S; Reed, Robert N

    2011-02-09

    Species distribution models are often used to characterize a species' native range climate, so as to identify sites elsewhere in the world that may be climatically similar and therefore at risk of invasion by the species. This endeavor provoked intense public controversy over recent attempts to model areas at risk of invasion by the Indian Python (Python molurus). We evaluated a number of MaxEnt models on this species to assess MaxEnt's utility for vertebrate climate matching. Overall, we found MaxEnt models to be very sensitive to modeling choices and selection of input localities and background regions. As used, MaxEnt invoked minimal protections against data dredging, multi-collinearity of explanatory axes, and overfitting. As used, MaxEnt endeavored to identify a single ideal climate, whereas different climatic considerations may determine range boundaries in different parts of the native range. MaxEnt was extremely sensitive to both the choice of background locations for the python, and to selection of presence points: inclusion of just four erroneous localities was responsible for Pyron et al.'s conclusion that no additional portions of the U.S. mainland were at risk of python invasion. When used with default settings, MaxEnt overfit the realized climate space, identifying models with about 60 parameters, about five times the number of parameters justifiable when optimized on the basis of Akaike's Information Criterion. When used with default settings, MaxEnt may not be an appropriate vehicle for identifying all sites at risk of colonization. Model instability and dearth of protections against overfitting, multi-collinearity, and data dredging may combine with a failure to distinguish fundamental from realized climate envelopes to produce models of limited utility. A priori identification of biologically realistic model structure, combined with computational protections against these statistical problems, may produce more robust models of invasion risk.

  18. Free-ranging domestic cats (Felis catus) on public lands: estimating density, activity, and diet in the Florida Keys

    Science.gov (United States)

    Cove, Michael V.; Gardner, Beth; Simons, Theodore R.; Kays, Roland; O'Connell, Allan F.

    2017-01-01

    Feral and free-ranging domestic cats (Felis catus) can have strong negative effects on small mammals and birds, particularly in island ecosystems. We deployed camera traps to study free-ranging cats in national wildlife refuges and state parks on Big Pine Key and Key Largo in the Florida Keys, USA, and used spatial capture–recapture models to estimate cat abundance, movement, and activities. We also used stable isotope analyses to examine the diet of cats captured on public lands. Top population models separated cats based on differences in movement and detection with three and two latent groups on Big Pine Key and Key Largo, respectively. We hypothesize that these latent groups represent feral, semi-feral, and indoor/outdoor house cats based on the estimated movement parameters of each group. Estimated cat densities and activity varied between the two islands, with relatively high densities (~4 cats/km2) exhibiting crepuscular diel patterns on Big Pine Key and lower densities (~1 cat/km2) exhibiting nocturnal diel patterns on Key Largo. These differences are most likely related to the higher proportion of house cats on Big Pine relative to Key Largo. Carbon and nitrogen isotope ratios from hair samples of free-ranging cats (n = 43) provided estimates of the proportion of wild and anthropogenic foods in cat diets. At the population level, cats on both islands consumed mostly anthropogenic foods (>80% of the diet), but eight individuals were effective predators of wildlife (>50% of the diet). We provide evidence that cat groups within a population move different distances, exhibit different activity patterns, and that individuals consume wildlife at different rates, which all have implications for managing this invasive predator.

  19. Fragmentation patterns of evergreen oak woodlands in Southwestern Iberia: identifying key spatial indicators.

    Science.gov (United States)

    Costa, Augusta; Madeira, Manuel; Lima Santos, José; Plieninger, Tobias; Seixas, Júlia

    2014-01-15

    Mediterranean evergreen oak woodlands (composed of Quercus suber L. and Quercus rotundifolia Lam.) are becoming increasingly fragmented in the human-modified landscapes of Southwestern Portugal and Spain. Previous studies have largely neglected to assess the spatial changes of oak woodlands in relation to their surrounding landscape matrix, and to characterize and quantify woodland boundaries and edges. The present study aims to fill this gap by analyzing fragmentation patterns of oak woodlands over a 50-year period (1958-2007) in three landscapes. Using archived aerial imagery from 1958, 1995 and 2007, for two consecutive periods (1958-1995 and 1995-2007), we calculated a set of landscape metrics to compare woodland fragmentation over time. Our results indicated a continuous woodland fragmentation characterized by their edge dynamics. From 1958 to 2007, the replacement of open farmland by shrubland and by new afforestation areas in the oak woodland landscape surrounding matrix, led to the highest values for edge contrast length trends of 5.0 and 12.3, respectively. Linear discriminant analysis was performed to delineate fragmented woodland structures and identify metric variables that characterize woodland spatial configuration. The edge contrast length with open farmland showed a strong correlation with F1 (correlations ranging between 0.55 and 0.98) and may be used as a proxy for oak woodland mixedness in landscape matrix. The edge dynamics of oak woodlands may result in different patterns of oak recruitment and therefore, its study may be helpful in highlighting future baselines for the sustainable management of oak woodlands. Copyright © 2013 Elsevier Ltd. All rights reserved.

  20. Identifying Key Features of Student Performance in Educational Video Games and Simulations through Cluster Analysis

    Science.gov (United States)

    Kerr, Deirdre; Chung, Gregory K. W. K.

    2012-01-01

    The assessment cycle of "evidence-centered design" (ECD) provides a framework for treating an educational video game or simulation as an assessment. One of the main steps in the assessment cycle of ECD is the identification of the key features of student performance. While this process is relatively simple for multiple choice tests, when…

  1. Identifying Key Stakeholders in Blended Tertiary Environments: Experts' Perspectives

    Science.gov (United States)

    Tuapawa, Kimberley

    2017-01-01

    Although key stakeholders in blended tertiary environments (BTEs) fulfil an extraordinary role in higher education, significant gaps in knowledge about their identities may be impeding the provision of stakeholder support, limiting their ability to promote effective learning and teaching. As online growth intensifies, it is critical that tertiary…

  2. MEMS Keys as a Way to Delay the Phase of the Microwave Range

    Directory of Open Access Journals (Sweden)

    Anton Antonenko

    2015-04-01

    Full Text Available The paper deals with a new type of phase shifter antennas scanned beam shows the principle of constructing controlled microwave phase shifters that have a low cost. Also, given the results of a theoretical study of the main characteristics of dependency - controlled phase shift and frequency band working on the design parameters and then refined by calculating finite element program CST Microwave Studio. These inexpensive scanned antenna can be used in radar centimeter and millimeter wavelengths in the frequency range 2 ¸ 30 GHz. The results of calculation of capacitive and inductive coupling during switching detector elements and the simulation results of the phase shift in passing through the phase shifter television signal containing includes microelectromechanical systems - manageable sections that have to change the direction of polarization of the signal. Thus for supplying voltage-controlled permanent magnet field is used. According to the simulation results, which are presented in the conclusions can be drawn about the development of the design of optimal geometric parameters, the values obtained for the results of the optimization modeling. However revealed a high quality factor switching phase.

  3. Identifying key research objectives to make European forests greener for bats

    Directory of Open Access Journals (Sweden)

    Danilo Russo

    2016-07-01

    Full Text Available Bats are a biodiverse mammal order providing key ecosystem services such as pest suppression, pollination and seed dispersal. Bats are also very sensitive to human actions, and significant declines in many bat populations have been recorded consequently. Many bat species find crucial roosting and foraging opportunities in European forests. Such forests have historically been exploited by humans and are still influenced by harvesting. One of the consequences of this pressure is the loss of key habitat resources, often making forests inhospitable to bats. Despite the legal protection granted to bats across Europe, the impacts of forestry on bats are still often neglected. Because forest exploitation influences forest structure at several spatial scales, economically viable forestry could become more sustainable and even favour bats. We highlight that a positive future for bat conservation that simultaneously benefits forestry is foreseeable, although more applied research is needed to develop sound management. Key future research topics include the detection of factors influencing the carrying capacity of forests, and determining the impacts of forest management and the economic importance of bats in forests. Predictive tools to inform forest managers are much needed, together with greater synergies between forest managers and bat conservationists.

  4. An Integrated Strategy to Identify Key Genes in Almond Adventitious Shoot Regeneration

    Science.gov (United States)

    Plant genetic transformation usually depends on efficient adventitious regeneration systems. In almond (Prunus dulcis Mill.), regeneration of transgenic adventitious shoots was achieved but with low efficiency. Histological studies identified two main stages of organogenesis in almond explants that ...

  5. Identifying Key Flavors in Strawberries Driving Liking via Internal and External Preference Mapping.

    Science.gov (United States)

    Oliver, Penelope; Cicerale, Sara; Pang, Edwin; Keast, Russell

    2018-04-01

    Australian consumers desire the development of a more flavorsome Australian strawberry cultivar. To aid in the development of well-liked strawberries, the attributes driving liking need to be identified. The objective of this research is to apply Preference Mapping (PM) techniques to the descriptive profile of commercial and newly bred strawberry cultivars, together with consumer preference data to determine the flavors contributing to liking. A trained sensory panel (n = 12) used Quantitative Descriptive Analysis (QDA®) methodology to evaluate two appearance, seven aroma, five texture, 10 flavor and 10 aftertaste attributes of three commercial strawberry cultivars and six elite breeding lines grown in Victoria, Australia. Strawberry consumers (n = 150) assessed their liking of the same strawberry cultivars. QDA® significantly discriminated strawberries on 28 of the 34 sensory attributes. There were significant differences in hedonic ratings of strawberries (F(8,714) = 11.5, P = 0.0001), with Hierarchical Cluster Analysis (HCA) identifying three consumer clusters each displaying differing patterns of preference. Internal and external PM techniques were applied to the data to identify the attributes driving consumer acceptability. Sweet, berry, caramel, fruity and floral attributes were identified as most contributing to liking. Sour, citrus, green, astringent, firm and gritty attributes were conversely associated with a reduction in consumer liking. Elite Lines 2 and 6 have been identified as having the broadest appeal, satisfying between 60% and 70% of consumers in the population assessed, thus the introduction of these cultivars should satisfy the largest group of consumers in the Australian market. The results of this research could be applied to breeding programs, to ensure newly bred cultivars express characteristics that were identified as well-liked amongst consumers. In addition, this research provides evidence for marketing strawberries by

  6. Labont? Identifies Key Issues for Health Promoters in the New World Order

    OpenAIRE

    Raphael, Dennis

    2016-01-01

    For over 35 years Ronald Labonté has been critically analyzing the state of health promotion in Canada and the world. In 1981, he identified the shortcomings of the groundbreaking Lalonde Report by warning of the seductive appeal of so-called lifestyle approaches to health. Since then, he has left a trail of critical work identifying the barriers to — and opportunities for —health promotion work. More recently, he has shown how the rise of economic globalization and acceptance of neo-liberal ...

  7. Identifying key performance indicators in food technology contract R&D

    NARCIS (Netherlands)

    Flipse, S.M.; Sanden, van der M.C.A.; Velden, van der T.; Fortuin, F.T.J.M.; Omta, S.W.F.; Osseweijer, P.

    2013-01-01

    Innovating companies increasingly rely on outsourcing to Contract Research Organisations (CROs) for their Research and Development (R&D), which are largely understudied. This paper presents the outcome of a case study in the field of food technology contract research, identifying context

  8. The Promise of Virtual Teams: Identifying Key Factors in Effectiveness and Failure

    Science.gov (United States)

    Horwitz, Frank M.; Bravington, Desmond; Silvis, Ulrik

    2006-01-01

    Purpose: The aim of the investigation is to identify enabling and disenabling factors in the development and operation of virtual teams; to evaluate the importance of factors such as team development, cross-cultural variables, leadership, communication and social cohesion as contributors to virtual team effectiveness. Design/methodology/approach:…

  9. Mergeomics: a web server for identifying pathological pathways, networks, and key regulators via multidimensional data integration.

    Science.gov (United States)

    Arneson, Douglas; Bhattacharya, Anindya; Shu, Le; Mäkinen, Ville-Petteri; Yang, Xia

    2016-09-09

    Human diseases are commonly the result of multidimensional changes at molecular, cellular, and systemic levels. Recent advances in genomic technologies have enabled an outpour of omics datasets that capture these changes. However, separate analyses of these various data only provide fragmented understanding and do not capture the holistic view of disease mechanisms. To meet the urgent needs for tools that effectively integrate multiple types of omics data to derive biological insights, we have developed Mergeomics, a computational pipeline that integrates multidimensional disease association data with functional genomics and molecular networks to retrieve biological pathways, gene networks, and central regulators critical for disease development. To make the Mergeomics pipeline available to a wider research community, we have implemented an online, user-friendly web server ( http://mergeomics. idre.ucla.edu/ ). The web server features a modular implementation of the Mergeomics pipeline with detailed tutorials. Additionally, it provides curated genomic resources including tissue-specific expression quantitative trait loci, ENCODE functional annotations, biological pathways, and molecular networks, and offers interactive visualization of analytical results. Multiple computational tools including Marker Dependency Filtering (MDF), Marker Set Enrichment Analysis (MSEA), Meta-MSEA, and Weighted Key Driver Analysis (wKDA) can be used separately or in flexible combinations. User-defined summary-level genomic association datasets (e.g., genetic, transcriptomic, epigenomic) related to a particular disease or phenotype can be uploaded and computed real-time to yield biologically interpretable results, which can be viewed online and downloaded for later use. Our Mergeomics web server offers researchers flexible and user-friendly tools to facilitate integration of multidimensional data into holistic views of disease mechanisms in the form of tissue-specific key regulators

  10. Identifying key factors for mobilising under-utilised low carbon land resources : A case study on Kalimantan

    NARCIS (Netherlands)

    Goh, Chun Sheng; Junginger, Martin; Potter, Lesley; Faaij, André; Wicke, Birka

    2018-01-01

    Mobilising under-utilised low carbon (ULC) land for future agricultural expansion helps minimising further carbon stock loss. This study examined the regency cases in Kalimantan, a carbon loss hotspot, to understand the key factors for mobilising ULC land via narrative interviews with a range of

  11. Identify and rank key factors influencing the adoption of cloud computing for a healthy Electronics

    Directory of Open Access Journals (Sweden)

    Javad Shukuhy

    2015-02-01

    Full Text Available Cloud computing as a new technology with Internet infrastructure and new approaches can be significant benefits in providing medical services electronically. Aplying this technology in E-Health requires consideration of various factors. The main objective of this study is to identify and rank the factors influencing the adoption of e-health cloud. Based on the Technology-Organization-Environment (TOE framework and Human-Organization-Technology fit (HOT-fit model, 16 sub-factors were identified in four major factors. With survey of 60 experts, academics and experts in health information technology and with the help of fuzzy analytic hierarchy process had ranked these sub-factors and factors. In the literature, considering newness this study, no internal or external study, have not alluded these number of criteria. The results show that when deciding to adopt cloud computing in E-Health, respectively, must be considered technological, human, organizational and environmental factors.

  12. Evaluating predictive models for solar energy growth in the US states and identifying the key drivers

    Science.gov (United States)

    Chakraborty, Joheen; Banerji, Sugata

    2018-03-01

    Driven by a desire to control climate change and reduce the dependence on fossil fuels, governments around the world are increasing the adoption of renewable energy sources. However, among the US states, we observe a wide disparity in renewable penetration. In this study, we have identified and cleaned over a dozen datasets representing solar energy penetration in each US state, and the potentially relevant socioeconomic and other factors that may be driving the growth in solar. We have applied a number of predictive modeling approaches - including machine learning and regression - on these datasets over a 17-year period and evaluated the relative performance of the models. Our goals were: (1) identify the most important factors that are driving the growth in solar, (2) choose the most effective predictive modeling technique for solar growth, and (3) develop a model for predicting next year’s solar growth using this year’s data. We obtained very promising results with random forests (about 90% efficacy) and varying degrees of success with support vector machines and regression techniques (linear, polynomial, ridge). We also identified states with solar growth slower than expected and representing a potential for stronger growth in future.

  13. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal

    DEFF Research Database (Denmark)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    , and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character......Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case...... also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication. The objective is addressed in a literature review and a case study. The literature...

  14. Predicting suicidal ideation in primary care: An approach to identify easily assessable key variables.

    Science.gov (United States)

    Jordan, Pascal; Shedden-Mora, Meike C; Löwe, Bernd

    To obtain predictors of suicidal ideation, which can also be used for an indirect assessment of suicidal ideation (SI). To create a classifier for SI based on variables of the Patient Health Questionnaire (PHQ) and sociodemographic variables, and to obtain an upper bound on the best possible performance of a predictor based on those variables. From a consecutive sample of 9025 primary care patients, 6805 eligible patients (60% female; mean age = 51.5 years) participated. Advanced methods of machine learning were used to derive the prediction equation. Various classifiers were applied and the area under the curve (AUC) was computed as a performance measure. Classifiers based on methods of machine learning outperformed ordinary regression methods and achieved AUCs around 0.87. The key variables in the prediction equation comprised four items - namely feelings of depression/hopelessness, low self-esteem, worrying, and severe sleep disturbances. The generalized anxiety disorder scale (GAD-7) and the somatic symptom subscale (PHQ-15) did not enhance prediction substantially. In predicting suicidal ideation researchers should refrain from using ordinary regression tools. The relevant information is primarily captured by the depression subscale and should be incorporated in a nonlinear model. For clinical practice, a classification tree using only four items of the whole PHQ may be advocated. Copyright © 2018 Elsevier Inc. All rights reserved.

  15. Co-extinction in a host-parasite network: identifying key hosts for network stability.

    Science.gov (United States)

    Dallas, Tad; Cornelius, Emily

    2015-08-17

    Parasites comprise a substantial portion of total biodiversity. Ultimately, this means that host extinction could result in many secondary extinctions of obligate parasites and potentially alter host-parasite network structure. Here, we examined a highly resolved fish-parasite network to determine key hosts responsible for maintaining parasite diversity and network structure (quantified here as nestedness and modularity). We evaluated four possible host extinction orders and compared the resulting co-extinction dynamics to random extinction simulations; including host removal based on estimated extinction risk, parasite species richness and host level contributions to nestedness and modularity. We found that all extinction orders, except the one based on realistic extinction risk, resulted in faster declines in parasite diversity and network structure relative to random biodiversity loss. Further, we determined species-level contributions to network structure were best predicted by parasite species richness and host family. Taken together, we demonstrate that a small proportion of hosts contribute substantially to network structure and that removal of these hosts results in rapid declines in parasite diversity and network structure. As network stability can potentially be inferred through measures of network structure, our findings may provide insight into species traits that confer stability.

  16. Genomic Landscape Survey Identifies SRSF1 as a Key Oncodriver in Small Cell Lung Cancer.

    Directory of Open Access Journals (Sweden)

    Liyan Jiang

    2016-04-01

    Full Text Available Small cell lung cancer (SCLC is an aggressive disease with poor survival. A few sequencing studies performed on limited number of samples have revealed potential disease-driving genes in SCLC, however, much still remains unknown, particularly in the Asian patient population. Here we conducted whole exome sequencing (WES and transcriptomic sequencing of primary tumors from 99 Chinese SCLC patients. Dysregulation of tumor suppressor genes TP53 and RB1 was observed in 82% and 62% of SCLC patients, respectively, and more than half of the SCLC patients (62% harbored TP53 and RB1 mutation and/or copy number loss. Additionally, Serine/Arginine Splicing Factor 1 (SRSF1 DNA copy number gain and mRNA over-expression was strongly associated with poor survival using both discovery and validation patient cohorts. Functional studies in vitro and in vivo demonstrate that SRSF1 is important for tumorigenicity of SCLC and may play a key role in DNA repair and chemo-sensitivity. These results strongly support SRSF1 as a prognostic biomarker in SCLC and provide a rationale for personalized therapy in SCLC.

  17. Identifying Key Features of Effective Active Learning: The Effects of Writing and Peer Discussion

    Science.gov (United States)

    Pangle, Wiline M.; Wyatt, Kevin H.; Powell, Karli N.; Sherwood, Rachel E.

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. PMID:25185230

  18. A matter of definition--key elements identified in a discourse analysis of definitions of palliative care.

    Science.gov (United States)

    Pastrana, T; Jünger, S; Ostgathe, C; Elsner, F; Radbruch, L

    2008-04-01

    For more than 30 years, the term "palliative care" has been used. From the outset, the term has undergone a series of transformations in its definitions and consequently in its tasks and goals. There remains a lack of consensus on a definition. The aim of this article is to analyse the definitions of palliative care in the specialist literature and to identify the key elements of palliative care using discourse analysis: a qualitative methodology. The literature search focused on definitions of the term 'palliative medicine' and 'palliative care' in the World Wide Web and medical reference books in English and German. A total of 37 English and 26 German definitions were identified and analysed. Our study confirmed the lack of a consistent meaning concerning the investigated terms, reflecting on-going discussion about the nature of the field among palliative care practitioners. Several common key elements were identified. Four main categories emerged from the discourse analysis of the definition of palliative care: target groups, structure, tasks and expertise. In addition, the theoretical principles and goals of palliative care were discussed and found to be key elements, with relief and prevention of suffering and improvement of quality of life as main goals. The identified key elements can contribute to the definition of the concept 'palliative care'. Our study confirms the importance of semantic and ethical influences on palliative care that should be considered in future research on semantics in different languages.

  19. Identifying key genes in rheumatoid arthritis by weighted gene co-expression network analysis.

    Science.gov (United States)

    Ma, Chunhui; Lv, Qi; Teng, Songsong; Yu, Yinxian; Niu, Kerun; Yi, Chengqin

    2017-08-01

    This study aimed to identify rheumatoid arthritis (RA) related genes based on microarray data using the WGCNA (weighted gene co-expression network analysis) method. Two gene expression profile datasets GSE55235 (10 RA samples and 10 healthy controls) and GSE77298 (16 RA samples and seven healthy controls) were downloaded from Gene Expression Omnibus database. Characteristic genes were identified using metaDE package. WGCNA was used to find disease-related networks based on gene expression correlation coefficients, and module significance was defined as the average gene significance of all genes used to assess the correlation between the module and RA status. Genes in the disease-related gene co-expression network were subject to functional annotation and pathway enrichment analysis using Database for Annotation Visualization and Integrated Discovery. Characteristic genes were also mapped to the Connectivity Map to screen small molecules. A total of 599 characteristic genes were identified. For each dataset, characteristic genes in the green, red and turquoise modules were most closely associated with RA, with gene numbers of 54, 43 and 79, respectively. These genes were enriched in totally enriched in 17 Gene Ontology terms, mainly related to immune response (CD97, FYB, CXCL1, IKBKE, CCR1, etc.), inflammatory response (CD97, CXCL1, C3AR1, CCR1, LYZ, etc.) and homeostasis (C3AR1, CCR1, PLN, CCL19, PPT1, etc.). Two small-molecule drugs sanguinarine and papaverine were predicted to have a therapeutic effect against RA. Genes related to immune response, inflammatory response and homeostasis presumably have critical roles in RA pathogenesis. Sanguinarine and papaverine have a potential therapeutic effect against RA. © 2017 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  20. Identifying key topics for a description of sexual behavior among Danish adolescents: A qualitative study

    DEFF Research Database (Denmark)

    Jørgensen, Marianne Johansson; Maindal, Helle Terkildsen; Olesen, Frede

    . Results: Four major categories of risk behavior were identified: Alcohol consumption is associated with “no condom use”, Nights on the town and meetings in foreign counties or at festivals are associated with one night stands and often lead to unsafe sex, Low self-esteem increases the risk of pushing one...... one Danish Folk High School, but with different social and educational backgrounds. The interview guide was developed from literature reviews and hypotheses based on years of experience with sexually transmitted infections. Data were transcribed verbatim and analyzed using qualitative description...

  1. Identifying Key Proteins in Hg Methylation Pathways of Desulfovibrio by Global Proteomics, Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Summers, Anne O. [Univ. of Georgia, Athens, GA (United States). Dept. of Microbiology; Miller, Susan M. [Univ. of California, San Francisco, CA (United States). Dept. of Pharmaceutical Chemistry; Wall, Judy [Univ. of Missouri, Columbia, MO (United States). Dept. of Biochemistry; Lipton, Mary [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-06-18

    Elemental mercury, Hg(0) is a contaminant at many DOE sites, especially at Oak Ridge National Laboratory (ORNL) where the spread of spilled Hg and its effects on microbial populations have been monitored for decades. To explore the microbial interactions with Hg, we have devised a global proteomic approach capable of directly detecting Hg-adducts of proteins. This technique developed in the facultative anaerobe, Escherichia coli, allows us to identify the proteins most vulnerable to acute exposure to organomercurials phenyl- and ethyl-mercury (as surrogates for the highly neurotoxic methyl-Hg) (Polacco, et al, 2011). We have found >300 such proteins in all metabolic functional groups and cellular compartments; most are highly conserved and can serve as markers for acute Hg exposure (Zink, et al. 2016, in preparation). We have also discovered that acute Hg exposure severely disrupts thiol, iron and redox homeostases, and electrolyte balance (LaVoie, et al., 2015) Thus, we proposed to bring these techniques to bear on the central problem of identifying the cellular proteins involved in bacterial uptake and methylation of mercury and its release from the cell.

  2. Identifying key components for an effective case report poster: an observational study.

    Science.gov (United States)

    Willett, Lisa L; Paranjape, Anuradha; Estrada, Carlos

    2009-03-01

    Residents demonstrate scholarly activity by presenting posters at academic meetings. Although recommendations from national organizations are available, evidence identifying which components are most important is not. To develop and test an evaluation tool to measure the quality of case report posters and identify the specific components most in need of improvement. Faculty evaluators reviewed case report posters and provided on-site feedback to presenters at poster sessions of four annual academic general internal medicine meetings. A newly developed ten-item evaluation form measured poster quality for specific components of content, discussion, and format (5-point Likert scale, 1 = lowest, 5 = highest). Evaluation tool performance, including Cronbach alpha and inter-rater reliability, overall poster scores, differences across meetings and evaluators and specific components of the posters most in need of improvement. Forty-five evaluators from 20 medical institutions reviewed 347 posters. Cronbach's alpha of the evaluation form was 0.84 and inter-rater reliability, Spearman's rho 0.49 (p words. Our evaluation tool provides empirical data to guide trainees as they prepare posters for presentation which may improve poster quality and enhance their scholarly productivity.

  3. Identifying key features of effective active learning: the effects of writing and peer discussion.

    Science.gov (United States)

    Linton, Debra L; Pangle, Wiline M; Wyatt, Kevin H; Powell, Karli N; Sherwood, Rachel E

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. © 2014 D. L. Linton et al. CBE—Life Sciences Education © 2014 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  4. Identifying Key Issues and Potential Solutions for Integrated Arrival, Departure, Surface Operations by Surveying Stakeholder Preferences

    Science.gov (United States)

    Aponso, Bimal; Coppenbarger, Richard A.; Jung, Yoon; Quon, Leighton; Lohr, Gary; O’Connor, Neil; Engelland, Shawn

    2015-01-01

    predictability and suggested several key attributes that were necessary to make the concept successful. The goals and objectives of the planned ATD-2 sub-project will incorporate the results of this stakeholder feedback.

  5. Rubella vaccination in India: identifying broad consequences of vaccine introduction and key knowledge gaps.

    Science.gov (United States)

    Winter, A K; Pramanik, S; Lessler, J; Ferrari, M; Grenfell, B T; Metcalf, C J E

    2018-01-01

    Rubella virus infection typically presents as a mild illness in children; however, infection during pregnancy may cause the birth of an infant with congenital rubella syndrome (CRS). As of February 2017, India began introducing rubella-containing vaccine (RCV) into the public-sector childhood vaccination programme. Low-level RCV coverage among children over several years can result in an increase in CRS incidence by increasing the average age of infection without sufficiently reducing rubella incidence. We evaluated the impact of RCV introduction on CRS incidence across India's heterogeneous demographic and epidemiological contexts. We used a deterministic age-structured model that reflects Indian states' rural and urban area-specific demography and vaccination coverage levels to simulate rubella dynamics and estimate CRS incidence with and without RCV introduction to the public sector. Our analysis suggests that current low-level private-sector vaccination has already slightly increased the burden of CRS in India. We additionally found that the effect of public-sector RCV introduction depends on the basic reproductive number, R 0, of rubella. If R 0 is five, a value empirically estimated from an array of settings, CRS incidence post-RCV introduction will likely decrease. However, if R 0 is seven or nine, some states may experience short-term or annual increases in CRS, even if a long-term total reduction in cases (30 years) is expected. Investment in population-based serological surveys and India's fever/rash surveillance system will be key to monitoring the success of the vaccination programme.

  6. Physiologically-based toxicokinetic models help identifying the key factors affecting contaminant uptake during flood events

    Energy Technology Data Exchange (ETDEWEB)

    Brinkmann, Markus; Eichbaum, Kathrin [Department of Ecosystem Analysis, Institute for Environmental Research,ABBt – Aachen Biology and Biotechnology, RWTH Aachen University, Worringerweg 1, 52074 Aachen (Germany); Kammann, Ulrike [Thünen-Institute of Fisheries Ecology, Palmaille 9, 22767 Hamburg (Germany); Hudjetz, Sebastian [Department of Ecosystem Analysis, Institute for Environmental Research,ABBt – Aachen Biology and Biotechnology, RWTH Aachen University, Worringerweg 1, 52074 Aachen (Germany); Institute of Hydraulic Engineering and Water Resources Management, RWTH Aachen University, Mies-van-der-Rohe-Straße 1, 52056 Aachen (Germany); Cofalla, Catrina [Institute of Hydraulic Engineering and Water Resources Management, RWTH Aachen University, Mies-van-der-Rohe-Straße 1, 52056 Aachen (Germany); Buchinger, Sebastian; Reifferscheid, Georg [Federal Institute of Hydrology (BFG), Department G3: Biochemistry, Ecotoxicology, Am Mainzer Tor 1, 56068 Koblenz (Germany); Schüttrumpf, Holger [Institute of Hydraulic Engineering and Water Resources Management, RWTH Aachen University, Mies-van-der-Rohe-Straße 1, 52056 Aachen (Germany); Preuss, Thomas [Department of Environmental Biology and Chemodynamics, Institute for Environmental Research,ABBt- Aachen Biology and Biotechnology, RWTH Aachen University, Worringerweg 1, 52074 Aachen (Germany); and others

    2014-07-01

    Highlights: • A PBTK model for trout was coupled with a sediment equilibrium partitioning model. • The influence of physical exercise on pollutant uptake was studies using the model. • Physical exercise during flood events can increase the level of biliary metabolites. • Cardiac output and effective respiratory volume were identified as relevant factors. • These confounding factors need to be considered also for bioconcentration studies. - Abstract: As a consequence of global climate change, we will be likely facing an increasing frequency and intensity of flood events. Thus, the ecotoxicological relevance of sediment re-suspension is of growing concern. It is vital to understand contaminant uptake from suspended sediments and relate it to effects in aquatic biota. Here we report on a computational study that utilizes a physiologically based toxicokinetic model to predict uptake, metabolism and excretion of sediment-borne pyrene in rainbow trout (Oncorhynchus mykiss). To this end, data from two experimental studies were compared with the model predictions: (a) batch re-suspension experiments with constant concentration of suspended particulate matter at two different temperatures (12 and 24 °C), and (b) simulated flood events in an annular flume. The model predicted both the final concentrations and the kinetics of 1-hydroxypyrene secretion into the gall bladder of exposed rainbow trout well. We were able to show that exhaustive exercise during exposure in simulated flood events can lead to increased levels of biliary metabolites and identified cardiac output and effective respiratory volume as the two most important factors for contaminant uptake. The results of our study clearly demonstrate the relevance and the necessity to investigate uptake of contaminants from suspended sediments under realistic exposure scenarios.

  7. Physiologically-based toxicokinetic models help identifying the key factors affecting contaminant uptake during flood events

    International Nuclear Information System (INIS)

    Brinkmann, Markus; Eichbaum, Kathrin; Kammann, Ulrike; Hudjetz, Sebastian; Cofalla, Catrina; Buchinger, Sebastian; Reifferscheid, Georg; Schüttrumpf, Holger; Preuss, Thomas

    2014-01-01

    Highlights: • A PBTK model for trout was coupled with a sediment equilibrium partitioning model. • The influence of physical exercise on pollutant uptake was studies using the model. • Physical exercise during flood events can increase the level of biliary metabolites. • Cardiac output and effective respiratory volume were identified as relevant factors. • These confounding factors need to be considered also for bioconcentration studies. - Abstract: As a consequence of global climate change, we will be likely facing an increasing frequency and intensity of flood events. Thus, the ecotoxicological relevance of sediment re-suspension is of growing concern. It is vital to understand contaminant uptake from suspended sediments and relate it to effects in aquatic biota. Here we report on a computational study that utilizes a physiologically based toxicokinetic model to predict uptake, metabolism and excretion of sediment-borne pyrene in rainbow trout (Oncorhynchus mykiss). To this end, data from two experimental studies were compared with the model predictions: (a) batch re-suspension experiments with constant concentration of suspended particulate matter at two different temperatures (12 and 24 °C), and (b) simulated flood events in an annular flume. The model predicted both the final concentrations and the kinetics of 1-hydroxypyrene secretion into the gall bladder of exposed rainbow trout well. We were able to show that exhaustive exercise during exposure in simulated flood events can lead to increased levels of biliary metabolites and identified cardiac output and effective respiratory volume as the two most important factors for contaminant uptake. The results of our study clearly demonstrate the relevance and the necessity to investigate uptake of contaminants from suspended sediments under realistic exposure scenarios

  8. A structured elicitation method to identify key direct risk factors for the management of natural resources

    Directory of Open Access Journals (Sweden)

    Michael Smith

    2015-11-01

    Full Text Available The high level of uncertainty inherent in natural resource management requires planners to apply comprehensive risk analyses, often in situations where there are few resources. In this paper, we demonstrate a broadly applicable, novel and structured elicitation approach to identify important direct risk factors. This new approach combines expert calibration and fuzzy based mathematics to capture and aggregate subjective expert estimates of the likelihood that a set of direct risk factors will cause management failure. A specific case study is used to demonstrate the approach; however, the described methods are widely applicable in risk analysis. For the case study, the management target was to retain all species that characterise a set of natural biological elements. The analysis was bounded by the spatial distribution of the biological elements under consideration and a 20-year time frame. Fourteen biological elements were expected to be at risk. Eleven important direct risk factors were identified that related to surrounding land use practices, climate change, problem species (e.g., feral predators, fire and hydrological change. In terms of their overall influence, the two most important risk factors were salinisation and a lack of water which together pose a considerable threat to the survival of nine biological elements. The described approach successfully overcame two concerns arising from previous risk analysis work: (1 the lack of an intuitive, yet comprehensive scoring method enabling the detection and clarification of expert agreement and associated levels of uncertainty; and (2 the ease with which results can be interpreted and communicated while preserving a rich level of detail essential for informed decision making.

  9. Integration of transcriptome and whole genomic resequencing data to identify key genes affecting swine fat deposition.

    Directory of Open Access Journals (Sweden)

    Kai Xing

    Full Text Available Fat deposition is highly correlated with the growth, meat quality, reproductive performance and immunity of pigs. Fatty acid synthesis takes place mainly in the adipose tissue of pigs; therefore, in this study, a high-throughput massively parallel sequencing approach was used to generate adipose tissue transcriptomes from two groups of Songliao black pigs that had opposite backfat thickness phenotypes. The total number of paired-end reads produced for each sample was in the range of 39.29-49.36 millions. Approximately 188 genes were differentially expressed in adipose tissue and were enriched for metabolic processes, such as fatty acid biosynthesis, lipid synthesis, metabolism of fatty acids, etinol, caffeine and arachidonic acid and immunity. Additionally, many genetic variations were detected between the two groups through pooled whole-genome resequencing. Integration of transcriptome and whole-genome resequencing data revealed important genomic variations among the differentially expressed genes for fat deposition, for example, the lipogenic genes. Further studies are required to investigate the roles of candidate genes in fat deposition to improve pig breeding programs.

  10. Pharmacy patronage: identifying key factors in the decision making process using the determinant attribute approach.

    Science.gov (United States)

    Franic, Duska M; Haddock, Sarah M; Tucker, Leslie Tootle; Wooten, Nathan

    2008-01-01

    To use the determinant attribute approach, a research method commonly used in marketing to identify the wants of various consumer groups, to evaluate consumer pharmacy choice when having a prescription order filled in different pharmacy settings. Cross sectional. Community independent, grocery store, community chain, and discount store pharmacies in Georgia between April 2005 and April 2006. Convenience sample of adult pharmacy consumers (n = 175). Survey measuring consumer preferences on 26 attributes encompassing general pharmacy site features (16 items), pharmacist characteristics (5 items), and pharmacy staff characteristics (5 items). 26 potential determinant attributes for pharmacy selection. 175 consumers were surveyed at community independent (n = 81), grocery store (n = 44), community chain (n = 27), or discount store (n = 23) pharmacy settings. The attributes of pharmacists and staff at all four pharmacy settings were shown to affect pharmacy patronage motives, although consumers frequenting non-community independent pharmacies were also motivated by secondary convenience factors, e.g., hours of operation, and prescription coverage. Most consumers do not perceive pharmacies as merely prescription-distribution centers that vary only by convenience. Prescriptions are not just another economic good. Pharmacy personnel influence pharmacy selection; therefore, optimal staff selection and training is likely the greatest asset and most important investment for ensuring pharmacy success.

  11. Using the Delphi Technique to Identify Key Elements for Effective and Sustainable Visitor Use Planning Frameworks

    Directory of Open Access Journals (Sweden)

    Jessica P. Fefer

    2016-04-01

    Full Text Available Protected areas around the world receive nearly 800 billion visits/year, with international tourism continuing to increase. While protected areas provide necessary benefits to communities and visitors, the increased visitation may negatively impact the resource and the recreational experience, hence the need to manage visitor use in protected areas around the world. This research focused on obtaining information from experts to document their experiences utilizing one visitor use planning framework: Visitor Experience and Resource Protection (VERP. Using the Delphi Technique, 31 experts from seven regions around the world were asked to identify elements necessary for effective visitor management, as well as elements that facilitated or limited success when using VERP. Elements were categorized and rated in terms of importance. Scoring of the final categories was analyzed using Wilcoxon and Median non-parametric statistical tests. Results suggest that planning challenges stem from limitations in organizational capacity to support a long-term, adaptive management process, inferring that VERP may be sufficiently developed, but implementation capacity may not. The results can be used to refine existing frameworks, and to aid in the development of new recreation frameworks.

  12. Gene expression profiling in Entamoeba histolytica identifies key components in iron uptake and metabolism.

    Directory of Open Access Journals (Sweden)

    Nora Adriana Hernández-Cuevas

    Full Text Available Entamoeba histolytica is an ameboid parasite that causes colonic dysentery and liver abscesses in humans. The parasite encounters dramatic changes in iron concentration during its invasion of the host, with relatively low levels in the intestinal lumen and then relatively high levels in the blood and liver. The liver notably contains sources of iron; therefore, the parasite's ability to use these sources might be relevant to its survival in the liver and thus the pathogenesis of liver abscesses. The objective of the present study was to identify factors involved in iron uptake, use and storage in E. histolytica. We compared the respective transcriptomes of E. histolytica trophozoites grown in normal medium (containing around 169 µM iron, low-iron medium (around 123 µM iron, iron-deficient medium (around 91 µM iron, and iron-deficient medium replenished with hemoglobin. The differentially expressed genes included those coding for the ATP-binding cassette transporters and major facilitator transporters (which share homology with bacterial siderophores and heme transporters and genes involved in heme biosynthesis and degradation. Iron deficiency was associated with increased transcription of genes encoding a subset of cell signaling molecules, some of which have previously been linked to adaptation to the intestinal environment and virulence. The present study is the first to have assessed the transcriptome of E. histolytica grown under various iron concentrations. Our results provide insights into the pathways involved in iron uptake and metabolism in this parasite.

  13. Gene expression profiling in Entamoeba histolytica identifies key components in iron uptake and metabolism.

    Science.gov (United States)

    Hernández-Cuevas, Nora Adriana; Weber, Christian; Hon, Chung-Chau; Guillen, Nancy

    2014-01-01

    Entamoeba histolytica is an ameboid parasite that causes colonic dysentery and liver abscesses in humans. The parasite encounters dramatic changes in iron concentration during its invasion of the host, with relatively low levels in the intestinal lumen and then relatively high levels in the blood and liver. The liver notably contains sources of iron; therefore, the parasite's ability to use these sources might be relevant to its survival in the liver and thus the pathogenesis of liver abscesses. The objective of the present study was to identify factors involved in iron uptake, use and storage in E. histolytica. We compared the respective transcriptomes of E. histolytica trophozoites grown in normal medium (containing around 169 µM iron), low-iron medium (around 123 µM iron), iron-deficient medium (around 91 µM iron), and iron-deficient medium replenished with hemoglobin. The differentially expressed genes included those coding for the ATP-binding cassette transporters and major facilitator transporters (which share homology with bacterial siderophores and heme transporters) and genes involved in heme biosynthesis and degradation. Iron deficiency was associated with increased transcription of genes encoding a subset of cell signaling molecules, some of which have previously been linked to adaptation to the intestinal environment and virulence. The present study is the first to have assessed the transcriptome of E. histolytica grown under various iron concentrations. Our results provide insights into the pathways involved in iron uptake and metabolism in this parasite.

  14. Identifying key soil cyanobacteria easy to isolate and culture for arid soil restoration

    Science.gov (United States)

    Roncero-Ramos, Beatriz; Ángeles Muñoz-Martín, M.; Chamizo, Sonia; Román, Raúl; Rodriguez-Caballero, Emilio; Mateo, Pilar; Cantón, Yolanda

    2017-04-01

    Drylands represent an important fraction of the Earth land's surface. Low cover of vascular plants characterizes these regions, and the large open areas among plants are often colonized by cyanobacteria, mosses, lichens, algae, bryophytes, bacteria and fungi, known as biocrusts. Because these communities are on or within the soil surface, they contribute to improve physicochemical properties of the uppermost soil layers and have important effects on soil fertility and stability, so they could play an important role on soil restoration. Cyanobacteria appear to be a cross component of biocrusts and they have been demonstrated to enhance water availability, soil fertility (fixing atmospheric C and N), and soil aggregation (thanks to their filamentous morphology and the exopolysaccharides they excrete), and significantly reduce water and wind erosion. Besides, they are able to tolerate high temperatures and UV radiation. All these features convert cyanobacteria in pioneer organisms capable of colonizing degraded soils and may be crucial in facilitating the succession of more developed organisms such as vascular plants. Therefore, the use of native cyanobacteria, already adapted to site environmental conditions, could guarantee a successful restoration approach of degraded soils. However, previous to their application for soil restoration, the most representative species inhabiting these soils should be identified. The objective of this study was to identify (morphologically and genetically) and isolate representative native cyanobacteria species from arid soils in SE Spain, characterized for being easily isolated and cultured with the aim of using them to inoculate degraded arid soil. We selected two study areas in Almería, SE Spain, where biocrust cover most of the open spaces between plants: El Cautivo experimental site located in the Tabernas desert and a limestone quarry located at the southeastern edge of the Gádor massif. The first site is characterized by

  15. Probing molecular mechanisms of the Hsp90 chaperone: biophysical modeling identifies key regulators of functional dynamics.

    Directory of Open Access Journals (Sweden)

    Anshuman Dixit

    Full Text Available Deciphering functional mechanisms of the Hsp90 chaperone machinery is an important objective in cancer biology aiming to facilitate discovery of targeted anti-cancer therapies. Despite significant advances in understanding structure and function of molecular chaperones, organizing molecular principles that control the relationship between conformational diversity and functional mechanisms of the Hsp90 activity lack a sufficient quantitative characterization. We combined molecular dynamics simulations, principal component analysis, the energy landscape model and structure-functional analysis of Hsp90 regulatory interactions to systematically investigate functional dynamics of the molecular chaperone. This approach has identified a network of conserved regions common to the Hsp90 chaperones that could play a universal role in coordinating functional dynamics, principal collective motions and allosteric signaling of Hsp90. We have found that these functional motifs may be utilized by the molecular chaperone machinery to act collectively as central regulators of Hsp90 dynamics and activity, including the inter-domain communications, control of ATP hydrolysis, and protein client binding. These findings have provided support to a long-standing assertion that allosteric regulation and catalysis may have emerged via common evolutionary routes. The interaction networks regulating functional motions of Hsp90 may be determined by the inherent structural architecture of the molecular chaperone. At the same time, the thermodynamics-based "conformational selection" of functional states is likely to be activated based on the nature of the binding partner. This mechanistic model of Hsp90 dynamics and function is consistent with the notion that allosteric networks orchestrating cooperative protein motions can be formed by evolutionary conserved and sparsely connected residue clusters. Hence, allosteric signaling through a small network of distantly connected

  16. Identifying plant traits: a key aspect for suitable species selection in ecological restoration of semiarid slopes

    Science.gov (United States)

    Bochet, Esther; García-Fayos, Patricio

    2017-04-01

    In the context of ecological restoration, one of the greatest challenges for practitioners and scientists is to select suitable species for revegetation purposes. In semiarid environments where restoration projects often fail, little attention has been paid so far to the contribution of plant traits to species success. The objective of this study was to (1) identify plant traits associated with species success on four roadside situations along an erosion-productivity gradient, and (2) to provide an ecological framework for selecting suitable species on the basis of their morphological and functional traits, applied to semiarid environments. We analyzed the association of 10 different plant traits with species success of 296 species surveyed on the four roadside situations in a semiarid region (Valencia, Spain). Plant traits included general plant traits (longevity, woodiness) and more specific root-, seed- and leaf-related traits (root type, sprouting ability, seed mucilage, seed mass, seed susceptibility to removal, specific leaf area and leaf dry matter content). All of them were selected according to the prevailing limiting ecogeomorphological processes acting along the erosion-productivity gradient. We observed strong shifts along the erosion-productivity gradient in the traits associated to species success. At the harshest end of the gradient, the most intensely eroded and driest one, species success was mainly associated to seed resistance to removal by runoff and to resistance to drought. At the opposite end of the gradient, the most productive one, species success was associated to a competitive-ruderal plant strategy (herbaceous successful species with high specific leaf area and low leaf dry matter content). Our study provides an ecologically-based approach for selecting suitable native species on the basis or their morphological and functional traits and supports a differential trait-based selection of species as regards roadslope type and aspect. In

  17. Simulation-based Assessment to Reliably Identify Key Resident Performance Attributes.

    Science.gov (United States)

    Blum, Richard H; Muret-Wagstaff, Sharon L; Boulet, John R; Cooper, Jeffrey B; Petrusa, Emil R; Baker, Keith H; Davidyuk, Galina; Dearden, Jennifer L; Feinstein, David M; Jones, Stephanie B; Kimball, William R; Mitchell, John D; Nadelberg, Robert L; Wiser, Sarah H; Albrecht, Meredith A; Anastasi, Amanda K; Bose, Ruma R; Chang, Laura Y; Culley, Deborah J; Fisher, Lauren J; Grover, Meera; Klainer, Suzanne B; Kveraga, Rikante; Martel, Jeffrey P; McKenna, Shannon S; Minehart, Rebecca D; Mitchell, John D; Mountjoy, Jeremi R; Pawlowski, John B; Pilon, Robert N; Shook, Douglas C; Silver, David A; Warfield, Carol A; Zaleski, Katherine L

    2018-04-01

    Obtaining reliable and valid information on resident performance is critical to patient safety and training program improvement. The goals were to characterize important anesthesia resident performance gaps that are not typically evaluated, and to further validate scores from a multiscenario simulation-based assessment. Seven high-fidelity scenarios reflecting core anesthesiology skills were administered to 51 first-year residents (CA-1s) and 16 third-year residents (CA-3s) from three residency programs. Twenty trained attending anesthesiologists rated resident performances using a seven-point behaviorally anchored rating scale for five domains: (1) formulate a clear plan, (2) modify the plan under changing conditions, (3) communicate effectively, (4) identify performance improvement opportunities, and (5) recognize limits. A second rater assessed 10% of encounters. Scores and variances for each domain, each scenario, and the total were compared. Low domain ratings (1, 2) were examined in detail. Interrater agreement was 0.76; reliability of the seven-scenario assessment was r = 0.70. CA-3s had a significantly higher average total score (4.9 ± 1.1 vs. 4.6 ± 1.1, P = 0.01, effect size = 0.33). CA-3s significantly outscored CA-1s for five of seven scenarios and domains 1, 2, and 3. CA-1s had a significantly higher proportion of worrisome ratings than CA-3s (chi-square = 24.1, P < 0.01, effect size = 1.50). Ninety-eight percent of residents rated the simulations more educational than an average day in the operating room. Sensitivity of the assessment to CA-1 versus CA-3 performance differences for most scenarios and domains supports validity. No differences, by experience level, were detected for two domains associated with reflective practice. Smaller score variances for CA-3s likely reflect a training effect; however, worrisome performance scores for both CA-1s and CA-3s suggest room for improvement.

  18. A multivariate and stochastic approach to identify key variables to rank dairy farms on profitability.

    Science.gov (United States)

    Atzori, A S; Tedeschi, L O; Cannas, A

    2013-05-01

    The economic efficiency of dairy farms is the main goal of farmers. The objective of this work was to use routinely available information at the dairy farm level to develop an index of profitability to rank dairy farms and to assist the decision-making process of farmers to increase the economic efficiency of the entire system. A stochastic modeling approach was used to study the relationships between inputs and profitability (i.e., income over feed cost; IOFC) of dairy cattle farms. The IOFC was calculated as: milk revenue + value of male calves + culling revenue - herd feed costs. Two databases were created. The first one was a development database, which was created from technical and economic variables collected in 135 dairy farms. The second one was a synthetic database (sDB) created from 5,000 synthetic dairy farms using the Monte Carlo technique and based on the characteristics of the development database data. The sDB was used to develop a ranking index as follows: (1) principal component analysis (PCA), excluding IOFC, was used to identify principal components (sPC); and (2) coefficient estimates of a multiple regression of the IOFC on the sPC were obtained. Then, the eigenvectors of the sPC were used to compute the principal component values for the original 135 dairy farms that were used with the multiple regression coefficient estimates to predict IOFC (dRI; ranking index from development database). The dRI was used to rank the original 135 dairy farms. The PCA explained 77.6% of the sDB variability and 4 sPC were selected. The sPC were associated with herd profile, milk quality and payment, poor management, and reproduction based on the significant variables of the sPC. The mean IOFC in the sDB was 0.1377 ± 0.0162 euros per liter of milk (€/L). The dRI explained 81% of the variability of the IOFC calculated for the 135 original farms. When the number of farms below and above 1 standard deviation (SD) of the dRI were calculated, we found that 21

  19. A Simple Key for Identifying the Sibling Species of the Malaria Vector Anopheles gambiae (Giles Complex by Polytene Chromosome Cytogenetics

    Directory of Open Access Journals (Sweden)

    Music Temitope OBEMBE

    2018-03-01

    Full Text Available It has been established that Anopheles gambiae complex sibling species are the major Plasmodium malaria vectors in Africa; however, not all the sibling species transmit the infection. Easier molecular methods, PCR-based assays, have been developed to distinguish the several members of the A. gambiae complex. However, malaria vector research in less developed countries, particularly sub-Saharan Africa, is being hampered by the lack of PCR facilities in laboratories and the cost of carrying out the assay within lack of funding. Hence, the present study was designed to develop a simple identification key, based on an affordable method of polytene chromosome cytotaxonomy, for identifying the major P. falciparum vectors. The Identification Key was successfully used to identify two members of the A. gambiae complex, A. gambiae sensu stricto and A. arabiensis, which are the most potent malaria vectors in Africa; even so, it could not be used to establish the infective and the refractory strains.

  20. A genetic screen identifies BRCA2 and PALB2 as key regulators of G2 checkpoint maintenance

    DEFF Research Database (Denmark)

    Menzel, Tobias; Nähse-Kumpf, Viola; Kousholt, Arne Nedergaard

    2011-01-01

    To identify key connections between DNA-damage repair and checkpoint pathways, we performed RNA interference screens for regulators of the ionizing radiation-induced G2 checkpoint, and we identified the breast cancer gene BRCA2. The checkpoint was also abrogated following depletion of PALB2......, an interaction partner of BRCA2. BRCA2 and PALB2 depletion led to premature checkpoint abrogation and earlier activation of the AURORA A-PLK1 checkpoint-recovery pathway. These results indicate that the breast cancer tumour suppressors and homologous recombination repair proteins BRCA2 and PALB2 are main...

  1. Protocol for a thematic synthesis to identify key themes and messages from a palliative care research network.

    LENUS (Irish Health Repository)

    Nicholson, Emma

    2016-10-21

    Research networks that facilitate collaborative research are increasing both regionally and globally and such collaborations contribute greatly to knowledge transfer particularly in health research. The Palliative Care Research Network is an Irish-based network that seeks to create opportunities and engender a collaborative environment to encourage innovative research that is relevant for policy and practice. The current review outlines a methodology to identify cross-cutting messages to identify how dissemination outputs can be optimized to ensure that key messages from this research reaches all knowledge users.

  2. Unraveling the Timing of Fluid Migration and Trap Formation in the Brooks Range Foothills: A Key to Discovering Hydrocarbons

    Energy Technology Data Exchange (ETDEWEB)

    Catherine L. Hanks

    2008-12-31

    Naturally occurring fractures can play a key role in the evolution and producibility of a hydrocarbon accumulation. Understanding the evolution of fractures in the Brooks Range/Colville basin system of northern Alaska is critical to developing a better working model of the hydrocarbon potential of the region. This study addressed this problem by collecting detailed and regional data on fracture distribution and character, structural geometry, temperature, the timing of deformation along the Brooks Range rangefront and adjacent parts of the Colville basin, and the in situ stress distribution within the Colville basin. This new and existing data then were used to develop a model of how fractures evolved in northern Alaska, both spatially and temporally. The results of the study indicate that fractures formed episodically throughout the evolution of northern Alaska, due to a variety of mechanisms. Four distinct fracture sets were observed. The earliest fractures formed in deep parts of the Colville basin and in the underlying Ellesmerian sequence rocks as these rocks experienced compression associated with the growing Brooks Range fold-and-thrust belt. The orientation of these deep basin fractures was controlled by the maximum in situ horizontal stress in the basin at the time of their formation, which was perpendicular to the active Brooks Range thrust front. This orientation stayed consistently NS-striking for most of the early history of the Brooks Range and Colville basin, but changed to NW-striking with the development of the northeastern Brooks Range during the early Tertiary. Subsequent incorporation of these rocks into the fold-and-thrust belt resulted in overprinting of these deep basin fractures by fractures caused by thrusting and related folding. The youngest fractures developed as rocks were uplifted and exposed. While this general order of fracturing remains consistent across the Brooks Range and adjacent Colville basin, the absolute age at any one

  3. Use of stable isotopes to identify dietary differences across subpopulations and sex for a free-ranging generalist herbivore.

    Science.gov (United States)

    Walter, W David

    2014-01-01

    Carbon and nitrogen isotopes in tissues can be used to understand plants consumed by various taxa, but can they provide additional information about consumers? Values of δ(13)C and δ(15)N were assessed from tissue of free-ranging elk (Cervus elaphus) occupying disparate habitats of mixed prairie-oak savannah that contained C3 agricultural crops in a C4-dominated landscape and in key plants consumed by elk. Muscle and hoof samples were collected from female and male elk in two subpopulations (forested land and grassland) from private land and one subpopulation from the Wichita Mountains Wildlife Refuge (refuge) in 2001-2006. Previous research identified differences between mean muscle δ(13)C and δ(15)N and mean hoof δ(13)C and δ(15)N indicating that isotopes differed between tissues of varying metabolic activity. Mean δ(13)C in hoof of elk on forested land and grassland were lower than hoof δ(13)C from elk in the refuge indicating greater long-term consumption of C3 plants by elk on forested land and grassland subpopulations. The δ(15)N in hoof was greater for elk outside the refuge than that for elk in the refuge. Interaction of sex and subpopulation only occurred for hoof δ(15)N suggesting that factors such as tissue type, sex, and habitat need to be considered to understand free-ranging ecology of generalist herbivores using stable isotopes. Availability of C3 agricultural crops high in percent nitrogen on a nearly annual basis in a C4-dominated landscape was likely driving differences in tissue δ(13)C and δ(15)N among subpopulations of free-ranging elk. An increase in tissue δ(15)N resulted from an increase in the consumption of higher δ(15)N in forage for sexes and subpopulations of a free-ranging ungulate in North America but δ(15)N should be further evaluated as an index of nutrition for subpopulations of generalist herbivores.

  4. Modified Principal Component Analysis for Identifying Key Environmental Indicators and Application to a Large-Scale Tidal Flat Reclamation

    Directory of Open Access Journals (Sweden)

    Kejian Chu

    2018-01-01

    Full Text Available Identification of the key environmental indicators (KEIs from a large number of environmental variables is important for environmental management in tidal flat reclamation areas. In this study, a modified principal component analysis approach (MPCA has been developed for determining the KEIs. The MPCA accounts for the two important attributes of the environmental variables: pollution status and temporal variation, in addition to the commonly considered numerical divergence attribute. It also incorporates the distance correlation (dCor to replace the Pearson’s correlation to measure the nonlinear interrelationship between the variables. The proposed method was applied to the Tiaozini sand shoal, a large-scale tidal flat reclamation region in China. Five KEIs were identified as dissolved inorganic nitrogen, Cd, petroleum in the water column, Hg, and total organic carbon in the sediment. The identified KEIs were shown to respond well to the biodiversity of phytoplankton. This demonstrated that the identified KEIs adequately represent the environmental condition in the coastal marine system. Therefore, the MPCA is a practicable method for extracting effective indicators that have key roles in the coastal and marine environment.

  5. Identifying key factors and strategies for reducing industrial CO2 emissions from a non-Kyoto protocol member's (Taiwan) perspective

    International Nuclear Information System (INIS)

    Lin, Sue J.; Lu, I.J.; Lewis, Charles

    2006-01-01

    In this study we use Divisia index approach to identify key factors affecting CO 2 emission changes of industrial sectors in Taiwan. The changes of CO 2 emission are decomposed into emission coefficient, energy intensity, industrial structure and economic growth. Furthermore, comparisons with USA, Japan, Germany, the Netherlands and South Korea are made to have a better understanding of emission tendency in these countries and to help formulate our CO 2 reduction strategies for responding to the international calls for CO 2 cuts. The results show that economic growth and high energy intensity were two key factors for the rapid increase of industrial CO 2 emission in Taiwan, while adjustment of industrial structure was the main component for the decrease. Although economic development is important, Taiwan must keep pace with the international trends for CO 2 reduction. Among the most important strategies are continuous efforts to improve energy intensity, fuel mix toward lower carbon, setting targets for industrial CO 2 cuts, and advancing green technology through technology transfer. Also, the clean development mechanism (CDM) is expected to play an important role in the future

  6. Solution scanning as a key policy tool: identifying management interventions to help maintain and enhance regulating ecosystem services

    Directory of Open Access Journals (Sweden)

    William J. Sutherland

    2014-06-01

    Full Text Available The major task of policy makers and practitioners when confronted with a resource management problem is to decide on the potential solution(s to adopt from a range of available options. However, this process is unlikely to be successful and cost effective without access to an independently verified and comprehensive available list of options. There is currently burgeoning interest in ecosystem services and quantitative assessments of their importance and value. Recognition of the value of ecosystem services to human well-being represents an increasingly important argument for protecting and restoring the natural environment, alongside the moral and ethical justifications for conservation. As well as understanding the benefits of ecosystem services, it is also important to synthesize the practical interventions that are capable of maintaining and/or enhancing these services. Apart from pest regulation, pollination, and global climate regulation, this type of exercise has attracted relatively little attention. Through a systematic consultation exercise, we identify a candidate list of 296 possible interventions across the main regulating services of air quality regulation, climate regulation, water flow regulation, erosion regulation, water purification and waste treatment, disease regulation, pest regulation, pollination and natural hazard regulation. The range of interventions differs greatly between habitats and services depending upon the ease of manipulation and the level of research intensity. Some interventions have the potential to deliver benefits across a range of regulating services, especially those that reduce soil loss and maintain forest cover. Synthesis and applications: Solution scanning is important for questioning existing knowledge and identifying the range of options available to researchers and practitioners, as well as serving as the necessary basis for assessing cost effectiveness and guiding implementation strategies. We

  7. In-Silico Integration Approach to Identify a Key miRNA Regulating a Gene Network in Aggressive Prostate Cancer

    Science.gov (United States)

    Colaprico, Antonio; Bontempi, Gianluca; Castiglioni, Isabella

    2018-01-01

    Like other cancer diseases, prostate cancer (PC) is caused by the accumulation of genetic alterations in the cells that drives malignant growth. These alterations are revealed by gene profiling and copy number alteration (CNA) analysis. Moreover, recent evidence suggests that also microRNAs have an important role in PC development. Despite efforts to profile PC, the alterations (gene, CNA, and miRNA) and biological processes that correlate with disease development and progression remain partially elusive. Many gene signatures proposed as diagnostic or prognostic tools in cancer poorly overlap. The identification of co-expressed genes, that are functionally related, can identify a core network of genes associated with PC with a better reproducibility. By combining different approaches, including the integration of mRNA expression profiles, CNAs, and miRNA expression levels, we identified a gene signature of four genes overlapping with other published gene signatures and able to distinguish, in silico, high Gleason-scored PC from normal human tissue, which was further enriched to 19 genes by gene co-expression analysis. From the analysis of miRNAs possibly regulating this network, we found that hsa-miR-153 was highly connected to the genes in the network. Our results identify a four-gene signature with diagnostic and prognostic value in PC and suggest an interesting gene network that could play a key regulatory role in PC development and progression. Furthermore, hsa-miR-153, controlling this network, could be a potential biomarker for theranostics in high Gleason-scored PC. PMID:29562723

  8. Hillslope characterization: Identifying key controls on local-scale plant communities' distribution using remote sensing and subsurface data fusion.

    Science.gov (United States)

    Falco, N.; Wainwright, H. M.; Dafflon, B.; Leger, E.; Peterson, J.; Steltzer, H.; Wilmer, C.; Williams, K. H.; Hubbard, S. S.

    2017-12-01

    Mountainous watershed systems are characterized by extreme heterogeneity in hydrological and pedological properties that influence biotic activities, plant communities and their dynamics. To gain predictive understanding of how ecosystem and watershed system evolve under climate change, it is critical to capture such heterogeneity and to quantify the effect of key environmental variables such as topography, and soil properties. In this study, we exploit advanced geophysical and remote sensing techniques - coupled with machine learning - to better characterize and quantify the interactions between plant communities' distribution and subsurface properties. First, we have developed a remote sensing data fusion framework based on the random forest (RF) classification algorithm to estimate the spatial distribution of plant communities. The framework allows the integration of both plant spectral and structural information, which are derived from multispectral satellite images and airborne LiDAR data. We then use the RF method to evaluate the estimated plant community map, exploiting the subsurface properties (such as bedrock depth, soil moisture and other properties) and geomorphological parameters (such as slope, curvature) as predictors. Datasets include high-resolution geophysical data (electrical resistivity tomography) and LiDAR digital elevation maps. We demonstrate our approach on a mountain hillslope and meadow within the East River watershed in Colorado, which is considered to be a representative headwater catchment in the Upper Colorado Basin. The obtained results show the existence of co-evolution between above and below-ground processes; in particular, dominant shrub communities in wet and flat areas. We show that successful integration of remote sensing data with geophysical measurements allows identifying and quantifying the key environmental controls on plant communities' distribution, and provides insights into their potential changes in the future

  9. Community landscapes: an integrative approach to determine overlapping network module hierarchy, identify key nodes and predict network dynamics.

    Directory of Open Access Journals (Sweden)

    István A Kovács

    Full Text Available BACKGROUND: Network communities help the functional organization and evolution of complex networks. However, the development of a method, which is both fast and accurate, provides modular overlaps and partitions of a heterogeneous network, has proven to be rather difficult. METHODOLOGY/PRINCIPAL FINDINGS: Here we introduce the novel concept of ModuLand, an integrative method family determining overlapping network modules as hills of an influence function-based, centrality-type community landscape, and including several widely used modularization methods as special cases. As various adaptations of the method family, we developed several algorithms, which provide an efficient analysis of weighted and directed networks, and (1 determine persvasively overlapping modules with high resolution; (2 uncover a detailed hierarchical network structure allowing an efficient, zoom-in analysis of large networks; (3 allow the determination of key network nodes and (4 help to predict network dynamics. CONCLUSIONS/SIGNIFICANCE: The concept opens a wide range of possibilities to develop new approaches and applications including network routing, classification, comparison and prediction.

  10. A systems toxicology approach identifies Lyn as a key signaling phosphoprotein modulated by mercury in a B lymphocyte cell model

    Energy Technology Data Exchange (ETDEWEB)

    Caruso, Joseph A.; Stemmer, Paul M. [Institute of Environmental Health Sciences, Wayne State University, Detroit, MI (United States); Dombkowski, Alan [Department of Pediatrics, Wayne State University, Detroit, MI (United States); Caruthers, Nicholas J. [Institute of Environmental Health Sciences, Wayne State University, Detroit, MI (United States); Gill, Randall [Department of Immunology and Microbiology, Wayne State University, Detroit, MI (United States); Rosenspire, Allen J., E-mail: arosenspire@wayne.edu [Department of Immunology and Microbiology, Wayne State University, Detroit, MI (United States)

    2014-04-01

    Network and protein–protein interaction analyses of proteins undergoing Hg{sup 2+}-induced phosphorylation and dephosphorylation in Hg{sup 2+}-intoxicated mouse WEHI-231 B cells identified Lyn as the most interconnected node. Lyn is a Src family protein tyrosine kinase known to be intimately involved in the B cell receptor (BCR) signaling pathway. Under normal signaling conditions the tyrosine kinase activity of Lyn is controlled by phosphorylation, primarily of two well known canonical regulatory tyrosine sites, Y-397 and Y-508. However, Lyn has several tyrosine residues that have not yet been determined to play a major role under normal signaling conditions, but are potentially important sites for phosphorylation following mercury exposure. In order to determine how Hg{sup 2+} exposure modulates the phosphorylation of additional residues in Lyn, a targeted MS assay was developed. Initial mass spectrometric surveys of purified Lyn identified 7 phosphorylated tyrosine residues. A quantitative assay was developed from these results using the multiple reaction monitoring (MRM) strategy. WEHI-231 cells were treated with Hg{sup 2+}, pervanadate (a phosphatase inhibitor), or anti-Ig antibody (to stimulate the BCR). Results from these studies showed that the phosphoproteomic profile of Lyn after exposure of the WEHI-231 cells to a low concentration of Hg{sup 2+} closely resembled that of anti-Ig antibody stimulation, whereas exposure to higher concentrations of Hg{sup 2+} led to increases in the phosphorylation of Y-193/Y-194, Y-501 and Y-508 residues. These data indicate that mercury can disrupt a key regulatory signal transduction pathway in B cells and point to phospho-Lyn as a potential biomarker for mercury exposure. - Highlights: • Inorganic mercury (Hg{sup 2+}) induces changes in the WEHI-231 B cell phosphoproteome. • The B cell receptor (BCR) signaling pathway was the pathway most affected by Hg{sup 2+}. • The Src family phosphoprotein kinase Lyn was the

  11. Use of a scenario-neutral approach to identify the key hydro-meteorological attributes that impact runoff from a natural catchment

    Science.gov (United States)

    Guo, Danlu; Westra, Seth; Maier, Holger R.

    2017-11-01

    Scenario-neutral approaches are being used increasingly for assessing the potential impact of climate change on water resource systems, as these approaches allow the performance of these systems to be evaluated independently of climate change projections. However, practical implementations of these approaches are still scarce, with a key limitation being the difficulty of generating a range of plausible future time series of hydro-meteorological data. In this study we apply a recently developed inverse stochastic generation approach to support the scenario-neutral analysis, and thus identify the key hydro-meteorological variables to which the system is most sensitive. The stochastic generator simulates synthetic hydro-meteorological time series that represent plausible future changes in (1) the average, extremes and seasonal patterns of rainfall; and (2) the average values of temperature (Ta), relative humidity (RH) and wind speed (uz) as variables that drive PET. These hydro-meteorological time series are then fed through a conceptual rainfall-runoff model to simulate the potential changes in runoff as a function of changes in the hydro-meteorological variables, and runoff sensitivity is assessed with both correlation and Sobol' sensitivity analyses. The method was applied to a case study catchment in South Australia, and the results showed that the most important hydro-meteorological attributes for runoff were winter rainfall followed by the annual average rainfall, while the PET-related meteorological variables had comparatively little impact. The high importance of winter rainfall can be related to the winter-dominated nature of both the rainfall and runoff regimes in this catchment. The approach illustrated in this study can greatly enhance our understanding of the key hydro-meteorological attributes and processes that are likely to drive catchment runoff under a changing climate, thus enabling the design of tailored climate impact assessments to specific

  12. The long-range supraorganization of the bacterial photosynthetic unit: A key role for PufX

    NARCIS (Netherlands)

    Frese, R.N.; Olsen, J.D.; Branvall, R.; Westerhuis, W.H.J.; Hunter, C.N.; van Grondelle, R.

    2000-01-01

    Bacterial photosynthesis relies on the interplay between light harvesting and electron transfer complexes, all of which are located within the intracytoplasmic membrane. These complexes capture and transfer solar energy, which is used to generate a proton gradient. In this study, we identify one of

  13. Deep Learning Identifies High-z Galaxies in a Central Blue Nugget Phase in a Characteristic Mass Range

    Science.gov (United States)

    Huertas-Company, M.; Primack, J. R.; Dekel, A.; Koo, D. C.; Lapiner, S.; Ceverino, D.; Simons, R. C.; Snyder, G. F.; Bernardi, M.; Chen, Z.; Domínguez-Sánchez, H.; Lee, C. T.; Margalef-Bentabol, B.; Tuccillo, D.

    2018-05-01

    We use machine learning to identify in color images of high-redshift galaxies an astrophysical phenomenon predicted by cosmological simulations. This phenomenon, called the blue nugget (BN) phase, is the compact star-forming phase in the central regions of many growing galaxies that follows an earlier phase of gas compaction and is followed by a central quenching phase. We train a convolutional neural network (CNN) with mock “observed” images of simulated galaxies at three phases of evolution— pre-BN, BN, and post-BN—and demonstrate that the CNN successfully retrieves the three phases in other simulated galaxies. We show that BNs are identified by the CNN within a time window of ∼0.15 Hubble times. When the trained CNN is applied to observed galaxies from the CANDELS survey at z = 1–3, it successfully identifies galaxies at the three phases. We find that the observed BNs are preferentially found in galaxies at a characteristic stellar mass range, 109.2–10.3 M ⊙ at all redshifts. This is consistent with the characteristic galaxy mass for BNs as detected in the simulations and is meaningful because it is revealed in the observations when the direct information concerning the total galaxy luminosity has been eliminated from the training set. This technique can be applied to the classification of other astrophysical phenomena for improved comparison of theory and observations in the era of large imaging surveys and cosmological simulations.

  14. Long-range correlations of different EEG derivations in rats: sleep stage-dependent generators may play a key role

    International Nuclear Information System (INIS)

    Fang, Guangzhan; Xia, Yang; Lai, Yongxiu; You, Zili; Yao, Dezhong

    2010-01-01

    For the electroencephalogram (EEG), topographic differences in the long-range temporal correlations would imply that these signals might be affected by specific mechanisms related to the generation of a given neuronal process. So the properties of the generators of various EEG oscillations might be investigated by their spatial differences of the long-range temporal correlations. In the present study, these correlations were characterized with respect to their topography during different vigilance states by detrended fluctuation analysis (DFA). The results indicated that (1) most of the scaling exponents acquired from different EEG derivations for various oscillations were significantly different in each vigilance state; these differences might be resulted from the different quantities and different locations of sleep stage-dependent generators of various neuronal processes; (2) there might be multiple generators of delta and theta over the brain and many of them were sleep stage-dependent; (3) the best site of the frontal electrode in a fronto-parietal bipolar electrode for sleep staging might be above the anterior midline cortex. We suggest that DFA analysis can be used to explore the properties of the generators of a given neuronal oscillation, and the localizations of these generators if more electrodes are involved

  15. International key comparison of free-field hydrophone calibrations in the frequency range 1 to 500 kHz

    CSIR Research Space (South Africa)

    Robinson, SP

    2006-09-01

    Full Text Available South African Develop- ment Community Cooperation in Measurement TraceabilityH20850, and SIM H20849Sistema Interamericano de MetrologiaH20850. Also listed in Table I are the country codes used to identify the results in the graphical representations... in the database on the BIPM web- site also include tabulated data on the bilateral degrees of equivalence between the countries along with associated uncertainties. The data generated by the comparison are available on the BIPM website at H20855http...

  16. Bi-directional gene set enrichment and canonical correlation analysis identify key diet-sensitive pathways and biomarkers of metabolic syndrome

    Directory of Open Access Journals (Sweden)

    Gaora Peadar Ó

    2010-10-01

    Full Text Available Abstract Background Currently, a number of bioinformatics methods are available to generate appropriate lists of genes from a microarray experiment. While these lists represent an accurate primary analysis of the data, fewer options exist to contextualise those lists. The development and validation of such methods is crucial to the wider application of microarray technology in the clinical setting. Two key challenges in clinical bioinformatics involve appropriate statistical modelling of dynamic transcriptomic changes, and extraction of clinically relevant meaning from very large datasets. Results Here, we apply an approach to gene set enrichment analysis that allows for detection of bi-directional enrichment within a gene set. Furthermore, we apply canonical correlation analysis and Fisher's exact test, using plasma marker data with known clinical relevance to aid identification of the most important gene and pathway changes in our transcriptomic dataset. After a 28-day dietary intervention with high-CLA beef, a range of plasma markers indicated a marked improvement in the metabolic health of genetically obese mice. Tissue transcriptomic profiles indicated that the effects were most dramatic in liver (1270 genes significantly changed; p Conclusion Bi-directional gene set enrichment analysis more accurately reflects dynamic regulatory behaviour in biochemical pathways, and as such highlighted biologically relevant changes that were not detected using a traditional approach. In such cases where transcriptomic response to treatment is exceptionally large, canonical correlation analysis in conjunction with Fisher's exact test highlights the subset of pathways showing strongest correlation with the clinical markers of interest. In this case, we have identified selenoamino acid metabolism and steroid biosynthesis as key pathways mediating the observed relationship between metabolic health and high-CLA beef. These results indicate that this type of

  17. USING THE PARETO DIAGRAM AND FMEA (FAILURE MODE AND EFFECTS ANALYSIS TO IDENTIFY KEY DEFECTS IN A PRODUCT

    Directory of Open Access Journals (Sweden)

    Michał ZASADZIEŃ

    2014-10-01

    Full Text Available The article presents the results of studies conducted in a company manufacturing aluminium forgings for the automotive industry. The aim of the research was to identify the defects which form during the production process as well as the locations and causes of their occurrence. Selected quality management tools were used in the process. Based on the FMEA and the costs generated by the identified defects, a hierarchy of them was created for the company along with a proposal of improvements in case of the most significant ones in order to reduce their number and increase the detection efficiency.

  18. Genome-wide association studies of autoimmune vitiligo identify 23 new risk loci and highlight key pathways and regulatory variants

    NARCIS (Netherlands)

    Jin, Ying; Andersen, Genevieve; Yorgov, Daniel; Ferrara, Tracey M.; Ben, Songtao; Brownson, Kelly M.; Holland, Paulene J.; Birlea, Stanca A.; Siebert, Janet; Hartmann, Anke; Lienert, Anne; van Geel, Nanja; Lambert, Jo; Luiten, Rosalie M.; Wolkerstorfer, Albert; Wietze van der Veen, J. P.; Bennett, Dorothy C.; Taïeb, Alain; Ezzedine, Khaled; Kemp, E. Helen; Gawkrodger, David J.; Weetman, Anthony P.; Kõks, Sulev; Prans, Ele; Kingo, Külli; Karelson, Maire; Wallace, Margaret R.; McCormack, Wayne T.; Overbeck, Andreas; Moretti, Silvia; Colucci, Roberta; Picardo, Mauro; Silverberg, Nanette B.; Olsson, Mats; Valle, Yan; Korobko, Igor; Böhm, Markus; Lim, Henry W.; Hamzavi, Iltefat; Zhou, Li; Mi, Qing-Sheng; Fain, Pamela R.; Santorico, Stephanie A.; Spritz, Richard A.

    2016-01-01

    Vitiligo is an autoimmune disease in which depigmented skin results from the destruction of melanocytes, with epidemiological association with other autoimmune diseases. In previous linkage and genome-wide association studies (GWAS1 and GWAS2), we identified 27 vitiligo susceptibility loci in

  19. A Large-Scale RNAi Screen Identifies SGK1 as a Key Survival Kinase for GBM Stem Cells.

    Science.gov (United States)

    Kulkarni, Shreya; Goel-Bhattacharya, Surbhi; Sengupta, Sejuti; Cochran, Brent H

    2018-01-01

    Glioblastoma multiforme (GBM) is the most common type of primary malignant brain cancer and has a very poor prognosis. A subpopulation of cells known as GBM stem-like cells (GBM-SC) have the capacity to initiate and sustain tumor growth and possess molecular characteristics similar to the parental tumor. GBM-SCs are known to be enriched in hypoxic niches and may contribute to therapeutic resistance. Therefore, to identify genetic determinants important for the proliferation and survival of GBM stem cells, an unbiased pooled shRNA screen of 10,000 genes was conducted under normoxic as well as hypoxic conditions. A number of essential genes were identified that are required for GBM-SC growth, under either or both oxygen conditions, in two different GBM-SC lines. Interestingly, only about a third of the essential genes were common to both cell lines. The oxygen environment significantly impacts the cellular genetic dependencies as 30% of the genes required under hypoxia were not required under normoxic conditions. In addition to identifying essential genes already implicated in GBM such as CDK4, KIF11 , and RAN , the screen also identified new genes that have not been previously implicated in GBM stem cell biology. The importance of the serum and glucocorticoid-regulated kinase 1 (SGK1) for cellular survival was validated in multiple patient-derived GBM stem cell lines using shRNA, CRISPR, and pharmacologic inhibitors. However, SGK1 depletion and inhibition has little effect on traditional serum grown glioma lines and on differentiated GBM-SCs indicating its specific importance in GBM stem cell survival. Implications: This study identifies genes required for the growth and survival of GBM stem cells under both normoxic and hypoxic conditions and finds SGK1 as a novel potential drug target for GBM. Mol Cancer Res; 16(1); 103-14. ©2017 AACR . ©2017 American Association for Cancer Research.

  20. RNA sequencing of Populus x canadensis roots identifies key molecular mechanisms underlying physiological adaption to excess zinc.

    Directory of Open Access Journals (Sweden)

    Andrea Ariani

    Full Text Available Populus x canadensis clone I-214 exhibits a general indicator phenotype in response to excess Zn, and a higher metal uptake in roots than in shoots with a reduced translocation to aerial parts under hydroponic conditions. This physiological adaptation seems mainly regulated by roots, although the molecular mechanisms that underlie these processes are still poorly understood. Here, differential expression analysis using RNA-sequencing technology was used to identify the molecular mechanisms involved in the response to excess Zn in root. In order to maximize specificity of detection of differentially expressed (DE genes, we consider the intersection of genes identified by three distinct statistical approaches (61 up- and 19 down-regulated and validate them by RT-qPCR, yielding an agreement of 93% between the two experimental techniques. Gene Ontology (GO terms related to oxidation-reduction processes, transport and cellular iron ion homeostasis were enriched among DE genes, highlighting the importance of metal homeostasis in adaptation to excess Zn by P. x canadensis clone I-214. We identified the up-regulation of two Populus metal transporters (ZIP2 and NRAMP1 probably involved in metal uptake, and the down-regulation of a NAS4 gene involved in metal translocation. We identified also four Fe-homeostasis transcription factors (two bHLH38 genes, FIT and BTS that were differentially expressed, probably for reducing Zn-induced Fe-deficiency. In particular, we suggest that the down-regulation of FIT transcription factor could be a mechanism to cope with Zn-induced Fe-deficiency in Populus. These results provide insight into the molecular mechanisms involved in adaption to excess Zn in Populus spp., but could also constitute a starting point for the identification and characterization of molecular markers or biotechnological targets for possible improvement of phytoremediation performances of poplar trees.

  1. Global metabolic analyses identify key differences in metabolite levels between polymyxin-susceptible and polymyxin-resistant Acinetobacter baumannii.

    Science.gov (United States)

    Maifiah, Mohd Hafidz Mahamad; Cheah, Soon-Ee; Johnson, Matthew D; Han, Mei-Ling; Boyce, John D; Thamlikitkul, Visanu; Forrest, Alan; Kaye, Keith S; Hertzog, Paul; Purcell, Anthony W; Song, Jiangning; Velkov, Tony; Creek, Darren J; Li, Jian

    2016-02-29

    Multidrug-resistant Acinetobacter baumannii presents a global medical crisis and polymyxins are used as the last-line therapy. This study aimed to identify metabolic differences between polymyxin-susceptible and polymyxin-resistant A. baumannii using untargeted metabolomics. The metabolome of each A. baumannii strain was measured using liquid chromatography-mass spectrometry. Multivariate and univariate statistics and pathway analyses were employed to elucidate metabolic differences between the polymyxin-susceptible and -resistant A. baumannii strains. Significant differences were identified between the metabolic profiles of the polymyxin-susceptible and -resistant A. baumannii strains. The lipopolysaccharide (LPS) deficient, polymyxin-resistant 19606R showed perturbation in specific amino acid and carbohydrate metabolites, particularly pentose phosphate pathway (PPP) and tricarboxylic acid (TCA) cycle intermediates. Levels of nucleotides were lower in the LPS-deficient 19606R. Furthermore, 19606R exhibited a shift in its glycerophospholipid profile towards increased abundance of short-chain lipids compared to the parent polymyxin-susceptible ATCC 19606. In contrast, in a pair of clinical isolates 03-149.1 (polymyxin-susceptible) and 03-149.2 (polymyxin-resistant, due to modification of lipid A), minor metabolic differences were identified. Notably, peptidoglycan biosynthesis metabolites were significantly depleted in both of the aforementioned polymyxin-resistant strains. This is the first comparative untargeted metabolomics study to show substantial differences in the metabolic profiles of the polymyxin-susceptible and -resistant A. baumannii.

  2. Genome-wide association studies of autoimmune vitiligo identify 23 new risk loci and highlight key pathways and regulatory variants.

    Science.gov (United States)

    Jin, Ying; Andersen, Genevieve; Yorgov, Daniel; Ferrara, Tracey M; Ben, Songtao; Brownson, Kelly M; Holland, Paulene J; Birlea, Stanca A; Siebert, Janet; Hartmann, Anke; Lienert, Anne; van Geel, Nanja; Lambert, Jo; Luiten, Rosalie M; Wolkerstorfer, Albert; Wietze van der Veen, J P; Bennett, Dorothy C; Taïeb, Alain; Ezzedine, Khaled; Kemp, E Helen; Gawkrodger, David J; Weetman, Anthony P; Kõks, Sulev; Prans, Ele; Kingo, Külli; Karelson, Maire; Wallace, Margaret R; McCormack, Wayne T; Overbeck, Andreas; Moretti, Silvia; Colucci, Roberta; Picardo, Mauro; Silverberg, Nanette B; Olsson, Mats; Valle, Yan; Korobko, Igor; Böhm, Markus; Lim, Henry W; Hamzavi, Iltefat; Zhou, Li; Mi, Qing-Sheng; Fain, Pamela R; Santorico, Stephanie A; Spritz, Richard A

    2016-11-01

    Vitiligo is an autoimmune disease in which depigmented skin results from the destruction of melanocytes, with epidemiological association with other autoimmune diseases. In previous linkage and genome-wide association studies (GWAS1 and GWAS2), we identified 27 vitiligo susceptibility loci in patients of European ancestry. We carried out a third GWAS (GWAS3) in European-ancestry subjects, with augmented GWAS1 and GWAS2 controls, genome-wide imputation, and meta-analysis of all three GWAS, followed by an independent replication. The combined analyses, with 4,680 cases and 39,586 controls, identified 23 new significantly associated loci and 7 suggestive loci. Most encode immune and apoptotic regulators, with some also associated with other autoimmune diseases, as well as several melanocyte regulators. Bioinformatic analyses indicate a predominance of causal regulatory variation, some of which corresponds to expression quantitative trait loci (eQTLs) at these loci. Together, the identified genes provide a framework for the genetic architecture and pathobiology of vitiligo, highlight relationships with other autoimmune diseases and melanoma, and offer potential targets for treatment.

  3. Genome-wide association studies of autoimmune vitiligo identify 23 new risk loci and highlight key pathways and regulatory variants

    Science.gov (United States)

    Jin, Ying; Andersen, Genevieve; Yorgov, Daniel; Ferrara, Tracey M; Ben, Songtao; Brownson, Kelly M; Holland, Paulene J; Birlea, Stanca A; Siebert, Janet; Hartmann, Anke; Lienert, Anne; van Geel, Nanja; Lambert, Jo; Luiten, Rosalie M; Wolkerstorfer, Albert; van der Veen, JP Wietze; Bennett, Dorothy C; Taïeb, Alain; Ezzedine, Khaled; Kemp, E Helen; Gawkrodger, David J; Weetman, Anthony P; Kõks, Sulev; Prans, Ele; Kingo, Külli; Karelson, Maire; Wallace, Margaret R; McCormack, Wayne T; Overbeck, Andreas; Moretti, Silvia; Colucci, Roberta; Picardo, Mauro; Silverberg, Nanette B; Olsson, Mats; Valle, Yan; Korobko, Igor; Böhm, Markus; Lim, Henry W.; Hamzavi, Iltefat; Zhou, Li; Mi, Qing-Sheng; Fain, Pamela R.; Santorico, Stephanie A; Spritz, Richard A

    2016-01-01

    Vitiligo is an autoimmune disease in which depigmented skin results from destruction of melanocytes1, with epidemiologic association with other autoimmune diseases2. In previous linkage and genome-wide association studies (GWAS1, GWAS2), we identified 27 vitiligo susceptibility loci in patients of European (EUR) ancestry. We carried out a third GWAS (GWAS3) in EUR subjects, with augmented GWAS1 and GWAS2 controls, genome-wide imputation, and meta-analysis of all three GWAS, followed by an independent replication. The combined analyses, with 4,680 cases and 39,586 controls, identified 23 new loci and 7 suggestive loci, most encoding immune and apoptotic regulators, some also associated with other autoimmune diseases, as well as several melanocyte regulators. Bioinformatic analyses indicate a predominance of causal regulatory variation, some corresponding to eQTL at these loci. Together, the identified genes provide a framework for vitiligo genetic architecture and pathobiology, highlight relationships to other autoimmune diseases and melanoma, and offer potential targets for treatment. PMID:27723757

  4. Structural characterization of POM6 Fab and mouse prion protein complex identifies key regions for prions conformational conversion.

    Science.gov (United States)

    Baral, Pravas Kumar; Swayampakula, Mridula; Aguzzi, Adriano; James, Michael N G

    2018-05-01

    Conversion of the cellular prion protein PrP C into its pathogenic isoform PrP S c is the hallmark of prion diseases, fatal neurodegenerative diseases affecting many mammalian species including humans. Anti-prion monoclonal antibodies can arrest the progression of prion diseases by stabilizing the cellular form of the prion protein. Here, we present the crystal structure of the POM6 Fab fragment, in complex with the mouse prion protein (moPrP). The prion epitope of POM6 is in close proximity to the epitope recognized by the purportedly toxic antibody fragment, POM1 Fab also complexed with moPrP. The POM6 Fab recognizes a larger binding interface indicating a likely stronger binding compared to POM1. POM6 and POM1 exhibit distinct biological responses. Structural comparisons of the bound mouse prion proteins from the POM6 Fab:moPrP and POM1 Fab:moPrP complexes reveal several key regions of the prion protein that might be involved in initiating mis-folding events. The structural data of moPrP:POM6 Fab complex are available in the PDB under the accession number www.rcsb.org/pdb/search/structidSearch.do?structureId=6AQ7. © 2018 Federation of European Biochemical Societies.

  5. Identifying a key physical factor sensitive to the performance of Madden-Julian oscillation simulation in climate models

    Science.gov (United States)

    Kim, Go-Un; Seo, Kyong-Hwan

    2018-01-01

    A key physical factor in regulating the performance of Madden-Julian oscillation (MJO) simulation is examined by using 26 climate model simulations from the World Meteorological Organization's Working Group for Numerical Experimentation/Global Energy and Water Cycle Experiment Atmospheric System Study (WGNE and MJO-Task Force/GASS) global model comparison project. For this, intraseasonal moisture budget equation is analyzed and a simple, efficient physical quantity is developed. The result shows that MJO skill is most sensitive to vertically integrated intraseasonal zonal wind convergence (ZC). In particular, a specific threshold value of the strength of the ZC can be used as distinguishing between good and poor models. An additional finding is that good models exhibit the correct simultaneous convection and large-scale circulation phase relationship. In poor models, however, the peak circulation response appears 3 days after peak rainfall, suggesting unfavorable coupling between convection and circulation. For an improving simulation of the MJO in climate models, we propose that this delay of circulation in response to convection needs to be corrected in the cumulus parameterization scheme.

  6. RNA-Seq analysis identifies key genes associated with haustorial development in the root hemiparasite Santalum album

    Directory of Open Access Journals (Sweden)

    Xinhua eZhang

    2015-09-01

    Full Text Available Santalum album (sandalwood is one of the economically important plant species in the Santalaceae for its production of highly valued perfume oils. Sandalwood is also a hemiparasitic tree that obtains some of its water and simple nutrients by tapping into other plants through haustoria which are highly specialized organs in parasitic angiosperms. However, an understanding of the molecular mechanisms involved in haustorium development is limited. In this study, RNA sequencing (RNA-seq analyses were performed to identify changes in gene expression and metabolic pathways associated with the development of the S. album haustorium. A total of 56,011 non-redundant contigs with a mean contig size of 618 bp were obtained by de novo assembly of the transcriptome of haustoria and non-haustorial seedling roots. A substantial number of the identified differentially expressed genes were involved in cell wall metabolism and protein metabolism, as well as mitochondrial electron transport functions. Phytohormone-mediated regulation might play an important role during haustorial development. Especially, auxin signaling is likely to be essential for haustorial initiation, and genes related to cytokinin and gibberellin biosynthesis and metabolism are involved in haustorial development. Our results suggest that genes encoding nodulin-like proteins may be important for haustorial morphogenesis in S. album. The obtained sequence data will become a rich resource for future research in this interesting species. This information improves our understanding of haustorium development in root hemiparasitic species and will allow further exploration of the detailed molecular mechanisms underlying plant parasitism.

  7. Genomics and relative expression analysis identifies key genes associated with high female to male flower ratio in Jatropha curcas L.

    Science.gov (United States)

    Gangwar, Manali; Sood, Hemant; Chauhan, Rajinder Singh

    2016-04-01

    Jatropha curcas, has been projected as a major source of biodiesel due to high seed oil content (42 %). A major roadblock for commercialization of Jatropha-based biodiesel is low seed yield per inflorescence, which is affected by low female to male flower ratio (1:25-30). Molecular dissection of female flower development by analyzing genes involved in phase transitions and floral organ development is, therefore, crucial for increasing seed yield. Expression analysis of 42 genes implicated in floral organ development and sex determination was done at six floral developmental stages of a J. curcas genotype (IC561235) with inherently higher female to male flower ratio (1:8-10). Relative expression analysis of these genes was done on low ratio genotype. Genes TFL1, SUP, AP1, CRY2, CUC2, CKX1, TAA1 and PIN1 were associated with reproductive phase transition. Further, genes CUC2, TAA1, CKX1 and PIN1 were associated with female flowering while SUP and CRY2 in female flower transition. Relative expression of these genes with respect to low female flower ratio genotype showed up to ~7 folds increase in transcript abundance of SUP, TAA1, CRY2 and CKX1 genes in intermediate buds but not a significant increase (~1.25 folds) in female flowers, thereby suggesting that these genes possibly play a significant role in increased transition towards female flowering by promoting abortion of male flower primordia. The outcome of study has implications in feedstock improvement of J. curcas through functional validation and eventual utilization of key genes associated with female flowering.

  8. A Video Analysis of Intra- and Interprofessional Leadership Behaviors Within "The Burns Suite": Identifying Key Leadership Models.

    Science.gov (United States)

    Sadideen, Hazim; Weldon, Sharon-Marie; Saadeddin, Munir; Loon, Mark; Kneebone, Roger

    2016-01-01

    Leadership is particularly important in complex highly interprofessional health care contexts involving a number of staff, some from the same specialty (intraprofessional), and others from different specialties (interprofessional). The authors recently published the concept of "The Burns Suite" (TBS) as a novel simulation tool to deliver interprofessional and teamwork training. It is unclear which leadership behaviors are the most important in an interprofessional burns resuscitation scenario, and whether they can be modeled on to current leadership theory. The purpose of this study was to perform a comprehensive video analysis of leadership behaviors within TBS. A total of 3 burns resuscitation simulations within TBS were recorded. The video analysis was grounded-theory inspired. Using predefined criteria, actions/interactions deemed as leadership behaviors were identified. Using an inductive iterative process, 8 main leadership behaviors were identified. Cohen's κ coefficient was used to measure inter-rater agreement and calculated as κ = 0.7 (substantial agreement). Each video was watched 4 times, focusing on 1 of the 4 team members per viewing (senior surgeon, senior nurse, trainee surgeon, and trainee nurse). The frequency and types of leadership behavior of each of the 4 team members were recorded. Statistical significance to assess any differences was assessed using analysis of variance, whereby a p Leadership behaviors were triangulated with verbal cues and actions from the videos. All 3 scenarios were successfully completed. The mean scenario length was 22 minutes. A total of 362 leadership behaviors were recorded from the 12 participants. The most evident leadership behaviors of all team members were adhering to guidelines (which effectively equates to following Advanced Trauma and Life Support/Emergency Management of Severe Burns resuscitation guidelines and hence "maintaining standards"), followed by making decisions. Although in terms of total

  9. Metabolic profiles of triple-negative and luminal A breast cancer subtypes in African-American identify key metabolic differences.

    Science.gov (United States)

    Tayyari, Fariba; Gowda, G A Nagana; Olopade, Olufunmilayo F; Berg, Richard; Yang, Howard H; Lee, Maxwell P; Ngwa, Wilfred F; Mittal, Suresh K; Raftery, Daniel; Mohammed, Sulma I

    2018-02-20

    Breast cancer, a heterogeneous disease with variable pathophysiology and biology, is classified into four major subtypes. While hormonal- and antibody-targeted therapies are effective in the patients with luminal and HER-2 subtypes, the patients with triple-negative breast cancer (TNBC) subtype do not benefit from these therapies. The incidence rates of TNBC subtype are higher in African-American women, and the evidence indicates that these women have worse prognosis compared to women of European descent. The reasons for this disparity remain unclear but are often attributed to TNBC biology. In this study, we performed metabolic analysis of breast tissues to identify how TNBC differs from luminal A breast cancer (LABC) subtypes within the African-American and Caucasian breast cancer patients, respectively. We used High-Resolution Magic Angle Spinning (HR-MAS) 1H Nuclear magnetic resonance (NMR) to perform the metabolomic analysis of breast cancer and adjacent normal tissues (total n=82 samples). TNBC and LABC subtypes in African American women exhibited different metabolic profiles. Metabolic profiles of these subtypes were also distinct from those revealed in Caucasian women. TNBC in African-American women expressed higher levels of glutathione, choline, and glutamine as well as profound metabolic alterations characterized by decreased mitochondrial respiration and increased glycolysis concomitant with decreased levels of ATP. TNBC in Caucasian women was associated with increased pyrimidine synthesis. These metabolic alterations could potentially be exploited as novel treatment targets for TNBC.

  10. Comparative and functional genomics of Legionella identified eukaryotic like proteins as key players in host-pathogen interactions

    Directory of Open Access Journals (Sweden)

    Laura eGomez-Valero

    2011-10-01

    Full Text Available Although best known for its ability to cause severe pneumonia in people whose immune defenses are weakened, Legionella pneumophila and Legionella longbeachae are two species of a large genus of bacteria that are ubiquitous in nature, where they parasitize protozoa. Adaptation to the host environment and exploitation of host cell functions are critical for the success of these intracellular pathogens. The establishment and publication of the complete genome sequences of L. pneumophila and L. longbeachae isolates paved the way for major breakthroughs in understanding the biology of these organisms. In this review we present the knowledge gained from the analyses and comparison of the complete genome sequences of different L. pneumophila and L. longbeachae strains. Emphasis is given on putative virulence and Legionella life cycle related functions, such as the identification of an extended array of eukaryotic-like proteins, many of which have been shown to modulate host cell functions to the pathogen's advantage. Surprisingly, many of the eukaryotic domain proteins identified in L. pneumophila as well as many substrates of the Dot/Icm type IV secretion system essential for intracellular replication are different between these two species, although they cause the same disease. Finally, evolutionary aspects regarding the eukaryotic like proteins in Legionella are discussed.

  11. Identifying and Prioritizing the Key Factors Influencing Customer Decision Making in Buying Organizational Software (A survey about HAMKARAN Co.

    Directory of Open Access Journals (Sweden)

    shahryar Azizi

    2013-07-01

    Full Text Available Expansion of adopting information systems, specially packed software, facilitate managing the organizational process, hence, identification the factors influence customer buying decision is vital for software providers. This mixed method study tried to identify the factors affecting decision making of buying new organizational software, classify and rank them beside. In-depth interviews with 10 customers of Hamkaran system that had the potential of buying new software have been done and content analysis of these interviews revealed some factors in five categories that became the base of questionnaire design. This study is applied in view of aim, and is descriptive-survey in view of entity. Sample of 177 customers of System Group Co. have been chosen for the study. Kruskal-Wallis test and T test of normality showed all factors to be effective. Then the factors have been prioritized using Frideman test which are as follows: buyer`s internal organizational factors, product feature, factors related to sellers organization, factors related to process and selling promotion, market and environmental factors.

  12. Co‐occurrence dynamics of endangered Lower Keys marsh rabbits and free‐ranging domestic cats: Prey responses to an exotic predator removal program

    Science.gov (United States)

    Cove, Michael V.; Gardner, Beth; Simons, Theodore R.; O'Connell, Allan F.

    2018-01-01

    The Lower Keys marsh rabbit (Sylvilagus palustris hefneri) is one of many endangered endemic species of the Florida Keys. The main threats are habitat loss and fragmentation from sea‐level rise, development, and habitat succession. Exotic predators such as free‐ranging domestic cats (Felis catus) pose an additional threat to these endangered small mammals. Management strategies have focused on habitat restoration and exotic predator control. However, the effectiveness of predator removal and the effects of anthropogenic habitat modifications and restoration have not been evaluated. Between 2013 and 2015, we used camera traps to survey marsh rabbits and free‐ranging cats at 84 sites in the National Key Deer Refuge, Big Pine Key, Florida, USA. We used dynamic occupancy models to determine factors associated with marsh rabbit occurrence, colonization, extinction, and the co‐occurrence of marsh rabbits and cats during a period of predator removal. Rabbit occurrence was positively related to freshwater habitat and patch size, but was negatively related to the number of individual cats detected at each site. Furthermore, marsh rabbit colonization was negatively associated with relative increases in the number of individual cats at each site between survey years. Cat occurrence was negatively associated with increasing distance from human developments. The probability of cat site extinction was positively related to a 2‐year trapping effort, indicating that predator removal reduced the cat population. Dynamic co‐occurrence models suggested that cats and marsh rabbits co‐occur less frequently than expected under random conditions, whereas co‐detections were site and survey‐specific. Rabbit site extinction and colonization were not strongly conditional on cat presence, but corresponded with a negative association. Our results suggest that while rabbits can colonize and persist at sites where cats occur, it is the number of individual cats at a site that

  13. Co-occurrence dynamics of endangered Lower Keys marsh rabbits and free-ranging domestic cats: Prey responses to an exotic predator removal program.

    Science.gov (United States)

    Cove, Michael V; Gardner, Beth; Simons, Theodore R; O'Connell, Allan F

    2018-04-01

    The Lower Keys marsh rabbit ( Sylvilagus palustris hefneri ) is one of many endangered endemic species of the Florida Keys. The main threats are habitat loss and fragmentation from sea-level rise, development, and habitat succession. Exotic predators such as free-ranging domestic cats ( Felis catus ) pose an additional threat to these endangered small mammals. Management strategies have focused on habitat restoration and exotic predator control. However, the effectiveness of predator removal and the effects of anthropogenic habitat modifications and restoration have not been evaluated. Between 2013 and 2015, we used camera traps to survey marsh rabbits and free-ranging cats at 84 sites in the National Key Deer Refuge, Big Pine Key, Florida, USA. We used dynamic occupancy models to determine factors associated with marsh rabbit occurrence, colonization, extinction, and the co-occurrence of marsh rabbits and cats during a period of predator removal. Rabbit occurrence was positively related to freshwater habitat and patch size, but was negatively related to the number of individual cats detected at each site. Furthermore, marsh rabbit colonization was negatively associated with relative increases in the number of individual cats at each site between survey years. Cat occurrence was negatively associated with increasing distance from human developments. The probability of cat site extinction was positively related to a 2-year trapping effort, indicating that predator removal reduced the cat population. Dynamic co-occurrence models suggested that cats and marsh rabbits co-occur less frequently than expected under random conditions, whereas co-detections were site and survey-specific. Rabbit site extinction and colonization were not strongly conditional on cat presence, but corresponded with a negative association. Our results suggest that while rabbits can colonize and persist at sites where cats occur, it is the number of individual cats at a site that more strongly

  14. A molecular key for building hyphae aggregates: the role of the newly identified Streptomyces protein HyaS.

    Science.gov (United States)

    Koebsch, Ilona; Overbeck, Jens; Piepmeyer, Sophie; Meschke, Holger; Schrempf, Hildgund

    2009-05-01

    Streptomycetes produce many metabolites with medical and biotechnological applications. During fermentations, their hyphae build aggregates, a process in which the newly identified protein HyaS plays an important role. The corresponding hyaS gene is present within all investigated Streptomyces species. Reporter fusions indicate that transcription of hyaS occurs within substrate hyphae of the Streptomyces lividans wild type (WT). The HyaS protein is dominantly associated with the substrate hyphae. The WT strain forms cylindrically shaped clumps of densely packed substrate hyphae, often fusing to higher aggregates (pellets), which remain stably associated during shaking. Investigations by electron microscopy suggest that HyaS induces tight fusion-like contacts among substrate hyphae. In contrast, the pellets of the designed hyaS disruption mutant ΔH are irregular in shape, contain frequently outgrowing bunches of hyphae, and fuse less frequently. ΔH complemented with a plasmid carrying hyaS resembles the WT phenotype. Biochemical studies indicate that the C-terminal region of HyaS has amine oxidase activity. Investigations of ΔH transformants, each carrying a specifically mutated gene, lead to the conclusion that the in situ oxidase activity correlates with the pellet-inducing role of HyaS, and depends on the presence of certain histidine residues. Furthermore, the level of undecylprodigiosin, a red pigment with antibiotic activity, is influenced by the engineered hyaS subtype within a strain. These data present the first molecular basis for future manipulation of pellets, and concomitant production of secondary metabolites during biotechnological processes. © 2009 The Authors. Journal compilation © 2009 Society for Applied Microbiology and Blackwell Publishing Ltd.

  15. How cannabis causes paranoia: using the intravenous administration of ∆9-tetrahydrocannabinol (THC) to identify key cognitive mechanisms leading to paranoia.

    Science.gov (United States)

    Freeman, Daniel; Dunn, Graham; Murray, Robin M; Evans, Nicole; Lister, Rachel; Antley, Angus; Slater, Mel; Godlewska, Beata; Cornish, Robert; Williams, Jonathan; Di Simplicio, Martina; Igoumenou, Artemis; Brenneisen, Rudolf; Tunbridge, Elizabeth M; Harrison, Paul J; Harmer, Catherine J; Cowen, Philip; Morrison, Paul D

    2015-03-01

    Paranoia is receiving increasing attention in its own right, since it is a central experience of psychotic disorders and a marker of the health of a society. Paranoia is associated with use of the most commonly taken illicit drug, cannabis. The objective was to determine whether the principal psychoactive ingredient of cannabis-∆(9)-tetrahydrocannabinol (THC)-causes paranoia and to use the drug as a probe to identify key cognitive mechanisms underlying paranoia. A randomized, placebo-controlled, between-groups test of the effects of intravenous THC was conducted. A total of 121 individuals with paranoid ideation were randomized to receive placebo, THC, or THC preceded by a cognitive awareness condition. Paranoia was assessed extensively via a real social situation, an immersive virtual reality experiment, and standard self-report and interviewer measures. Putative causal factors were assessed. Principal components analysis was used to create a composite paranoia score and composite causal variables to be tested in a mediation analysis. THC significantly increased paranoia, negative affect (anxiety, worry, depression, negative thoughts about the self), and a range of anomalous experiences, and reduced working memory capacity. The increase in negative affect and in anomalous experiences fully accounted for the increase in paranoia. Working memory changes did not lead to paranoia. Making participants aware of the effects of THC had little impact. In this largest study of intravenous THC, it was definitively demonstrated that the drug triggers paranoid thoughts in vulnerable individuals. The most likely mechanism of action causing paranoia was the generation of negative affect and anomalous experiences. © The Author 2014. Published by Oxford University Press on behalf of the Maryland Psychiatric Research Center.

  16. Challenges in identifying and determining the impacts of infection with pestiviruses on the herd health of free ranging cervid populations

    Science.gov (United States)

    Although most commonly associated with the infection of domestic livestock, the replication of pestiviruses, in particular bovine viral diarrhea virus (BVDV), occurs in a wide range of free ranging cervids including white-tailed deer, mule deer, fallow deer, elk, red deer, roe deer, eland and moused...

  17. Identifying key controls on the behavior of an acidic-U(VI) plume in the Savannah River Site using reactive transport modeling.

    Science.gov (United States)

    Bea, Sergio A; Wainwright, Haruko; Spycher, Nicolas; Faybishenko, Boris; Hubbard, Susan S; Denham, Miles E

    2013-08-01

    Acidic low-level waste radioactive waste solutions were discharged to three unlined seepage basins at the F-Area of the Department of Energy (DOE) Savannah River Site (SRS), South Carolina, USA, from 1955 through 1989. Despite many years of active remediation, the groundwater remains acidic and contaminated with significant levels of U(VI) and other radionuclides. Monitored Natural Attenuation (MNA) is a desired closure strategy for the site, based on the premise that regional flow of clean background groundwater will eventually neutralize the groundwater acidity, immobilizing U(VI) through adsorption. An in situ treatment system is currently in place to accelerate this in the downgradient portion of the plume and similar measures could be taken upgradient if necessary. Understanding the long-term pH and U(VI) adsorption behavior at the site is critical to assess feasibility of MNA along with the in-situ remediation treatments. This paper presents a reactive transport (RT) model and uncertainty quantification (UQ) analyses to explore key controls on the U(VI)-plume evolution and long-term mobility at this site. Two-dimensional numerical RT simulations are run including the saturated and unsaturated (vadose) zones, U(VI) and H(+) adsorption (surface complexation) onto sediments, dissolution and precipitation of Al and Fe minerals, and key hydrodynamic processes are considered. UQ techniques are applied using a new open-source tool that is part of the developing ASCEM reactive transport modeling and analysis framework to: (1) identify the complex physical and geochemical processes that control the U(VI) plume migration in the pH range where the plume is highly mobile, (2) evaluate those physical and geochemical parameters that are most controlling, and (3) predict the future plume evolution constrained by historical, chemical and hydrological data. The RT simulation results show a good agreement with the observed historical pH and concentrations of U(VI), nitrates

  18. A groundwater salinity hotspot and its connection to an intermittent stream identified by environmental tracers (Mt Lofty Ranges, South Australia)

    Science.gov (United States)

    Anderson, Thomas A.; Bestland, Erick A.; Soloninka, Lesja; Wallis, Ilka; Banks, Edward W.; Pichler, Markus

    2017-12-01

    High and variable levels of salinity were investigated in an intermittent stream in a high-rainfall area (˜800 mm/year) of the Mt. Lofty Ranges of South Australia. The groundwater system was found to have a local, upslope saline lens, referred to here as a groundwater salinity `hotspot'. Environmental tracer analyses (δ18O, δ2H, 87/86Sr, and major elements) of water from the intermittent stream, a nearby permanent stream, shallow and deep groundwater, and soil-water/runoff demonstrate seasonal groundwater input of very saline composition into the intermittent stream. This input results in large salinity increases of the stream water because the winter wet-season stream flow decreases during spring in this Mediterranean climate. Furthermore, strontium and water isotope analyses demonstrate: (1) the upslope-saline-groundwater zone (hotspot) mixes with the dominant groundwater system, (2) the intermittent-stream water is a mixture of soil-water/runoff and the upslope saline groundwater, and (3) the upslope-saline-groundwater zone results from the flushing of unsaturated-zone salts from the thick clayey regolith and soil which overlie the metamorphosed shale bedrock. The preferred theory on the origin of the upslope-saline-groundwater hotspot is land clearing of native deep-rooted woodland, followed by flushing of accumulated salts from the unsaturated zone due to increased recharge. This cause of elevated groundwater and surface-water salinity, if correct, could be widespread in Mt. Lofty Ranges areas, as well as other climatically and geologically similar areas with comparable hydrogeologic conditions.

  19. The building blocks of a 'Liveable Neighbourhood': Identifying the key performance indicators for walking of an operational planning policy in Perth, Western Australia.

    Science.gov (United States)

    Hooper, Paula; Knuiman, Matthew; Foster, Sarah; Giles-Corti, Billie

    2015-11-01

    Planning policy makers are requesting clearer guidance on the key design features required to build neighbourhoods that promote active living. Using a backwards stepwise elimination procedure (logistic regression with generalised estimating equations adjusting for demographic characteristics, self-selection factors, stage of construction and scale of development) this study identified specific design features (n=16) from an operational planning policy ("Liveable Neighbourhoods") that showed the strongest associations with walking behaviours (measured using the Neighbourhood Physical Activity Questionnaire). The interacting effects of design features on walking behaviours were also investigated. The urban design features identified were grouped into the "building blocks of a Liveable Neighbourhood", reflecting the scale, importance and sequencing of the design and implementation phases required to create walkable, pedestrian friendly developments. Copyright © 2015 Elsevier Ltd. All rights reserved.

  20. Genome-wide expression profiling analysis to identify key genes in the anti-HIV mechanism of CD4+ and CD8+ T cells.

    Science.gov (United States)

    Gao, Lijie; Wang, Yunqi; Li, Yi; Dong, Ya; Yang, Aimin; Zhang, Jie; Li, Fengying; Zhang, Rongqiang

    2018-07-01

    Comprehensive bioinformatics analyses were performed to explore the key biomarkers in response to HIV infection of CD4 + and CD8 + T cells. The numbers of CD4 + and CD8 + T cells of HIV infected individuals were analyzed and the GEO database (GSE6740) was screened for differentially expressed genes (DEGs) in HIV infected CD4 + and CD8 + T cells. Gene Ontology enrichment, KEGG pathway analyses, and protein-protein interaction (PPI) network were performed to identify the key pathway and core proteins in anti-HIV virus process of CD4 + and CD8 + T cells. Finally, we analyzed the expressions of key proteins in HIV-infected T cells (GSE6740 dataset) and peripheral blood mononuclear cells(PBMCs) (GSE511 dataset). 1) CD4 + T cells counts and ratio of CD4 + /CD8 + T cells decreased while CD8 + T cells counts increased in HIV positive individuals; 2) 517 DEGs were found in HIV infected CD4 + and CD8 + T cells at acute and chronic stage with the criterial of P-value T cells. The main biological processes of the DEGs were response to virus and defense response to virus. At chronic stage, ISG15 protein, in conjunction with IFN-1 pathway might play key roles in anti-HIV responses of CD4 + T cells; and 4) The expression of ISG15 increased in both T cells and PBMCs after HIV infection. Gene expression profile of CD4 + and CD8 + T cells changed significantly in HIV infection, in which ISG15 gene may play a central role in activating the natural antiviral process of immune cells. © 2018 Wiley Periodicals, Inc.

  1. Using the Theory of Planned Behavior to identify key beliefs underlying chlamydia testing intentions in a sample of young people living in deprived areas.

    Science.gov (United States)

    Booth, Amy R; Norman, Paul; Harris, Peter R; Goyder, Elizabeth

    2015-09-01

    The Theory of Planned Behavior was used to identify the key behavioural, normative and control beliefs underlying intentions to test regularly for chlamydia among young people living in socially and economically deprived areas - a high-risk group for infection. Participants (N = 278, 53% male; mean age 17 years) were recruited from a vocational college situated in an area in the most deprived national quintile (England). Participants completed measures of behavioural, normative and control beliefs, plus intention to test regularly for chlamydia. The behavioural, normative and control beliefs most strongly correlated with intentions to test regularly for chlamydia were beliefs about stopping the spread of infection, partners' behaviour and the availability of testing. These beliefs represent potential targets for interventions to increase chlamydia testing among young people living in deprived areas. © The Author(s) 2013.

  2. Integrated network analysis identifies fight-club nodes as a class of hubs encompassing key putative switch genes that induce major transcriptome reprogramming during grapevine development.

    Science.gov (United States)

    Palumbo, Maria Concetta; Zenoni, Sara; Fasoli, Marianna; Massonnet, Mélanie; Farina, Lorenzo; Castiglione, Filippo; Pezzotti, Mario; Paci, Paola

    2014-12-01

    We developed an approach that integrates different network-based methods to analyze the correlation network arising from large-scale gene expression data. By studying grapevine (Vitis vinifera) and tomato (Solanum lycopersicum) gene expression atlases and a grapevine berry transcriptomic data set during the transition from immature to mature growth, we identified a category named "fight-club hubs" characterized by a marked negative correlation with the expression profiles of neighboring genes in the network. A special subset named "switch genes" was identified, with the additional property of many significant negative correlations outside their own group in the network. Switch genes are involved in multiple processes and include transcription factors that may be considered master regulators of the previously reported transcriptome remodeling that marks the developmental shift from immature to mature growth. All switch genes, expressed at low levels in vegetative/green tissues, showed a significant increase in mature/woody organs, suggesting a potential regulatory role during the developmental transition. Finally, our analysis of tomato gene expression data sets showed that wild-type switch genes are downregulated in ripening-deficient mutants. The identification of known master regulators of tomato fruit maturation suggests our method is suitable for the detection of key regulators of organ development in different fleshy fruit crops. © 2014 American Society of Plant Biologists. All rights reserved.

  3. Gene Network Construction from Microarray Data Identifies a Key Network Module and Several Candidate Hub Genes in Age-Associated Spatial Learning Impairment.

    Science.gov (United States)

    Uddin, Raihan; Singh, Shiva M

    2017-01-01

    As humans age many suffer from a decrease in normal brain functions including spatial learning impairments. This study aimed to better understand the molecular mechanisms in age-associated spatial learning impairment (ASLI). We used a mathematical modeling approach implemented in Weighted Gene Co-expression Network Analysis (WGCNA) to create and compare gene network models of young (learning unimpaired) and aged (predominantly learning impaired) brains from a set of exploratory datasets in rats in the context of ASLI. The major goal was to overcome some of the limitations previously observed in the traditional meta- and pathway analysis using these data, and identify novel ASLI related genes and their networks based on co-expression relationship of genes. This analysis identified a set of network modules in the young, each of which is highly enriched with genes functioning in broad but distinct GO functional categories or biological pathways. Interestingly, the analysis pointed to a single module that was highly enriched with genes functioning in "learning and memory" related functions and pathways. Subsequent differential network analysis of this "learning and memory" module in the aged (predominantly learning impaired) rats compared to the young learning unimpaired rats allowed us to identify a set of novel ASLI candidate hub genes. Some of these genes show significant repeatability in networks generated from independent young and aged validation datasets. These hub genes are highly co-expressed with other genes in the network, which not only show differential expression but also differential co-expression and differential connectivity across age and learning impairment. The known function of these hub genes indicate that they play key roles in critical pathways, including kinase and phosphatase signaling, in functions related to various ion channels, and in maintaining neuronal integrity relating to synaptic plasticity and memory formation. Taken together, they

  4. How to identify the key factors that affect driver perception of accident risk. A comparison between Italian and Spanish driver behavior.

    Science.gov (United States)

    de Oña, Juan; de Oña, Rocio; Eboli, Laura; Forciniti, Carmen; Mazzulla, Gabriella

    2014-12-01

    Road crashes can be caused by different factors, including infrastructure, vehicles, and human variables. Many research studies have focused solely on identifying the key factors that cause road crashes. From these studies, it emerged that human factors have the most relevant impact on accident severity. More specifically, accident severity depends on several factors related directly to the driver, i.e., driving experience, driver's socio-economic characteristics, and driving behavior and attitudes. In this paper, we investigate driver behaviors and attitudes while driving and specifically focus on different methods for identifying the factors that most affect the driver's perception of accident risk. To this end, we designed and conducted a survey in two different European contexts: the city of Cosenza, which is located in the south of Italy, and the city of Granada, which is located in the south of Spain. Samples of drivers were contacted for their opinions on certain aspects of driving rules and attitudes while driving, and different types of questions were addressed to the drivers to assess their judgments of these aspects. Consequently, different methods of data analysis were applied to determine the aspects that heavily influence driver perception of accident risk. An experiment based on the stated preferences (SP) was carried out with the drivers, and the SP data were analyzed using an ordered probit (OP) model. Interesting findings emerged from different analyses of the data and from the comparisons among the data collected in the two different territorial contexts. We found that both Italian and Spanish drivers consider driving in an altered psychophysical state and violating the overtaking rules to be the most risky behaviors. Copyright © 2014 Elsevier Ltd. All rights reserved.

  5. Diagnosing climate change impacts and identifying adaptation strategies by involving key stakeholder organisations and farmers in Sikkim, India: Challenges and opportunities.

    Science.gov (United States)

    Azhoni, Adani; Goyal, Manish Kumar

    2018-06-01

    Narrowing the gap between research, policy making and implementing adaptation remains a challenge in many parts of the world where climate change is likely to severely impact water security. This research aims to narrow this gap by matching the adaptation strategies being framed by policy makers to that of the perspectives of development agencies, researchers and farmers in the Himalayan state of Sikkim in India. Our case study examined the perspectives of various stakeholders for climate change impacts, current adaptation strategies, knowledge gaps and adaptation barriers, particularly in the context of implementing the Sikkim State Action Plan on Climate Change through semi-structured interviews carried out with decision makers in the Sikkim State Government, researchers, consultants, local academia, development agencies and farmers. Using Stakeholders Network Analysis tools, this research unravels the complexities of perceiving climate change impacts, identifying strategies, and implementing adaptation. While farmers are less aware about the global phenomenon of climate change impacts for water security, their knowledge of the local conditions and their close interaction with the State Government Agriculture Department provides them opportunities. Although important steps are being initiated through the Sikkim State Action Plan on Climate Change it is yet to deliver effective means of adaptation implementation and hence, strengthening the networks of close coordination between the various implementing agencies will pay dividends. Knowledge gaps and the need for capacity building identified in this research, based on the understandings of key stakeholders are highly relevant to both the research community and for informing policy. Copyright © 2018 Elsevier B.V. All rights reserved.

  6. Integrated RNA-Seq and sRNA-Seq Analysis Identifies Chilling and Freezing Responsive Key Molecular Players and Pathways in Tea Plant (Camellia sinensis)

    Science.gov (United States)

    Zheng, Chao; Zhao, Lei; Wang, Yu; Shen, Jiazhi; Zhang, Yinfei; Jia, Sisi; Li, Yusheng; Ding, Zhaotang

    2015-01-01

    Tea [Camellia sinensis (L) O. Kuntze, Theaceae] is one of the most popular non-alcoholic beverages worldwide. Cold stress is one of the most severe abiotic stresses that limit tea plants’ growth, survival and geographical distribution. However, the genetic regulatory network and signaling pathways involved in cold stress responses in tea plants remain unearthed. Using RNA-Seq, DGE and sRNA-Seq technologies, we performed an integrative analysis of miRNA and mRNA expression profiling and their regulatory network of tea plants under chilling (4℃) and freezing (-5℃) stress. Differentially expressed (DE) miRNA and mRNA profiles were obtained based on fold change analysis, miRNAs and target mRNAs were found to show both coherent and incoherent relationships in the regulatory network. Furthermore, we compared several key pathways (e.g., ‘Photosynthesis’), GO terms (e.g., ‘response to karrikin’) and transcriptional factors (TFs, e.g., DREB1b/CBF1) which were identified as involved in the early chilling and/or freezing response of tea plants. Intriguingly, we found that karrikins, a new group of plant growth regulators, and β-primeverosidase (BPR), a key enzyme functionally relevant with the formation of tea aroma might play an important role in both early chilling and freezing response of tea plants. Quantitative reverse transcriptase-polymerase chain reaction (qRT-PCR) analysis further confirmed the results from RNA-Seq and sRNA-Seq analysis. This is the first study to simultaneously profile the expression patterns of both miRNAs and mRNAs on a genome-wide scale to elucidate the molecular mechanisms of early responses of tea plants to cold stress. In addition to gaining a deeper insight into the cold resistant characteristics of tea plants, we provide a good case study to analyse mRNA/miRNA expression and profiling of non-model plant species using next-generation sequencing technology. PMID:25901577

  7. Sulfur Denitrosylation by an Engineered Trx-like DsbG Enzyme Identifies Nucleophilic Cysteine Hydrogen Bonds as Key Functional Determinant.

    Science.gov (United States)

    Lafaye, Céline; Van Molle, Inge; Tamu Dufe, Veronica; Wahni, Khadija; Boudier, Ariane; Leroy, Pierre; Collet, Jean-François; Messens, Joris

    2016-07-15

    Exposure of bacteria to NO results in the nitrosylation of cysteine thiols in proteins and low molecular weight thiols such as GSH. The cells possess enzymatic systems that catalyze the denitrosylation of these modified sulfurs. An important player in these systems is thioredoxin (Trx), a ubiquitous, cytoplasmic oxidoreductase that can denitrosylate proteins in vivo and S-nitrosoglutathione (GSNO) in vitro However, a periplasmic or extracellular denitrosylase has not been identified, raising the question of how extracytoplasmic proteins are repaired after nitrosative damage. In this study, we tested whether DsbG and DsbC, two Trx family proteins that function in reducing pathways in the Escherichia coli periplasm, also possess denitrosylating activity. Both DsbG and DsbC are poorly reactive toward GSNO. Moreover, DsbG is unable to denitrosylate its specific substrate protein, YbiS. Remarkably, by borrowing the CGPC active site of E. coli Trx-1 in combination with a T200M point mutation, we transformed DsbG into an enzyme highly reactive toward GSNO and YbiS. The pKa of the nucleophilic cysteine, as well as the redox and thermodynamic properties of the engineered DsbG are dramatically changed and become similar to those of E. coli Trx-1. X-ray structural insights suggest that this results from a loss of two direct hydrogen bonds to the nucleophilic cysteine sulfur in the DsbG mutant. Our results highlight the plasticity of the Trx structural fold and reveal that the subtle change of the number of hydrogen bonds in the active site of Trx-like proteins is the key factor that thermodynamically controls reactivity toward nitrosylated compounds. © 2016 by The American Society for Biochemistry and Molecular Biology, Inc.

  8. Identifying Key Features, Cutting Edge Cloud Resources, and Artificial Intelligence Tools to Achieve User-Friendly Water Science in the Cloud

    Science.gov (United States)

    Pierce, S. A.

    2017-12-01

    Decision making for groundwater systems is becoming increasingly important, as shifting water demands increasingly impact aquifers. As buffer systems, aquifers provide room for resilient responses and augment the actual timeframe for hydrological response. Yet the pace impacts, climate shifts, and degradation of water resources is accelerating. To meet these new drivers, groundwater science is transitioning toward the emerging field of Integrated Water Resources Management, or IWRM. IWRM incorporates a broad array of dimensions, methods, and tools to address problems that tend to be complex. Computational tools and accessible cyberinfrastructure (CI) are needed to cross the chasm between science and society. Fortunately cloud computing environments, such as the new Jetstream system, are evolving rapidly. While still targeting scientific user groups systems such as, Jetstream, offer configurable cyberinfrastructure to enable interactive computing and data analysis resources on demand. The web-based interfaces allow researchers to rapidly customize virtual machines, modify computing architecture and increase the usability and access for broader audiences to advanced compute environments. The result enables dexterous configurations and opening up opportunities for IWRM modelers to expand the reach of analyses, number of case studies, and quality of engagement with stakeholders and decision makers. The acute need to identify improved IWRM solutions paired with advanced computational resources refocuses the attention of IWRM researchers on applications, workflows, and intelligent systems that are capable of accelerating progress. IWRM must address key drivers of community concern, implement transdisciplinary methodologies, adapt and apply decision support tools in order to effectively support decisions about groundwater resource management. This presentation will provide an overview of advanced computing services in the cloud using integrated groundwater management case

  9. A pilot study using scripted ventilation conditions to identify key factors affecting indoor pollutant concentration and air exchange rate in a residence.

    Science.gov (United States)

    Johnson, Ted; Myers, Jeffrey; Kelly, Thomas; Wisbith, Anthony; Ollison, Will

    2004-01-01

    A pilot study was conducted using an occupied, single-family test house in Columbus, OH, to determine whether a script-based protocol could be used to obtain data useful in identifying the key factors affecting air-exchange rate (AER) and the relationship between indoor and outdoor concentrations of selected traffic-related air pollutants. The test script called for hourly changes to elements of the test house considered likely to influence air flow and AER, including the position (open or closed) of each window and door and the operation (on/off) of the furnace, air conditioner, and ceiling fans. The script was implemented over a 3-day period (January 30-February 1, 2002) during which technicians collected hourly-average data for AER, indoor, and outdoor air concentrations for six pollutants (benzene, formaldehyde (HCHO), polycyclic aromatic hydrocarbons (PAH), carbon monoxide (CO), nitric oxide (NO), and nitrogen oxides (NO(x))), and selected meteorological variables. Consistent with expectations, AER tended to increase with the number of open exterior windows and doors. The 39 AER values measured during the study when all exterior doors and windows were closed varied from 0.36 to 2.29 h(-1) with a geometric mean (GM) of 0.77 h(-1) and a geometric standard deviation (GSD) of 1.435. The 27 AER values measured when at least one exterior door or window was opened varied from 0.50 to 15.8 h(-1) with a GM of 1.98 h(-1) and a GSD of 1.902. AER was also affected by temperature and wind speed, most noticeably when exterior windows and doors were closed. Results of a series of stepwise linear regression analyses suggest that (1) outdoor pollutant concentration and (2) indoor pollutant concentration during the preceding hour were the "variables of choice" for predicting indoor pollutant concentration in the test house under the conditions of this study. Depending on the pollutant and ventilation conditions, one or more of the following variables produced a small, but

  10. Identifying Feasible Locations for Wetland Creation or Restoration in Catchments by Suitability Modelling Using Light Detection and Ranging (LiDAR Digital Elevation Model (DEM

    Directory of Open Access Journals (Sweden)

    Evelyn Uuemaa

    2018-04-01

    Full Text Available Wetlands play a key role in controlling flooding and non-point-source (diffuse pollution. They are therefore an important tool for mitigating diffuse water pollution from farms. However, to use this tool, it is necessary to obtain detailed assessments and identification of potential wetland restoration or creation sites. This is complicated by the diversity of landscapes, environmental conditions, and land ownership. Site suitability for wetland restoration or creation depends on many factors: the underlying geology, soils, topography, hydrology, drainage, and land ownership. Local hydrology and soils are among the most important factors. However, the inventory and characterization of a site’s soils and hydrology often requires extensive, expensive, and time-consuming ground surveys, and it is therefore limited to small areas. Another possibility would be to consider topography, which strongly determines water movement patterns. Light detection and ranging (LiDAR data provides detailed topographic information and can be acquired by remote sensing. Our study showed that terrain analysis using high-resolution topographical data can produce suitability maps for wetlands that can be easily used by decision makers and planners in watershed management. The rapid methodology reveals potential wetland creation or restoration sites at a reasonable cost; with the resulting spatially explicit suitability map, managers can plan for wetland creation or restoration without having to wait for field-data collection.

  11. Construction of the Al-Ni-Si phase diagram over the whole composition and temperature ranges: thermodynamic modeling supported by key experiments and first-principles calculations

    Energy Technology Data Exchange (ETDEWEB)

    Xiong Wei; Du Yong; Wang Jiong; Zhang Wei-Wei [State Key Lab. of Powder Metallurgy, Central South Univ., Changsha (China); Hu Rong-Xiang; Nash, P. [Thermal Processing Technology Center, Illinois Inst. of Tech., Chicago (United States); Lu Xiao-Gang [Thermo-Calc AB, Stockholm Technology Park, Stockholm (Sweden)

    2008-06-15

    An extensive thermodynamic investigation of the Al-Ni-Si system is carried out via an integrated approach of calculation of phase diagrams, first-principles calculations, and key experiments. Eighteen decisive alloys are prepared in order to verify the existence of the previously reported ternary compounds and to provide new phase equilibrium data. Phase compositions, microstructure, and phase transition temperatures are determined using the combined techniques of X-ray diffraction, scanning electron microscopy, energy dispersion X-ray analysis, and differential thermal analysis. The order/disorder transition between disordered bccA2 and ordered bccB2 phases as well as that between disordered fccA1 and ordered L1{sub 2} phase are described using a two-sublattice model. A self-consistent parameter set is finally obtained by considering the huge amount of experimental data including 13 vertical sections and 5 isothermal sections from both the literature and the present experiments. Almost all of the reliable phase diagram data can be well described by the present modeling. The reliability of the calculated thermodynamic properties for ternary phases is verified through enthalpy measurement employing drop calorimetry and first-principles calculations. The thermodynamic parameters obtained can also successfully predict most of the thermodynamic properties and describe the solidification path for the selected as-cast alloy Al{sub 6}Ni{sub 55}Si{sub 39}. (orig.)

  12. Identifying the most promising genotypes in lentil for cultivation in a wide range of environments of Pakistan using various yield stability measures

    International Nuclear Information System (INIS)

    Ali, A.; Zahid, M.A.

    2012-01-01

    The present study was aimed to identify the most promising high yielding lentil genotype for a wide range of environments of Pakistan using 8 stability measures. The experiment consisted of 12 lentil genotypes grown at 11 locations falling in different agro-ecological zones of Pakistan for 2 years during 2006/07 and 2007/08 under national uniform yield testing. The General Linear Model (GLM) of MINITAB (version 15) was used for two-way analysis of variance for lentil yield data to examine the total variation into genotypes, environments and genotype x environment interaction. The percent variation of 2 major contributors, environment and GxE interaction, was permissible to perform stability analysis to evaluate stable genotypes across the environments. The genotype x environment interaction means were used for eight stability measures (genotype mean, genotype variance, coefficient of variation, ecovalence, interaction variance, regression slope, deviation mean square, coefficient of determination). The stability measures depicted that the genotype NARC-06-1 with high mean yield (1140 kg/ha -1/), regression slope (1.09) close to unity and less statistics of remaining stability measures except high value of R/sup 2/ for yield proved to be the best within the pool of studied genotypes. The results clearly suggest that the genotype NARC-06-1 may prove to be a widely adapted high yielding stable variety for a broad spectrum of environments of Pakistan. (author)

  13. Combination of microbiological culture and multiplex PCR increases the range of vaginal microorganisms identified in cervical cancer patients at high risk for bacterial vaginosis and vaginitis.

    Science.gov (United States)

    Schmidt, Katarzyna; Cybulski, Zefiryn; Roszak, Andrzej; Grabiec, Alicja; Talaga, Zofia; Urbański, Bartosz; Odważna, Joanna; Wojciechowicz, Jacek

    2015-05-01

    Bacterial vaginosis (BV) and vaginitis in cervical cancer patients might becaused by mixed aerobic, anaerobic, and atypical bacteria. Since genital tract infections can be complicated, early and accurate identification of causal pathogens is vital. The purpose of this study was i) to determinate if currently used aerobic culture methods are sufficiently sensitive to identify pathogens that can appear in the cervix of women after cancer treatment; ii) to investigate if molecular methods can improve the diagnostic process of BV and vaginitis, as well as broaden the range of detectable pathogens that would otherwise be difficult to cultivate. A one-year hospital-based study was conducted in 2011/2012. Cervical swabs from 130 patients were examined by microbiological culture and multiplex PCR. Swab samples were positive for 107 and 93 women by microbiological culture and multiplex PCR, respectively The most common bacteria isolated from culture were: Escherichia coli, Enterococcus faecalis, Streptococcus agalactiae, and Staphylococcus aureus, and using the molecular technique were: Gardnerella vaginalis, Bacteroides fragilis, Ureoplasma ureoliticum/parvum, Mobiluncus curtisii and Atopobium vaginae. Multiplex PCR might contribute to the diagnosis of genital tract infections and it broadens the number of detectable microorganisms responsible for BV. Combination of these two methods may become the basis for standardized diagnosis of BV and vaginitis.

  14. Use of gas chromatography-olfactometry to identify key odorant compounds in dark chocolate. Comparison of samples before and after conching.

    Science.gov (United States)

    Counet, Christine; Callemien, Delphine; Ouwerx, Caroline; Collin, Sonia

    2002-04-10

    After vacuum distillation and liquid-liquid extraction, the volatile fractions of dark chocolates were analyzed by gas chromatography-olfactometry and gas chromatography-mass spectrometry. Aroma extract dilution analysis revealed the presence of 33 potent odorants in the neutral/basic fraction. Three of these had a strong chocolate flavor: 2-methylpropanal, 2-methylbutanal, and 3-methylbutanal. Many others were characterized by cocoa/praline-flavored/nutty/coffee notes: 2,3-dimethylpyrazine, trimethylpyrazine, tetramethylpyrazine, 3(or 2),5-dimethyl-2(or 3)-ethylpyrazine, 3,5(or 6)-diethyl-2-methylpyrazine, and furfurylpyrrole. Comparisons carried out before and after conching indicate that although no new key odorant is synthesized during the heating process, levels of 2-phenyl-5-methyl-2-hexenal, Furaneol, and branched pyrazines are significantly increased while most Strecker aldehydes are lost by evaporation.

  15. Identifying and Supporting English Learner Students with Learning Disabilities: Key Issues in the Literature and State Practice. REL 2015-086

    Science.gov (United States)

    Burr, Elizabeth; Haas, Eric; Ferriere, Karen

    2015-01-01

    While the literature on learning disabilities and on second-language acquisition is relatively extensive within the field of education, less is known about the specific characteristics and representation of English learner students with learning disabilities. Because there are no definitive resources and processes for identifying and determining…

  16. Identification of miRNA Signatures Associated with Epithelial Ovarian Cancer Chemoresistance with Further Biological and Functional Validation of Identified Key miRNAs

    Science.gov (United States)

    2012-08-01

    separated on 12% SDS PAGE gels and transferred to nitrocellulose membranes. After blocking with 5% non- fat milk (Labscientific, Inc) in TBS-Tween buffer... Raw mass spectrometric data were processed and analyzed for variations in the spectral counts of peptides between sample sets and bioinformatics was...accomplished using Ingenuity Pathways Analysis (IPA). Results: The total numbers of proteins and peptides identified are listed in the table

  17. Identifying the key processes for technology transfer through spin-offs in academic institutions : a case study in Flanders and The Netherlands

    OpenAIRE

    Meysman, Jasmine; Cleyn, De, Sven H.; Braet, Johan

    2017-01-01

    Abstract: The position and role of technology transfer offices within universities and academic institutions have changed under influence of todays society, with diminishing government subsidies and technology transfer related policies having their impact on the technology transfer processes. In order to find out what the effect of this impact is, we performed a multiple-case study on six technology transfer offices in Flanders and The Netherlands. As a result of the study, we identified two ...

  18. Identifying the Areas Benefitting from the Prevention of Wind Erosion by the Key Ecological Function Area for the Protection of Desertification in Hunshandake, China

    Directory of Open Access Journals (Sweden)

    Yu Xiao

    2017-10-01

    Full Text Available Research on the spatial flow of ecosystem services can help to identify the spatial relationships between service-providing areas (SPAs and service-benefitting areas (SBAs. In this study, we used the Hybrid Single-Particle Lagrangian Integrated Trajectory (HYSPLIT model to stimulate the flow paths of the wind erosion prevented by ecosystems in Hunshandake, China. By interpolating these paths, the SBAs were identified, and their benefits in terms of land cover, population, and Gross Domestic Product (GDP were determined. The results indicated that the flow paths mostly extended to the eastern part of the study area, and the estimated cover of the SBAs was 39.21% of the total area of China. The grid cells through which many (≥10% of the trajectories passed were mainly located in the western part of north-eastern China and the eastern part of northern China. The benefitting population accounted for 74.51% of the total population of China, and the GDP was 67.11% of the total in 2010. Based on this research, we described a quantitative relationship between the SPAs and the SBAs and identified the actual beneficiaries. This work may provide scientific knowledge that can be used by decision makers to develop management strategies, such as ecological compensation to mitigate damage from sandstorms in the study area.

  19. Kinome-wide shRNA Screen Identifies the Receptor Tyrosine Kinase AXL as a Key Regulator for Mesenchymal Glioblastoma Stem-like Cells

    Directory of Open Access Journals (Sweden)

    Peng Cheng

    2015-05-01

    Full Text Available Glioblastoma is a highly lethal cancer for which novel therapeutics are urgently needed. Two distinct subtypes of glioblastoma stem-like cells (GSCs were recently identified: mesenchymal (MES and proneural (PN. To identify mechanisms to target the more aggressive MES GSCs, we combined transcriptomic expression analysis and kinome-wide short hairpin RNA screening of MES and PN GSCs. In comparison to PN GSCs, we found significant upregulation and phosphorylation of the receptor tyrosine kinase AXL in MES GSCs. Knockdown of AXL significantly decreased MES GSC self-renewal capacity in vitro and inhibited the growth of glioblastoma patient-derived xenografts. Moreover, inhibition of AXL with shRNA or pharmacologic inhibitors also increased cell death significantly more in MES GSCs. Clinically, AXL expression was elevated in the MES GBM subtype and significantly correlated with poor prognosis in multiple cancers. In conclusion, we identified AXL as a potential molecular target for novel approaches to treat glioblastoma and other solid cancers.

  20. Labonté Identifies Key Issues for Health Promoters in the New World Order Comment on "Health Promotion in an Age of Normative Equity and Rampant Inequality".

    Science.gov (United States)

    Raphael, Dennis Raphael

    2016-11-02

    For over 35 years Ronald Labonté has been critically analyzing the state of health promotion in Canada and the world. In 1981, he identified the shortcomings of the groundbreaking Lalonde Report by warning of the seductive appeal of so-called lifestyle approaches to health. Since then, he has left a trail of critical work identifying the barriers to - and opportunities for -health promotion work. More recently, he has shown how the rise of economic globalization and acceptance of neo-liberal ideology has come to threaten the health of those in both developed and developing nations. In his recent commentary, Labonté shows how the United Nations' 2015 Sustainable Development Goals (SDGs) can offer a new direction for health promoters in these difficult times. © 2017 The Author(s); Published by Kerman University of Medical Sciences. This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

  1. Integrated analysis of oral tongue squamous cell carcinoma identifies key variants and pathways linked to risk habits, HPV, clinical parameters and tumor recurrence [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Neeraja Krishnan

    2015-11-01

    Full Text Available Oral tongue squamous cell carcinomas (OTSCC are a homogeneous group of tumors characterized by aggressive behavior, early spread to lymph nodes and a higher rate of regional failure. Additionally, the incidence of OTSCC among younger population (<50yrs is on the rise; many of whom lack the typical associated risk factors of alcohol and/or tobacco exposure. We present data on single nucleotide variations (SNVs, indels, regions with loss of heterozygosity (LOH, and copy number variations (CNVs from fifty-paired oral tongue primary tumors and link the significant somatic variants with clinical parameters, epidemiological factors including human papilloma virus (HPV infection and tumor recurrence. Apart from the frequent somatic variants harbored in TP53, CASP8, RASA1, NOTCH and CDKN2A genes, significant amplifications and/or deletions were detected in chromosomes 6-9, and 11 in the tumors. Variants in CASP8 and CDKN2A were mutually exclusive. CDKN2A, PIK3CA, RASA1 and DMD variants were exclusively linked to smoking, chewing, HPV infection and tumor stage. We also performed a whole-genome gene expression study that identified matrix metalloproteases to be highly expressed in tumors and linked pathways involving arachidonic acid and NF-k-B to habits and distant metastasis, respectively. Functional knockdown studies in cell lines demonstrated the role of CASP8 in a HPV-negative OTSCC cell line. Finally, we identified a 38-gene minimal signature that predicts tumor recurrence using an ensemble machine-learning method. Taken together, this study links molecular signatures to various clinical and epidemiological factors in a homogeneous tumor population with a relatively high HPV prevalence.

  2. Cation-Poor Complex Metallic Alloys in Ba(Eu)-Au-Al(Ga) Systems: Identifying the Keys that Control Structural Arrangements and Atom Distributions at the Atomic Level.

    Science.gov (United States)

    Smetana, Volodymyr; Steinberg, Simon; Mudryk, Yaroslav; Pecharsky, Vitalij; Miller, Gordon J; Mudring, Anja-Verena

    2015-11-02

    Four complex intermetallic compounds BaAu(6±x)Ga(6±y) (x = 1, y = 0.9) (I), BaAu(6±x)Al(6±y) (x = 0.9, y = 0.6) (II), EuAu6.2Ga5.8 (III), and EuAu6.1Al5.9 (IV) have been synthesized, and their structures and homogeneity ranges have been determined by single crystal and powder X-ray diffraction. Whereas I and II originate from the NaZn13-type structure (cF104-112, Fm3̅c), III (tP52, P4/nbm) is derived from the tetragonal Ce2Ni17Si9-type, and IV (oP104, Pbcm) crystallizes in a new orthorhombic structure type. Both I and II feature formally anionic networks with completely mixed site occupation by Au and triel (Tr = Al, Ga) atoms, while a successive decrease of local symmetry from the parental structures of I and II to III and, ultimately, to IV correlates with increasing separation of Au and Tr on individual crystallographic sites. Density functional theory-based calculations were employed to determine the crystallographic site preferences of Au and the respective triel element to elucidate reasons for the atom distribution ("coloring scheme"). Chemical bonding analyses for two different "EuAu6Tr6" models reveal maximization of the number of heteroatomic Au-Tr bonds as the driving force for atom organization. The Fermi levels fall in broad pseudogaps for both models allowing some electronic flexibility. Spin-polarized band structure calculations on the "EuAu6Tr6" models hint to singlet ground states for europium and long-range magnetic coupling for both EuAu6.2Ga5.8 (III) and EuAu6.1Al5.9 (IV). This is substantiated by experimental evidence because both compounds show nearly identical magnetic behavior with ferromagnetic transitions at TC = 6 K and net magnetic moments of 7.35 μB/f.u. at 2 K. The effective moments of 8.3 μB/f.u., determined from Curie-Weiss fits, point to divalent oxidation states for europium in both III and IV.

  3. Identifying the key factors in increasing recycling and reducing residual household waste: a case study of the Flemish region of Belgium.

    Science.gov (United States)

    Gellynck, X; Jacobsen, R; Verhelst, P

    2011-10-01

    The competent waste authority in the Flemish region of Belgium created the 'Implementation plan household waste 2003-2007' and the 'Implementation plan sustainable management 2010-2015' to comply with EU regulation. It incorporates European and regional requirements and describes strategies, goals, actions and instruments for the collection and treatment of household waste. The central mandatory goal is to reduce and maintain the amount of residual household waste to 150 kg per capita per year between 2010-2015. In literature, a reasonable body of information has been published on the effectiveness and efficiency of a variety of policy instruments, but the information is complex, often contradictory and difficult to interpret. The objective of this paper is to identify, through the development of a binary logistic regression model, those variables of the waste collection scheme that help municipalities to reach the mandatory 150 kg goal. The model covers a number of variables for household characteristics, provision of recycling services, frequency of waste collection and charging for waste services. This paper, however, is not about waste prevention and reuse. The dataset originates from 2003. Four out of 12 variables in the model contributed significantly: income per capita, cost of residual waste collection, collection frequency and separate curbside collection of organic waste. Copyright © 2011 Elsevier Ltd. All rights reserved.

  4. Network analysis of patient flow in two UK acute care hospitals identifies key sub-networks for A&E performance.

    Science.gov (United States)

    Bean, Daniel M; Stringer, Clive; Beeknoo, Neeraj; Teo, James; Dobson, Richard J B

    2017-01-01

    The topology of the patient flow network in a hospital is complex, comprising hundreds of overlapping patient journeys, and is a determinant of operational efficiency. To understand the network architecture of patient flow, we performed a data-driven network analysis of patient flow through two acute hospital sites of King's College Hospital NHS Foundation Trust. Administration databases were queried for all intra-hospital patient transfers in an 18-month period and modelled as a dynamic weighted directed graph. A 'core' subnetwork containing only 13-17% of all edges channelled 83-90% of the patient flow, while an 'ephemeral' network constituted the remainder. Unsupervised cluster analysis and differential network analysis identified sub-networks where traffic is most associated with A&E performance. Increased flow to clinical decision units was associated with the best A&E performance in both sites. The component analysis also detected a weekend effect on patient transfers which was not associated with performance. We have performed the first data-driven hypothesis-free analysis of patient flow which can enhance understanding of whole healthcare systems. Such analysis can drive transformation in healthcare as it has in industries such as manufacturing.

  5. Identifying Keys to Success in Innovative Teaching: Student Engagement and Instructional Practices as Predictors of Student Learning in a Course Using a Team-Based Learning Approach

    Directory of Open Access Journals (Sweden)

    Rosa M. Alvarez-Bell

    2017-09-01

    Full Text Available When implementing innovative teaching techniques, instructors often seek to gauge the success of their methods. Proposing one approach to assessing classroom innovation, this study examines the ability of students’ ratings of engagement and instructional practices to predict their learning in a cooperative (team-based framework. After identifying the factor structures underlying measures of student engagement and instructional practices, these factors were used as predictors of self-reported student learning in a general chemistry course delivered using a team-based learning approach. Exploratory factor analyses showed a four-factor structure of engagement: teamwork involvement, investment in the learning process, feelings about team-based learning, level of academic challenge; and a three-factor structure of instructional practices: instructional guidance, fostering self-directed learning skills, and cognitive level. Multiple linear regression revealed that feelings about team-based learning and perceptions of instructional guidance had significant effects on learning, beyond other predictors, while controlling gender, GPA, class level, number of credit hours, whether students began college at their current institution, expected highest level of education, racial or ethnic identification, and parental level of education. These results yield insight into student perceptions about team-based learning, and how to measure learning in a team-based learning framework, with implications for how to evaluate innovative instructional methods.

  6. Paving the Way to Successful Implementation: Identifying Key Barriers to Use of Technology-Based Therapeutic Tools for Behavioral Health Care.

    Science.gov (United States)

    Ramsey, Alex; Lord, Sarah; Torrey, John; Marsch, Lisa; Lardiere, Michael

    2016-01-01

    This study aimed to identify barriers to use of technology for behavioral health care from the perspective of care decision makers at community behavioral health organizations. As part of a larger survey of technology readiness, 260 care decision makers completed an open-ended question about perceived barriers to use of technology. Using the Consolidated Framework for Implementation Research (CFIR), qualitative analyses yielded barrier themes related to characteristics of technology (e.g., cost and privacy), potential end users (e.g., technology literacy and attitudes about technology), organization structure and climate (e.g., budget and infrastructure), and factors external to organizations (e.g., broadband accessibility and reimbursement policies). Number of reported barriers was higher among respondents representing agencies with lower annual budgets and smaller client bases relative to higher budget, larger clientele organizations. Individual barriers were differentially associated with budget, size of client base, and geographic location. Results are discussed in light of implementation science frameworks and proactive strategies to address perceived obstacles to adoption and use of technology-based behavioral health tools.

  7. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal – a case study from health science [version 2; referees: 1 approved, 2 approved with reservations

    Directory of Open Access Journals (Sweden)

    Heidi Holst Madsen

    2016-09-01

    Full Text Available Unique identifiers (UID are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI, incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of

  8. Identifying Key Actors in Heterogeneous Networks

    Science.gov (United States)

    2017-11-29

    Department of Defense (DOD) present social situations that are outside the scope and violate the assumptions of existing formal social science models. SNA by...assumptions of these existing social science models. SNA by its very construction focuses on dyadic relations and standard SNA metrics are focused only on...problematic for our purposes of determining relative valuations among vertices, but it is in contrast to the behavior of valuations like the Shapley value

  9. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  10. BILATERAL KEY COMPARISON SIM.T-K6.5 ON HUMIDITY STANDARDS IN THE DEW/FROST-POINT TEMPERATURE RANGE FROM -30 °C TO +20 °C.

    Science.gov (United States)

    Meyer, C W; Solano, A

    2016-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures over the range -30 °C TO +20 °C was carried out by the National Institute of Standards and Technology (NIST, USA) and the Laboratorio Costarricense de Metrología (LACOMET, Costa Rica), between February 2015 and August 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and LACOMET and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining the degree of equivalence between the dew/frost-point standards of NIST and LACOMET.

  11. BILATERAL KEY COMPARISON SIM.T-K6.5 ON HUMIDITY STANDARDS IN THE DEW/FROST-POINT TEMPERATURE RANGE FROM −30 °C TO +20 °C

    Science.gov (United States)

    Meyer, C.W.; Solano, A.

    2016-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures over the range −30 °C TO +20 °C was carried out by the National Institute of Standards and Technology (NIST, USA) and the Laboratorio Costarricense de Metrología (LACOMET, Costa Rica), between February 2015 and August 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and LACOMET and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining the degree of equivalence between the dew/frost-point standards of NIST and LACOMET. PMID:28066029

  12. KEY COMPARISON Report to the CCT on key comparison EUROMET.T-K6 (EUROMET Project no. 621): Comparison of the realizations of local dew/frost-point temperature scales in the range -50 °C to +20 °C

    Science.gov (United States)

    Heinonen, Martti

    2010-01-01

    The first humidity CIPM key comparison, CCT-K6, will be completed in 2010. The corresponding European regional key comparison, EUROMET.T-K6, was carried out in 2004 to 2008. National metrology institutes from 24 countries participated in the comparison. The comparison covered the dew-point temperature range from -50 °C to +20 °C. It was organized as three parallel loops with two specially manufactured precision chilled mirror hygrometers as transfer standards in each loop. The comparison scheme was designed to ensure high quality results with evenly spread workload for the participants. MIKES was coordinating the project. This report presents the results of the comparison and provides detailed information on the measurements performed by all participating laboratories and the analysis of the results. Conclusions on the equivalence of the dew-point temperature standards are drawn on the basis of calculated bilateral degrees of equivalence and deviations from EURAMET comparison reference values (ERV). Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  13. Key issues

    International Nuclear Information System (INIS)

    Cook, N.G.W.

    1980-01-01

    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  14. Report to the CCT on COOMET comparison COOMET.T-K3.1 (previously COOMET.T-S1): Key regional comparison of the national standards of temperature in the range from the triple point of water to the freezing point of zinc

    Science.gov (United States)

    Pokhodun, A. I.

    2010-01-01

    In the framework of the CIPM MRA, a first COOMET comparison "Comparison of the ITS-90 realizations in the range from 0.01 °C to 429.7485 °C (from the triple point of water to the freezing point of zinc)", registered in the KCDB under the identifier "COOMET.T-K3", was carried out in 2005-2007. Four national metrology institutes took part in this comparison: VNIIM (Russian Federation), SMU (Slovakia), BelGIM (Republic of Belarus) and NSC IM (Ukraine), and two of them (VNIIM and SMU) ensured the linkage with key comparisons CCT-K3 and CCT-K4, in order to disseminate the metrological equivalence to the measurement standards of NSC IM and BelGIM. NSC IM, however, had to withdraw its results, and at the meeting of Technical Committee T-10 of COOMET it was decided to carry out a supplementary bilateral comparison between VNIIM and the NSC IM for realization of the ITS-90 in the same range of temperature. This was registered in the KCDB under the identifier COOMET.T-S1 and measurements were performed in 2008-2009. From the results presented in this report, it is possible to draw the conclusion that the COOMET supplementary comparison COOMET.T-S1 demonstrates the CMC uncertainties claimed by the NSC IM for the melting point of gallium 0.236 mK (k = 2), and the freezing points of indium 1.040 mK (k = 2), tin 0.858 mK (k = 2) and zinc 0.944 mK (k = 2). In September 2012 the Working Group on key Comparisons (WG 7) of the CCT upgraded this comparison to a COOMET key comparison of the 'CCT-K3' type. It is now identified as COOMET.T-K3.1. In April 2013 this report was superseded by item 03006 in the Technical Supplement of 2013. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  15. Integrated Network Analysis Identifies Fight-Club Nodes as a Class of Hubs Encompassing Key Putative Switch Genes That Induce Major Transcriptome Reprogramming during Grapevine Development[W][OPEN

    Science.gov (United States)

    Palumbo, Maria Concetta; Zenoni, Sara; Fasoli, Marianna; Massonnet, Mélanie; Farina, Lorenzo; Castiglione, Filippo; Pezzotti, Mario; Paci, Paola

    2014-01-01

    We developed an approach that integrates different network-based methods to analyze the correlation network arising from large-scale gene expression data. By studying grapevine (Vitis vinifera) and tomato (Solanum lycopersicum) gene expression atlases and a grapevine berry transcriptomic data set during the transition from immature to mature growth, we identified a category named “fight-club hubs” characterized by a marked negative correlation with the expression profiles of neighboring genes in the network. A special subset named “switch genes” was identified, with the additional property of many significant negative correlations outside their own group in the network. Switch genes are involved in multiple processes and include transcription factors that may be considered master regulators of the previously reported transcriptome remodeling that marks the developmental shift from immature to mature growth. All switch genes, expressed at low levels in vegetative/green tissues, showed a significant increase in mature/woody organs, suggesting a potential regulatory role during the developmental transition. Finally, our analysis of tomato gene expression data sets showed that wild-type switch genes are downregulated in ripening-deficient mutants. The identification of known master regulators of tomato fruit maturation suggests our method is suitable for the detection of key regulators of organ development in different fleshy fruit crops. PMID:25490918

  16. Killing Range

    Science.gov (United States)

    Asal, Victor; Rethemeyer, R. Karl; Horgan, John

    2015-01-01

    This paper presents an analysis of the Provisional Irish Republican Army's (PIRA) brigade level behavior during the Northern Ireland Conflict (1970-1998) and identifies the organizational factors that impact a brigade's lethality as measured via terrorist attacks. Key independent variables include levels of technical expertise, cadre age, counter-terrorism policies experienced, brigade size, and IED components and delivery methods. We find that technical expertise within a brigade allows for careful IED usage, which significantly minimizes civilian casualties (a specific strategic goal of PIRA) while increasing the ability to kill more high value targets with IEDs. Lethal counter-terrorism events also significantly affect a brigade's likelihood of killing both civilians and high-value targets but in different ways. Killing PIRA members significantly decreases IED fatalities but also significantly decreases the possibility of zero civilian IED-related deaths in a given year. Killing innocent Catholics in a Brigade's county significantly increases total and civilian IED fatalities. Together the results suggest the necessity to analyze dynamic situational variables that impact terrorist group behavior at the sub-unit level. PMID:25838603

  17. Critical and shielding parametric studies with the Monte Carlo code TRIPOLI to identify the key points to take into account during the transportation of blanket assemblies with high ratio of americium

    International Nuclear Information System (INIS)

    Gosmain, Cecile-Aline

    2011-01-01

    In the framework of French research program on Generation IV sodium cooled fast reactor, one possible option consists in burning minor actinides in this kind of Advanced Sodium Technological Reactor. Two types of transmutation mode are studied in the world : the homogeneous mode of transmutation where actinides are scattered with very low enrichment ratio in fissile assemblies and the heterogeneous mode where fissile core is surrounded by blanket assemblies filled with minor actinides with ratio of incorporated actinides up to 20%. Depending on which element is considered to be burnt and on its content, these minor actinides contents imply constraints on assemblies' transportation between Nuclear Power Plants and fuel cycle facilities. In this study, we present some academic studies in order to identify some key constraints linked to the residual power and neutron/gamma load of such kind of blanket assemblies. To simplify the approach, we considered a modeling of a 'model cask' dedicated to the transportation of a unique irradiated blanket assembly loaded with 20% of Americium and basically inspired from an existent cask designed initially for the damaged fissile Superphenix assembly transport. Thermal calculations performed with EDF-SYRTHES code have shown that due to thermal limitations on cladding temperature, the decay time to be considered before transportation is 20 years. This study is based on explicit 3D representations of the cask and the contained blanket assembly with the Monte Carlo code TRIPOLI/JEFF3.1.1 library and concludes that after such a decay time, the transportation of a unique Americium radial blanket is feasible only if the design of our model cask is modified in order to comply with the dose limitation criterion. (author)

  18. Bilateral key comparison SIM.T-K6.2 on humidity standards in the dew/frost-point temperature range from -20 °c to 20 °c

    Science.gov (United States)

    Huang, P. H.; Meyer, C. W.; Martines-López, E.; Dávila Pacheco, J. A.; Méndez-Lango, E.

    2014-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the Centro Nacional de Metrologia (CENAM, Mexico) between July 2008 and December 2008. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and CENAM and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and CENAM. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  19. BILATERAL KEY COMPARISON SIM.T-K6.1 ON HUMIDITY STANDARDS IN THE DEW/FROST-POINT TEMPERATURE RANGE FROM −25 °C TO +20 °C

    Science.gov (United States)

    Meyer, C.W.; Hill, K.D.

    2015-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the National Research Council (NRC, Canada) between December 2014 and April, 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and NRC and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and NRC. PMID:26663952

  20. Final report: Bilateral key comparison SIM.T-K6.3 on humidity standards in the dew/frost-point temperature range from -30°C to 20°C

    Science.gov (United States)

    Huang, Peter; Meyer, Christopher; Brionizio, Julio D.

    2015-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the Instituto Nacional de Metrologia, Qualidade e Tecnologia (INMETRO, Brazil) between October 2009 and March 2010. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and INMETRO and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and INMETRO. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  1. Bilateral key comparison SIM.T-K6.1 on humidity standards in the dew/frost-point temperature range from -25 °C to +20 °C

    Science.gov (United States)

    Meyer, C. W.; Hill, K. D.

    2015-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the National Research Council (NRC, Canada) between December 2014 and April 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and NRC and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and NRC. This paper is the final report of the comparison including analysis of the uncertainty of measurement results. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT WG-KC, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  2. Bilateral key comparison SIM.T-K6.5 on humidity standards in the dew/frost-point temperature range from -30 °C to +20 °C

    Science.gov (United States)

    Meyer, C.; Solano, A.

    2016-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the Laboratorio Costarricense de Metrología (LACOMET, Costa Rica) between February 2015 and August 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and LACOMET and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and LACOMET. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  3. Genetic and pharmacological screens converge in identifying FLIP, BCL2 and IAP proteins as key regulators of sensitivity to the TRAIL-inducing anti-cancer agent ONC201/TIC10

    OpenAIRE

    Allen, Joshua E.; Prabhu, Varun V.; Talekar, Mala; van den Heuvel, AP; Lim, Bora; Dicker, David T.; Fritz, Jennifer L.; Beck, Adam; El-Deiry, Wafik S.

    2015-01-01

    ONC201/TIC10 is a small molecule inducer of the TRAIL gene under current investigation as a novel anticancer agent. In this study, we identify critical molecular determinants of ONC201 sensitivity offering potential utility as pharmacodynamic or predictive response markers. By screening a library of kinase siRNAs in combination with a subcytotoxic dose of ONC201, we identified several kinases that ablated tumor cell sensitivity, including the MAPK pathway inducer KSR1. Unexpectedly, KSR1 sile...

  4. Underwater Ranging

    OpenAIRE

    S. P. Gaba

    1984-01-01

    The paper deals with underwater laser ranging system, its principle of operation and maximum depth capability. The sources of external noise and methods to improve signal-to-noise ratio are also discussed.

  5. Diagnostic screening identifies a wide range of mutations involving the SHOX gene, including a common 47.5 kb deletion 160 kb downstream with a variable phenotypic effect.

    Science.gov (United States)

    Bunyan, David J; Baker, Kevin R; Harvey, John F; Thomas, N Simon

    2013-06-01

    Léri-Weill dyschondrosteosis (LWD) results from heterozygous mutations of the SHOX gene, with homozygosity or compound heterozygosity resulting in the more severe form, Langer mesomelic dysplasia (LMD). These mutations typically take the form of whole or partial gene deletions, point mutations within the coding sequence, or large (>100 kb) 3' deletions of downstream regulatory elements. We have analyzed the coding sequence of the SHOX gene and its downstream regulatory regions in a cohort of 377 individuals referred with symptoms of LWD, LMD or short stature. A causative mutation was identified in 68% of the probands with LWD or LMD (91/134). In addition, a 47.5 kb deletion was found 160 kb downstream of the SHOX gene in 17 of the 377 patients (12% of the LWD referrals, 4.5% of all referrals). In 14 of these 17 patients, this was the only potentially causative abnormality detected (13 had symptoms consistent with LWD and one had short stature only), but the other three 47.5 kb deletions were found in patients with an additional causative SHOX mutation (with symptoms of LWD rather than LMD). Parental samples were available on 14/17 of these families, and analysis of these showed a more variable phenotype ranging from apparently unaffected to LWD. Breakpoint sequence analysis has shown that the 47.5 kb deletion is identical in all 17 patients, most likely due to an ancient founder mutation rather than recurrence. This deletion was not seen in 471 normal controls (P<0.0001), providing further evidence for a phenotypic effect, albeit one with variable penetration. Copyright © 2013 Wiley Periodicals, Inc.

  6. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  7. Labonté Identifies Key Issues for Health Promoters in the New World Order; Comment on “Health Promotion in an Age of Normative Equity and Rampant Inequality”

    Directory of Open Access Journals (Sweden)

    Dennis Raphael

    2017-07-01

    Full Text Available For over 35 years Ronald Labonté has been critically analyzing the state of health promotion in Canada and the world. In 1981, he identified the shortcomings of the groundbreaking Lalonde Report by warning of the seductive appeal of so-called lifestyle approaches to health. Since then, he has left a trail of critical work identifying the barriers to — and opportunities for —health promotion work. More recently, he has shown how the rise of economic globalization and acceptance of neo-liberal ideology has come to threaten the health of those in both developed and developing nations. In his recent commentary, Labonté shows how the United Nations’ 2015 Sustainable Development Goals (SDGs can offer a new direction for health promoters in these difficult times.

  8. A Novel Application of a Hybrid Delphi-Analytic Hierarchy Process (AHP) Technique: Identifying Key Success Factors in the Strategic Alignment of Collaborative Heterarchical Transportation Networks for Supply Chains

    OpenAIRE

    Yasanur Kayikci; Volker Stix; Larry J. LeBlanc; Michael R. Bartolacci

    2014-01-01

    This research studies heterarchical collaboration in logistical transport. Specifically, it utilizes a hybrid Delphi-Analytic Hierarchy Process (AHP) approach to explore the relevant criteria for the formation and maintenance of a strategic alignment for heterarchical transport collaboration. The importance of this work is that it applies a novel hybrid approach for identifying criteria for success to a little-studied form of supply chain collaboration: heterarchical collaborative transport. ...

  9. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  10. Key enabling technologies (Kets) observatory. Second report December 2015

    OpenAIRE

    Velde, Els van de; Pieterjan, Debergh; Wydra, Sven; Som, Oliver; Heide, Marcel de

    2015-01-01

    Key Enabling Technologies (KETs) provide the basis for innovation in a wide range of products and processes across all industrial sectors (emerging and traditional) and are essential to solve Europe’s major societal challenges. Six KETs have been identified as important for Europe’s future competitiveness: Advanced Manufacturing Technology, Advanced Materials, Nanotechnology, Micro- and Nanoelectronics, Industrial Biotechnology, and Photonics.

  11. Molecular dynamics simulations of Hsp40 J-domain mutants identifies disruption of the critical HPD-motif as the key factor for impaired curing in vivo of the yeast prion [URE3].

    Science.gov (United States)

    Xue, You-Lin; Wang, Hao; Riedy, Michael; Roberts, Brittany-Lee; Sun, Yuna; Song, Yong-Bo; Jones, Gary W; Masison, Daniel C; Song, Youtao

    2018-05-01

    Genetic screens using Saccharomyces cerevisiae have identified an array of Hsp40 (Ydj1p) J-domain mutants that are impaired in the ability to cure the yeast [URE3] prion through disrupting functional interactions with Hsp70. However, biochemical analysis of some of these Hsp40 J-domain mutants has so far failed to provide major insight into the specific functional changes in Hsp40-Hsp70 interactions. To explore the detailed structural and dynamic properties of the Hsp40 J-domain, 20 ns molecular dynamic simulations of 4 mutants (D9A, D36A, A30T, and F45S) and wild-type J-domain were performed, followed by Hsp70 docking simulations. Results demonstrated that although the Hsp70 interaction mechanism of the mutants may vary, the major structural change was targeted to the critical HPD motif of the J-domain. Our computational analysis fits well with previous yeast genetics studies regarding highlighting the importance of J-domain function in prion propagation. During the molecular dynamics simulations several important residues were identified and predicted to play an essential role in J-domain structure. Among these residues, Y26 and F45 were confirmed, using both in silico and in vivo methods, as being critical for Ydj1p function.

  12. Genetic and pharmacological screens converge in identifying FLIP, BCL2 and IAP proteins as key regulators of sensitivity to the TRAIL-inducing anti-cancer agent ONC201/TIC10

    Science.gov (United States)

    Allen, Joshua E.; Prabhu, Varun V.; Talekar, Mala; van den Heuvel, AP; Lim, Bora; Dicker, David T.; Fritz, Jennifer L.; Beck, Adam; El-Deiry, Wafik S.

    2015-01-01

    ONC201/TIC10 is a small molecule inducer of the TRAIL gene under current investigation as a novel anticancer agent. In this study, we identify critical molecular determinants of ONC201 sensitivity offering potential utility as pharmacodynamic or predictive response markers. By screening a library of kinase siRNAs in combination with a subcytotoxic dose of ONC201, we identified several kinases that ablated tumor cell sensitivity, including the MAPK pathway inducer KSR1. Unexpectedly, KSR1 silencing did not affect MAPK signaling in the presence or absence of ONC201, but instead reduced expression of the anti-apoptotic proteins FLIP, Mcl-1, Bcl-2, cIAP1, cIAP2, and survivin. In parallel to this work, we also conducted a synergy screen in which ONC201 was combined with approved small molecule anticancer drugs. In multiple cancer cell populations, ONC201 synergized with diverse drug classes including the multi-kinase inhibitor sorafenib. Notably, combining ONC201 and sorafenib led to synergistic induction of TRAIL and its receptor DR5 along with a potent induction of cell death. In a mouse xenograft model of hepatocellular carcinoma, we demonstrated that ONC201 and sorafenib cooperatively and safely triggered tumor regressions. Overall, our results established a set of determinants for ONC201 sensitivity that may predict therapeutic response, particularly in settings of sorafenib co-treatment to enhance anticancer responses. PMID:25681273

  13. Genetic and Pharmacological Screens Converge in Identifying FLIP, BCL2, and IAP Proteins as Key Regulators of Sensitivity to the TRAIL-Inducing Anticancer Agent ONC201/TIC10.

    Science.gov (United States)

    Allen, Joshua E; Prabhu, Varun V; Talekar, Mala; van den Heuvel, A Pieter J; Lim, Bora; Dicker, David T; Fritz, Jennifer L; Beck, Adam; El-Deiry, Wafik S

    2015-04-15

    ONC201/TIC10 is a small-molecule inducer of the TRAIL gene under current investigation as a novel anticancer agent. In this study, we identify critical molecular determinants of ONC201 sensitivity offering potential utility as pharmacodynamic or predictive response markers. By screening a library of kinase siRNAs in combination with a subcytotoxic dose of ONC201, we identified several kinases that ablated tumor cell sensitivity, including the MAPK pathway-inducer KSR1. Unexpectedly, KSR1 silencing did not affect MAPK signaling in the presence or absence of ONC201, but instead reduced expression of the antiapoptotic proteins FLIP, Mcl-1, Bcl-2, cIAP1, cIAP2, and survivin. In parallel to this work, we also conducted a synergy screen in which ONC201 was combined with approved small-molecule anticancer drugs. In multiple cancer cell populations, ONC201 synergized with diverse drug classes, including the multikinase inhibitor sorafenib. Notably, combining ONC201 and sorafenib led to synergistic induction of TRAIL and its receptor DR5 along with a potent induction of cell death. In a mouse xenograft model of hepatocellular carcinoma, we demonstrated that ONC201 and sorafenib cooperatively and safely triggered tumor regressions. Overall, our results established a set of determinants for ONC201 sensitivity that may predict therapeutic response, particularly in settings of sorafenib cotreatment to enhance anticancer responses. ©2015 American Association for Cancer Research.

  14. Imperfect DNA mirror repeats in the gag gene of HIV-1 (HXB2 identify key functional domains and coincide with protein structural elements in each of the mature proteins

    Directory of Open Access Journals (Sweden)

    Lang Dorothy M

    2007-10-01

    Full Text Available Abstract Background A DNA mirror repeat is a sequence segment delimited on the basis of its containing a center of symmetry on a single strand, e.g. 5'-GCATGGTACG-3'. It is most frequently described in association with a functionally significant site in a genomic sequence, and its occurrence is regarded as noteworthy, if not unusual. However, imperfect mirror repeats (IMRs having ≥ 50% symmetry are common in the protein coding DNA of monomeric proteins and their distribution has been found to coincide with protein structural elements – helices, β sheets and turns. In this study, the distribution of IMRs is evaluated in a polyprotein – to determine whether IMRs may be related to the position or order of protein cleavage or other hierarchal aspects of protein function. The gag gene of HIV-1 [GenBank:K03455] was selected for the study because its protein motifs and structural components are well documented. Results There is a highly specific relationship between IMRs and structural and functional aspects of the Gag polyprotein. The five longest IMRs in the polyprotein translate a key functional segment in each of the five cleavage products. Throughout the protein, IMRs coincide with functionally significant segments of the protein. A detailed annotation of the protein, which combines structural, functional and IMR data illustrates these associations. There is a significant statistical correlation between the ends of IMRs and the ends of PSEs in each of the mature proteins. Weakly symmetric IMRs (≥ 33% are related to cleavage positions and processes. Conclusion The frequency and distribution of IMRs in HIV-1 Gag indicates that DNA symmetry is a fundamental property of protein coding DNA and that different levels of symmetry are associated with different functional aspects of the gene and its protein. The interaction between IMRs and protein structure and function is precise and interwoven over the entire length of the polyprotein. The

  15. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    Science.gov (United States)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2016-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  16. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  17. Identifying key processes in the hydrochemistry of a basin through ...

    Indian Academy of Sciences (India)

    through the combined use of factor and regression models. Sandow Mark ... Department of Earth Science, University of Ghana, Legon, Accra, Ghana. ∗ ... influence groundwater hydrochemistry and deter- mine its .... 1600 mm) due to the differences in climatic zones. .... dropped so that it does not cloud the results of the.

  18. Identifying Key Factors Relevant for Base Camp Siting

    Science.gov (United States)

    2017-12-01

    centers. 3.2.6.3 Religious and historical sites Respecting sacred sites helps build rapport with the host nation. 3.2.6.4 Local infrastructure...churches, mosques, national libraries, hospitals, cemeteries, historical ruins, religious sites, cultural areas, and other protected sites...controlled and protected wells. • Electricity: town engineer • Academic: government and religious leaders • Trash: private business (local

  19. Family planning dialogue: Identifying the key determinants of young ...

    African Journals Online (AJOL)

    ANBR

    planning information and services for sexually active young women – in ... towards ensuring the equitable distribution of resources and accessible basic services. 99 ...... denial and disengagement affecting intergenerational dialogue in many ...

  20. Identifying depression among adolescents using three key questions

    DEFF Research Database (Denmark)

    Haugen, Wenche; Haavet, Ole Rikard; Sirpal, Manjit Kaur

    2016-01-01

    Depression rammer mange voksne mennesker. Dette studie, som er omtalt i BMJ, viser, at et spørgeskema med blot tre spørgsmål ret præcist kan identificere voksne med depression. Undersøgelsen viser også, at de samme spørgsmål med fordel kan stilles verbalt ved diagnosticering af depression hos unge...... mennesker. Studiet ledsages af en redaktionel kommentar, der understreger betydningen af diagnosticering af depression hos mennesker. Mange unge har kun sjældent kontakt med deres praktiserende læge. Derfor kan mange gå i lang tid med depression, uden at det bliver opdaget og behandlet. De tre enkle...... spørgsmål, der kredser om interesse (eller mangel på interesse) for daglige aktiviteter og følelser som nedtrykthed eller håbløshed, kan være et godt pejlemærke for evt. depression hos unge, som ellers let kan blive overset....

  1. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.; Ferreira, Luciana C.; Sequeira, Ana M.M.; Meekan, Mark G.; Duarte, Carlos M.; Bailey, Helen; Bailleul, Fred; Bowen, W. Don; Caley, M. Julian; Costa, Daniel P.; Eguí luz, Victor M.; Fossette, Sabrina; Friedlaender, Ari S.; Gales, Nick; Gleiss, Adrian C.; Gunn, John; Harcourt, Rob; Hazen, Elliott L.; Heithaus, Michael R.; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L.; Lowe, Christopher G.; Madsen, Peter T.; Marsh, Helene; Phillips, Richard A.; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A.; Simpfendorfer, Colin A.; Sims, David W.; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N.; Wikelski, Martin; Womble, Jamie N.; Thums, Michele

    2016-01-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  2. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.

    2016-03-12

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  3. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  4. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  5. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  6. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  7. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  8. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  9. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  10. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  11. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  12. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  13. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  14. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  15. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  16. Key Questions in Marine Megafauna Movement Ecology.

    Science.gov (United States)

    Hays, Graeme C; Ferreira, Luciana C; Sequeira, Ana M M; Meekan, Mark G; Duarte, Carlos M; Bailey, Helen; Bailleul, Fred; Bowen, W Don; Caley, M Julian; Costa, Daniel P; Eguíluz, Victor M; Fossette, Sabrina; Friedlaender, Ari S; Gales, Nick; Gleiss, Adrian C; Gunn, John; Harcourt, Rob; Hazen, Elliott L; Heithaus, Michael R; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L; Lowe, Christopher G; Madsen, Peter T; Marsh, Helene; Phillips, Richard A; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A; Simpfendorfer, Colin A; Sims, David W; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N; Wikelski, Martin; Womble, Jamie N; Thums, Michele

    2016-06-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Key Facts about Tularemia

    Science.gov (United States)

    ... Submit What's this? Submit Button Key Facts About Tularemia Recommend on Facebook Tweet Share Compartir This fact ... and Prevention (CDC) Tularemia Web site . What is Tularemia? Tularemia is a potentially serious illness that occurs ...

  18. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  19. The Key Lake project

    International Nuclear Information System (INIS)

    Glattes, G.

    1985-01-01

    Aspects of project financing for the share of the Canadian subsidiary of Uranerzbergbau-GmbH, Bonn, in the uranium mining and milling facility at Key Lake, Saskatchewan, by a Canadian bank syndicate. (orig.) [de

  20. The LOFAR Transients Key Science Project

    NARCIS (Netherlands)

    Stappers, B.; Fender, R.; Wijers, R.

    2009-01-01

    The Transients Key Science Project (TKP) is one of six Key Science Projects of the next generation radio telescope LOFAR. Its aim is the study of transient and variable low-frequency radio sources with an extremely broad science case ranging from relativistic jet sources to pulsars, exoplanets,

  1. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  2. Eight Key Facets of Small Business Management.

    Science.gov (United States)

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  3. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  4. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  5. Key principles for adapting South African settlement patterns to climate change

    CSIR Research Space (South Africa)

    Van Wyk, Llewellyn

    2017-06-01

    Full Text Available The aim of the paper is to identify key principles for adapting SA settlement patterns to climate change. Section 1 reviews the range of climate-related impacts likely to affect SA settlements using climate change models and scenarios as a context...

  6. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  7. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  8. Turn key contracts

    International Nuclear Information System (INIS)

    Feretic, D.

    1975-01-01

    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW) [de

  9. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  10. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  11. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  12. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  13. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  14. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  15. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  16. Improving the key biodiversity areas approach for effective conservation planning

    CSIR Research Space (South Africa)

    Knight, AT

    2007-03-01

    Full Text Available The key biodiversity areas (KBA) approach aims to identify globally important areas for species conservation. Although a similar methodology has been used successfully to identify important Bird Areas, the authors have identified five limitations...

  17. Genus Ranges of Chord Diagrams.

    Science.gov (United States)

    Burns, Jonathan; Jonoska, Nataša; Saito, Masahico

    2015-04-01

    A chord diagram consists of a circle, called the backbone, with line segments, called chords, whose endpoints are attached to distinct points on the circle. The genus of a chord diagram is the genus of the orientable surface obtained by thickening the backbone to an annulus and attaching bands to the inner boundary circle at the ends of each chord. Variations of this construction are considered here, where bands are possibly attached to the outer boundary circle of the annulus. The genus range of a chord diagram is the genus values over all such variations of surfaces thus obtained from a given chord diagram. Genus ranges of chord diagrams for a fixed number of chords are studied. Integer intervals that can be, and those that cannot be, realized as genus ranges are investigated. Computer calculations are presented, and play a key role in discovering and proving the properties of genus ranges.

  18. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  19. Chocolate Key Cryptography

    Science.gov (United States)

    Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H.

    2010-01-01

    Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…

  20. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  1. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  2. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  3. Key figures. Year 2006

    International Nuclear Information System (INIS)

    2006-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2006. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  4. Key figures. Year 2005

    International Nuclear Information System (INIS)

    2005-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2005. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  5. Soil fauna: key to new carbon models

    OpenAIRE

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; Jiménez, Juan José

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined ...

  6. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  7. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  8. Key components of financial-analysis education for clinical nurses.

    Science.gov (United States)

    Lim, Ji Young; Noh, Wonjung

    2015-09-01

    In this study, we identified key components of financial-analysis education for clinical nurses. We used a literature review, focus group discussions, and a content validity index survey to develop key components of financial-analysis education. First, a wide range of references were reviewed, and 55 financial-analysis education components were gathered. Second, two focus group discussions were performed; the participants were 11 nurses who had worked for more than 3 years in a hospital, and nine components were agreed upon. Third, 12 professionals, including professors, nurse executive, nurse managers, and an accountant, participated in the content validity index. Finally, six key components of financial-analysis education were selected. These key components were as follows: understanding the need for financial analysis, introduction to financial analysis, reading and implementing balance sheets, reading and implementing income statements, understanding the concepts of financial ratios, and interpretation and practice of financial ratio analysis. The results of this study will be used to develop an education program to increase financial-management competency among clinical nurses. © 2015 Wiley Publishing Asia Pty Ltd.

  9. Smooth Phase Interpolated Keying

    Science.gov (United States)

    Borah, Deva K.

    2007-01-01

    Smooth phase interpolated keying (SPIK) is an improved method of computing smooth phase-modulation waveforms for radio communication systems that convey digital information. SPIK is applicable to a variety of phase-shift-keying (PSK) modulation schemes, including quaternary PSK (QPSK), octonary PSK (8PSK), and 16PSK. In comparison with a related prior method, SPIK offers advantages of better performance and less complexity of implementation. In a PSK scheme, the underlying information waveform that one seeks to convey consists of discrete rectangular steps, but the spectral width of such a waveform is excessive for practical radio communication. Therefore, the problem is to smooth the step phase waveform in such a manner as to maintain power and bandwidth efficiency without incurring an unacceptably large error rate and without introducing undesired variations in the amplitude of the affected radio signal. Although the ideal constellation of PSK phasor points does not cause amplitude variations, filtering of the modulation waveform (in which, typically, a rectangular pulse is converted to a square-root raised cosine pulse) causes amplitude fluctuations. If a power-efficient nonlinear amplifier is used in the radio communication system, the fluctuating-amplitude signal can undergo significant spectral regrowth, thus compromising the bandwidth efficiency of the system. In the related prior method, one seeks to solve the problem in a procedure that comprises two major steps: phase-value generation and phase interpolation. SPIK follows the two-step approach of the related prior method, but the details of the steps are different. In the phase-value-generation step, the phase values of symbols in the PSK constellation are determined by a phase function that is said to be maximally smooth and that is chosen to minimize the spectral spread of the modulated signal. In this step, the constellation is divided into two groups by assigning, to information symbols, phase values

  10. SNP interaction pattern identifier (SIPI)

    DEFF Research Database (Denmark)

    Lin, Hui Yi; Chen, Dung Tsa; Huang, Po Yu

    2017-01-01

    Motivation: Testing SNP-SNP interactions is considered as a key for overcoming bottlenecks of genetic association studies. However, related statistical methods for testing SNP-SNP interactions are underdeveloped. Results: We propose the SNP Interaction Pattern Identifier (SIPI), which tests 45...

  11. Tonopah Test Range - Index

    Science.gov (United States)

    Capabilities Test Operations Center Test Director Range Control Track Control Communications Tracking Radars Photos Header Facebook Twitter YouTube Flickr RSS Tonopah Test Range Top TTR_TOC Tonopah is the testing range of choice for all national security missions. Tonopah Test Range (TTR) provides research and

  12. Key challenges to expanding renewable energy

    International Nuclear Information System (INIS)

    Stram, Bruce N.

    2016-01-01

    The key advantage of renewables is that they are free of direct pollution and carbon emissions. Given concern over global warming caused by carbon emissions, there are substantial policy efforts to increase renewable penetrations. The purpose of this paper is to outline and evaluate the challenges presented by increasing penetrations of renewable electricity generation. These generation sources primarily include solar and wind which are growing rapidly and are new enough to the grid that the impact of high penetrations is not fully understood. The intrinsic nature of solar and wind power is very likely to present greater system challenges than “conventional” sources. Within limits, those challenges can be overcome, but at a cost. Later sections of the paper will draw on a variety of sources to identify a range of such costs, at least as they are foreseen by researchers helping prepare ambitious plans for grids to obtain high shares (30–50%) of their megawatt hours from primarily solar and wind generation. Energy poverty issues are outlined and related to renewable costs issues. - Highlights: •Integration of intermittent renewables with existing power grids. •Renewable ramping and over production issues. •Renewable caused system costs. •Energy poverty circumstances and consequences.

  13. Identifying suitable sites for Florida panther reintroduction

    Science.gov (United States)

    Thatcher, Cindy A.; van Manen, Frank T.; Clark, Joseph D.

    2006-01-01

    A major objective of the 1995 Florida Panther (Puma concolor cory) Recovery Plan is the establishment of 2 additional panther populations within the historic range. Our goal was to identify prospective sites for Florida panther reintroduction within the historic range based on quantitative landscape assessments. First, we delineated 86 panther home ranges using telemetry data collected from 1981 to 2001 in south Florida to develop a Mahalanobis distance (D2) habitat model, using 4 anthropogenic variables and 3 landscape variables mapped at a 500-m resolution. From that analysis, we identified 9 potential reintroduction sites of sufficient size to support a panther population. We then developed a similar D2 model at a higher spatial resolution to quantify the area of favorable panther habitat at each site. To address potential for the population to expand, we calculated the amount of favorable habitat adjacent to each prospective reintroduction site within a range of dispersal distances of female panthers. We then added those totals to the contiguous patches to estimate the total amount of effective panther habitat at each site. Finally, we developed an expert-assisted model to rank and incorporate potentially important habitat variables that were not appropriate for our empirical analysis (e.g., area of public lands, livestock density). Anthropogenic factors heavily influenced both the landscape and the expert-assisted models. Of the 9 areas we identified, the Okefenokee National Wildlife Refuge, Ozark National Forest, and Felsenthal National Wildlife Refuge regions had the highest combination of effective habitat area and expert opinion scores. Sensitivity analyses indicated that variability among key model parameters did not affect the high ranking of those sites. Those sites should be considered as starting points for the field evaluation of potential reintroduction sites.

  14. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  15. Quantum cryptography to satellites for global secure key distribution

    Science.gov (United States)

    Rarity, John G.; Gorman, Philip M.; Knight, Paul; Wallace, Kotska; Tapster, Paul R.

    2017-11-01

    We have designed and built a free space secure key exchange system using weak laser pulses with polarisation modulation by acousto-optic switching. We have used this system to exchange keys over a 1.2km ground range with absolute security. Building from this initial result we analyse the feasibility of exchanging keys to a low earth orbit satellite.

  16. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  17. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  18. Creativity Management Key Elements

    Directory of Open Access Journals (Sweden)

    Rosa María Fuchs Ángeles

    2015-09-01

    Full Text Available Organizations are constantly looking towards innovation. In order to reach it they must foment creativity. This paper analyzes a series of elements considered in the organizational creativity management and proposes a model with the indispensable factors that organizations should consider to reach it. These elements are: culture and organizational environment, strategy, structure, communication, relation with customers, human resources (recruiting, training, job design, compensation, promotion, and performance evaluation, long term orientation and the organizational life cycle. Having the analysis of those elements as a basis, the indispensable pillars on management creativity are identified. The proposed model is based on 5 pillars: the alignment between strategic, culture and organizational structure, called by the authors 'Holy Trinity'; intern publicity; customer’s voice; recognition and a look towards future. Finally, the case of an innovative Peruvian enterprise is presented from the model’s perspective and the study conclusions.

  19. Range Information Systems Management (RISM) Phase 1 Report

    Science.gov (United States)

    Bastin, Gary L.; Harris, William G.; Nelson, Richard A.

    2002-01-01

    RISM investigated alternative approaches, technologies, and communication network architectures to facilitate building the Spaceports and Ranges of the future. RISM started by document most existing US ranges and their capabilities. In parallel, RISM obtained inputs from the following: 1) NASA and NASA-contractor engineers and managers, and; 2) Aerospace leaders from Government, Academia, and Industry, participating through the Space Based Range Distributed System Working Group (SBRDSWG), many of whom are also; 3) Members of the Advanced Range Technology Working Group (ARTWG) subgroups, and; 4) Members of the Advanced Spaceport Technology Working Group (ASTWG). These diverse inputs helped to envision advanced technologies for implementing future Ranges and Range systems that builds on today s cabled and wireless legacy infrastructures while seamlessly integrating both today s emerging and tomorrow s building-block communication techniques. The fundamental key is to envision a transition to a Space Based Range Distributed Subsystem. The enabling concept is to identify the specific needs of Range users that can be solved through applying emerging communication tech

  20. Key rate of quantum key distribution with hashed two-way classical communication

    International Nuclear Information System (INIS)

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  1. Compressive laser ranging.

    Science.gov (United States)

    Babbitt, Wm Randall; Barber, Zeb W; Renner, Christoffer

    2011-12-15

    Compressive sampling has been previously proposed as a technique for sampling radar returns and determining sparse range profiles with a reduced number of measurements compared to conventional techniques. By employing modulation on both transmission and reception, compressive sensing in ranging is extended to the direct measurement of range profiles without intermediate measurement of the return waveform. This compressive ranging approach enables the use of pseudorandom binary transmit waveforms and return modulation, along with low-bandwidth optical detectors to yield high-resolution ranging information. A proof-of-concept experiment is presented. With currently available compact, off-the-shelf electronics and photonics, such as high data rate binary pattern generators and high-bandwidth digital optical modulators, compressive laser ranging can readily achieve subcentimeter resolution in a compact, lightweight package.

  2. Dryden Aeronautical Test Range

    Data.gov (United States)

    Federal Laboratory Consortium — Recently redesignated to honor Dr. Hugh L. Dryden, NASA's Dryden Aeronautical Test Range (DATR) supports aerospace flight research and technology integration, space...

  3. Compact Antenna Range

    Data.gov (United States)

    Federal Laboratory Consortium — Facility consists of a folded compact antenna range including a computer controlled three axis position table, parabolic reflector and RF sources for the measurement...

  4. Introduction strategies raise key questions.

    Science.gov (United States)

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  5. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  6. Range Scheduling Aid (RSA)

    Science.gov (United States)

    Logan, J. R.; Pulvermacher, M. K.

    1991-01-01

    Range Scheduling Aid (RSA) is presented in the form of the viewgraphs. The following subject areas are covered: satellite control network; current and new approaches to range scheduling; MITRE tasking; RSA features; RSA display; constraint based analytic capability; RSA architecture; and RSA benefits.

  7. On Range of Skill

    DEFF Research Database (Denmark)

    Hansen, Thomas Dueholm; Miltersen, Peter Bro; Sørensen, Troels Bjerre

    2008-01-01

    size (and doubly exponential in its depth). We also provide techniques that yield concrete bounds for unbalanced game trees and apply these to estimate the Range of Skill of Tic-Tac-Toe and Heads-Up Limit Texas Hold'em Poker. In particular, we show that the Range of Skill of Tic-Tac-Toe is more than...

  8. Home range and travels

    Science.gov (United States)

    Stickel, L.F.; King, John A.

    1968-01-01

    The concept of home range was expressed by Seton (1909) in the term 'home region,' which Burr (1940, 1943) clarified with a definition of home range and exemplified in a definitive study of Peromyscus in the field. Burt pointed out the ever-changing characteristics of home-range area and the consequent absence of boundaries in the usual sense--a finding verified by investigators thereafter. In the studies summarized in this paper, sizes of home ranges of Peromyscus varied within two magnitudes, approximately from 0.1 acre to ten acres, in 34 studies conducted in a variety of habitats from the seaside dunes of Florida to the Alaskan forests. Variation in sizes of home ranges was correlated with both environmental and physiological factors; with habitat it was conspicuous, both in the same and different regions. Food supply also was related to size of home range, both seasonally and in relation to habitat. Home ranges generally were smallest in winter and largest in spring, at the onset of the breeding season. Activity and size also were affected by changes in weather. Activity was least when temperatures were low and nights were bright. Effects of rainfall were variable. Sizes varied according to sex and age; young mice remained in the parents' range until they approached maturity, when they began to travel more widely. Adult males commonly had larger home ranges than females, although there were a number of exceptions. An inverse relationship between population density and size of home range was shown in several studies and probably is the usual relationship. A basic need for activity and exploration also appeared to influence size of home range. Behavior within the home range was discussed in terms of travel patterns, travels in relation to home sites and refuges, territory, and stability of size of home range. Travels within the home range consisted of repeated use of well-worn trails to sites of food, shelter, and refuge, plus more random exploratory travels

  9. Autonomous Target Ranging Techniques

    DEFF Research Database (Denmark)

    Jørgensen, Peter Siegbjørn; Jørgensen, John Leif; Denver, Troelz

    2003-01-01

    of this telescope, a fast determination of the range to and the motion of the detected targets are important. This is needed in order to prepare the future observation strategy for each target, i.e. when is the closest approach where imaging will be optimal. In order to quickly obtain such a determination two...... ranging strategies are presented. One is an improved laser ranger with an effective range with non-cooperative targets of at least 10,000 km, demonstrated in ground tests. The accuracy of the laser ranging will be approximately 1 m. The laser ranger may furthermore be used for trajectory determination...... of nano-gravity probes, which will perform direct mass measurements of selected targets. The other is triangulation from two spacecraft. For this method it is important to distinguish between detection and tracking range, which will be different for Bering since different instruments are used...

  10. Soliton microcomb range measurement

    Science.gov (United States)

    Suh, Myoung-Gyun; Vahala, Kerry J.

    2018-02-01

    Laser-based range measurement systems are important in many application areas, including autonomous vehicles, robotics, manufacturing, formation flying of satellites, and basic science. Coherent laser ranging systems using dual-frequency combs provide an unprecedented combination of long range, high precision, and fast update rate. We report dual-comb distance measurement using chip-based soliton microcombs. A single pump laser was used to generate dual-frequency combs within a single microresonator as counterpropagating solitons. We demonstrated time-of-flight measurement with 200-nanometer precision at an averaging time of 500 milliseconds within a range ambiguity of 16 millimeters. Measurements at distances up to 25 meters with much lower precision were also performed. Our chip-based source is an important step toward miniature dual-comb laser ranging systems that are suitable for photonic integration.

  11. Habitat Restoration as a Key Conservation Lever for Woodland Caribou: A review of restoration programs and key learnings from Alberta

    Directory of Open Access Journals (Sweden)

    Paula Bentham

    2015-12-01

    Full Text Available The Recovery Strategy for the Woodland Caribou (Rangifer tarandus caribou, Boreal Population in Canada (EC, 2012, identifies coordinated actions to reclaim woodland caribou habitat as a key step to meeting current and future caribou population objectives. Actions include restoring industrial landscape features such as roads, seismic lines, pipelines, cut-lines, and cleared areas in an effort to reduce landscape fragmentation and the changes in caribou population dynamics associated with changing predator-prey dynamics in highly fragmented landscapes. Reliance on habitat restoration as a recovery action within the federal recovery strategy is high, considering all Alberta populations have less than 65% undisturbed habitat, which is identified in the recovery strategy as a threshold providing a 60% chance that a local population will be self-sustaining. Alberta’s Provincial Woodland Caribou Policy also identifies habitat restoration as a critical component of long-term caribou habitat management. We review and discuss the history of caribou habitat restoration programs in Alberta and present outcomes and highlights of a caribou habitat restoration workshop attended by over 80 representatives from oil and gas, forestry, provincial and federal regulators, academia and consulting who have worked on restoration programs. Restoration initiatives in Alberta began in 2001 and have generally focused on construction methods, revegetation treatments, access control programs, and limiting plant species favourable to alternate prey. Specific treatments include tree planting initiatives, coarse woody debris management along linear features, and efforts for multi-company and multi-stakeholder coordinated habitat restoration on caribou range. Lessons learned from these programs have been incorporated into large scale habitat restoration projects near Grande Prairie, Cold Lake, and Fort McMurray. A key outcome of our review is the opportunity to provide a

  12. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  13. Prediction ranges. Annual review

    Energy Technology Data Exchange (ETDEWEB)

    Parker, J.C.; Tharp, W.H.; Spiro, P.S.; Keng, K.; Angastiniotis, M.; Hachey, L.T.

    1988-01-01

    Prediction ranges equip the planner with one more tool for improved assessment of the outcome of a course of action. One of their major uses is in financial evaluations, where corporate policy requires the performance of uncertainty analysis for large projects. This report gives an overview of the uses of prediction ranges, with examples; and risks and uncertainties in growth, inflation, and interest and exchange rates. Prediction ranges and standard deviations of 80% and 50% probability are given for various economic indicators in Ontario, Canada, and the USA, as well as for foreign exchange rates and Ontario Hydro interest rates. An explanatory note on probability is also included. 23 tabs.

  14. Molecular beam epitaxy applications to key materials

    CERN Document Server

    Farrow, Robin F C

    1995-01-01

    In this volume, the editor and contributors describe the use of molecular beam epitaxy (MBE) for a range of key materials systems that are of interest for both technological and fundamental reasons. Prior books on MBE have provided an introduction to the basic concepts and techniques of MBE and emphasize growth and characterization of GaAs-based structures. The aim in this book is somewhat different; it is to demonstrate the versatility of the technique by showing how it can be utilized to prepare and explore a range of distinct and diverse materials. For each of these materials systems MBE has played a key role both in their development and application to devices.

  15. Antenna Pattern Range (APR)

    Data.gov (United States)

    Federal Laboratory Consortium — TheAntenna Pattern Range (APR)features a non-metallic arch with a trolley to move the transmit antenna from the horizon to zenith. At the center of the ground plane,...

  16. Atlantic Test Range (ATR)

    Data.gov (United States)

    Federal Laboratory Consortium — ATR controls fully-instrumented and integrated test ranges that provide full-service support for cradle-to-grave testing. Airspace and surface target areas are used...

  17. EV range sensitivity analysis

    Energy Technology Data Exchange (ETDEWEB)

    Ostafew, C. [Azure Dynamics Corp., Toronto, ON (Canada)

    2010-07-01

    This presentation included a sensitivity analysis of electric vehicle components on overall efficiency. The presentation provided an overview of drive cycles and discussed the major contributors to range in terms of rolling resistance; aerodynamic drag; motor efficiency; and vehicle mass. Drive cycles that were presented included: New York City Cycle (NYCC); urban dynamometer drive cycle; and US06. A summary of the findings were presented for each of the major contributors. Rolling resistance was found to have a balanced effect on each drive cycle and proportional to range. In terms of aerodynamic drive, there was a large effect on US06 range. A large effect was also found on NYCC range in terms of motor efficiency and vehicle mass. figs.

  18. Ranging behavior relates to welfare indicators pre- and post-range access in commercial free-range broilers.

    Science.gov (United States)

    Taylor, Peta S; Hemsworth, Paul H; Groves, Peter J; Gebhardt-Henrich, Sabine G; Rault, Jean-Loup

    2018-06-01

    Little is known about the effect of accessing an outdoor range on chicken welfare. We tracked individual ranging behavior of 538 mixed-sex Ross 308 chickens on a commercial farm across 4 flocks in winter and summer. Before range access, at 17 to 19 d of age, and post-range access, at 30 to 33 and 42 to 46 d of age in winter and summer flocks respectively, welfare indicators were measured on chickens (pre-range: winter N = 292; summer N = 280; post-range: winter N = 131; summer N = 140), including weight, gait score, dermatitis and plumage condition. Post-ranging autopsies were performed (winter: N = 170; summer: N = 60) to assess breast burn, leg health, and ascites. Fewer chickens accessed the range in winter flocks (32.5%) than summer flocks (82.1%). Few relationships between welfare and ranging were identified in winter, likely due to minimal ranging and the earlier age of post-ranging data collection compared to summer flocks. In summer flocks prior to range access, chickens that accessed the range weighed 4.9% less (P = 0.03) than chickens that did not access the range. Pre-ranging weight, gait score, and overall plumage cover predicted the amount of range use by ranging chickens in summer flocks (P ranging behavior. In summer flocks post-range access, ranging chickens weighed 12.8% less than non-ranging chickens (P range visits were associated with lower weight (P range was associated with lower weight (P range in summer is partly related to changes in broiler chicken welfare. Further investigations are required to determine causation.

  19. Range Reference Atmosphere 0-70 Km Altitude. Kwajalein Missile Range, Kwajalein, Marshall Islands

    Science.gov (United States)

    1982-01-01

    DOCUMENT 360-82 KWAJALEIN MISSILE RANGE KWAJALEIN, MARSHALL ISLANDS RANGE REFERENCE ATMOSPHERE 0-70 KM ALTITUDE, C00 L’’I METEOROLOGY GROUP .RANGE...34Reference Atmosphere (Part 1), Kwajale 4n Missile Range, Kwajalein, Marshall Islands ," ADA002664. * 19. KEY WORDS (Continue on revorsae d. If necoeewy...CLASSIFICATION OF TIlS PAGE (Whe~n Data EnterecD -v DOCUMENT 360-82 Vo- KWAJALEIN MISSILE RANGE KWAJALEIN, MARSHALL ISLANDS RANGE REFERENCE ATMOSPHERE 0-70 km

  20. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  1. Characteristics of evolving models of care for arthritis: A key informant study

    Directory of Open Access Journals (Sweden)

    Veinot Paula

    2008-07-01

    Full Text Available Abstract Background The burden of arthritis is increasing in the face of diminishing health human resources to deliver care. In response, innovative models of care delivery are developing to facilitate access to quality care. Most models have developed in response to local needs with limited evaluation. The primary objective of this study is to a examine the range of models of care that deliver specialist services using a medical/surgical specialist and at least one other health care provider and b document the strengths and challenges of the identified models. A secondary objective is to identify key elements of best practice models of care for arthritis. Methods Semi-structured interviews were conducted with a sample of key informants with expertise in arthritis from jurisdictions with primarily publicly-funded health care systems. Qualitative data were analyzed using a constant comparative approach to identify common types of models of care, strengths and challenges of models, and key components of arthritis care. Results Seventy-four key informants were interviewed from six countries. Five main types of models of care emerged. 1 Specialized arthritis programs deliver comprehensive, multidisciplinary team care for arthritis. Two models were identified using health care providers (e.g. nurses or physiotherapists in expanded clinical roles: 2 triage of patients with musculoskeletal conditions to the appropriate services including specialists; and 3 ongoing management in collaboration with a specialist. Two models promoting rural access were 4 rural consultation support and 5 telemedicine. Key informants described important components of models of care including knowledgeable health professionals and patients. Conclusion A range of models of care for arthritis have been developed. This classification can be used as a framework for discussing care delivery. Areas for development include integration of care across the continuum, including primary

  2. Range Selection and Median

    DEFF Research Database (Denmark)

    Jørgensen, Allan Grønlund; Larsen, Kasper Green

    2011-01-01

    and several natural special cases thereof. The rst special case is known as range median, which arises when k is xed to b(j 􀀀 i + 1)=2c. The second case, denoted prex selection, arises when i is xed to 0. Finally, we also consider the bounded rank prex selection problem and the xed rank range......Range selection is the problem of preprocessing an input array A of n unique integers, such that given a query (i; j; k), one can report the k'th smallest integer in the subarray A[i];A[i+1]; : : : ;A[j]. In this paper we consider static data structures in the word-RAM for range selection...... selection problem. In the former, data structures must support prex selection queries under the assumption that k for some value n given at construction time, while in the latter, data structures must support range selection queries where k is xed beforehand for all queries. We prove cell probe lower bounds...

  3. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  4. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  5. Online Sorted Range Reporting

    DEFF Research Database (Denmark)

    Brodal, Gerth Stølting; Fagerberg, Rolf; Greve, Mark

    2009-01-01

    is motivated by (and is a generalization of) a problem with applications in search engines: On a tree where leaves have associated rank values, report the highest ranked leaves in a given subtree. Finally, the problem studied generalizes the classic range minimum query (RMQ) problem on arrays....

  6. Substring Range Reporting

    DEFF Research Database (Denmark)

    Bille, Philip; Gørtz, Inge Li

    2014-01-01

    We revisit various string indexing problems with range reporting features, namely, position-restricted substring searching, indexing substrings with gaps, and indexing substrings with intervals. We obtain the following main results. We give efficient reductions for each of the above problems...

  7. Substring Range Reporting

    DEFF Research Database (Denmark)

    Bille, Philip; Gørtz, Inge Li

    2011-01-01

    We revisit various string indexing problems with range reporting features, namely, position-restricted substring searching, indexing substrings with gaps, and indexing substrings with intervals. We obtain the following main results. – We give efficient reductions for each of the above problems...

  8. Range-clustering queries

    NARCIS (Netherlands)

    Abrahamsen, M.; de Berg, M.T.; Buchin, K.A.; Mehr, M.; Mehrabi, A.D.

    2017-01-01

    In a geometric k -clustering problem the goal is to partition a set of points in R d into k subsets such that a certain cost function of the clustering is minimized. We present data structures for orthogonal range-clustering queries on a point set S : given a query box Q and an integer k>2 , compute

  9. Identifying mechanistic similarities in drug responses

    KAUST Repository

    Zhao, C.

    2012-05-15

    Motivation: In early drug development, it would be beneficial to be able to identify those dynamic patterns of gene response that indicate that drugs targeting a particular gene will be likely or not to elicit the desired response. One approach would be to quantitate the degree of similarity between the responses that cells show when exposed to drugs, so that consistencies in the regulation of cellular response processes that produce success or failure can be more readily identified.Results: We track drug response using fluorescent proteins as transcription activity reporters. Our basic assumption is that drugs inducing very similar alteration in transcriptional regulation will produce similar temporal trajectories on many of the reporter proteins and hence be identified as having similarities in their mechanisms of action (MOA). The main body of this work is devoted to characterizing similarity in temporal trajectories/signals. To do so, we must first identify the key points that determine mechanistic similarity between two drug responses. Directly comparing points on the two signals is unrealistic, as it cannot handle delays and speed variations on the time axis. Hence, to capture the similarities between reporter responses, we develop an alignment algorithm that is robust to noise, time delays and is able to find all the contiguous parts of signals centered about a core alignment (reflecting a core mechanism in drug response). Applying the proposed algorithm to a range of real drug experiments shows that the result agrees well with the prior drug MOA knowledge. © The Author 2012. Published by Oxford University Press. All rights reserved.

  10. Key economic sectors and services

    NARCIS (Netherlands)

    Arent, Douglas J.; Tol, Richard S.J.; Faust, Eberhard; Hella, Joseph P.; Kumar, Surender; Strzepek, Kenneth M.; Tóth, Ferenc L.; Yan, Denghua; Abdulla, Amjad; Kheshgi, Haroon; Xu, He; Ngeh, Julius

    2015-01-01

    Introduction and Context This chapter discusses the implications of climate change on key economic sectors and services, for example, economic activity. Other chapters discuss impacts from a physical, chemical, biological, or social perspective. Economic impacts cannot be isolated; therefore, there

  11. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  12. Key Injury and Violence Data

    Science.gov (United States)

    ... Traumatic Brain Injury Violence Prevention Key Injury and Violence Data Recommend on Facebook Tweet Share Compartir Injuries ... of death among persons 1-44. Injury- and violence-related deaths are only part of the problem ...

  13. Extended Range Intercept Technology

    Science.gov (United States)

    1991-09-01

    1988). Desert bighorn ewes with lambs show a stronger response than do groups of only rams, only ewes, or mixed groups of adults (Miller and Smith...1985). While all startle events may affect desert bighorns, those occurring during the lambing period (February-April) would represent the highest...35807 U.S. Army Pueblo Depot Activity SDSTE-PU-EE Pueblo, CO 81001-5000 U.S. Army White Sands Missile Range STEWS -EL-N White Sands, NM 88002-5076

  14. ORANGE: RANGE OF BENEFITS

    OpenAIRE

    Parle Milind; Chaturvedi Dev

    2012-01-01

    No wonder that oranges are one of the most popular fruits in the world. Orange (citrus sinensis) is well known for its nutritional and medicinal properties throughout the world. From times immemorial, whole Orange plant including ripe and unripe fruits, juice, orange peels, leaves and flowers are used as a traditional medicine. Citrus sinensis belongs to the family Rutaceae. The fruit is a fleshy, indehiscent, berry that ranges widely in size from 4 cm to 12 cm. The major medicinal proper...

  15. Key-space analysis of double random phase encryption technique

    Science.gov (United States)

    Monaghan, David S.; Gopinathan, Unnikrishnan; Naughton, Thomas J.; Sheridan, John T.

    2007-09-01

    We perform a numerical analysis on the double random phase encryption/decryption technique. The key-space of an encryption technique is the set of possible keys that can be used to encode data using that technique. In the case of a strong encryption scheme, many keys must be tried in any brute-force attack on that technique. Traditionally, designers of optical image encryption systems demonstrate only how a small number of arbitrary keys cannot decrypt a chosen encrypted image in their system. However, this type of demonstration does not discuss the properties of the key-space nor refute the feasibility of an efficient brute-force attack. To clarify these issues we present a key-space analysis of the technique. For a range of problem instances we plot the distribution of decryption errors in the key-space indicating the lack of feasibility of a simple brute-force attack.

  16. Secret key distillation from shielded two-qubit states

    International Nuclear Information System (INIS)

    Bae, Joonwoo

    2010-01-01

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  17. Range Flight Safety Requirements

    Science.gov (United States)

    Loftin, Charles E.; Hudson, Sandra M.

    2018-01-01

    The purpose of this NASA Technical Standard is to provide the technical requirements for the NPR 8715.5, Range Flight Safety Program, in regards to protection of the public, the NASA workforce, and property as it pertains to risk analysis, Flight Safety Systems (FSS), and range flight operations. This standard is approved for use by NASA Headquarters and NASA Centers, including Component Facilities and Technical and Service Support Centers, and may be cited in contract, program, and other Agency documents as a technical requirement. This standard may also apply to the Jet Propulsion Laboratory or to other contractors, grant recipients, or parties to agreements to the extent specified or referenced in their contracts, grants, or agreements, when these organizations conduct or participate in missions that involve range flight operations as defined by NPR 8715.5.1.2.2 In this standard, all mandatory actions (i.e., requirements) are denoted by statements containing the term “shall.”1.3 TailoringTailoring of this standard for application to a specific program or project shall be formally documented as part of program or project requirements and approved by the responsible Technical Authority in accordance with NPR 8715.3, NASA General Safety Program Requirements.

  18. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  19. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  20. Key Research Issues in Clostridium difficile

    Directory of Open Access Journals (Sweden)

    George Zhanel

    2005-01-01

    Full Text Available Clostridium difficile is an emerging pathogen that causes C difficile-associated diarrhea, an important nosocomial infection. Control of this infection remains a challenge, and much needs to be determined about the antimicrobial resistance of the organism, antibiotic stewardship, contamination of the patient environment, and various host factors that determine susceptibility or resistance to infection. A national symposium focusing on C difficile infections, the Clostridium difficile Symposium on Emerging Issues and Research, was hosted on November 23, 2004, by the Department of Medical Microbiology and Infectious Diseases at the University of Manitoba, Winnipeg, Manitoba, in partnership with the Canadian Institutes of Health Research. This symposium, which aimed to summarize key research issues regarding C difficile infections in Canada, had the following objectives: to provide a forum for learning and discussion about C difficile and its impact on the health of Canadians; to identify the key research issues that should be addressed; and to explore potential research funding opportunities and collaboration. The present report summarizes key research issues identified for C difficile infections in Canada by addressing four major themes: diagnosis and surveillance, infection prevention and control, antibiotic stewardship, and clinical management.

  1. Long-range antigravity

    Energy Technology Data Exchange (ETDEWEB)

    Macrae, K.I.; Riegert, R.J. (Maryland Univ., College Park (USA). Center for Theoretical Physics)

    1984-10-01

    We consider a theory in which fermionic matter interacts via long-range scalar, vector and tensor fields. In order not to be in conflict with experiment, the scalar and vector couplings for a given fermion must be equal, as is natural in a dimensionally reduced model. Assuming that the Sun is not approximately neutral with respect to these new scalar-vector charges, and if the couplings saturate the experimental bounds, then their strength can be comparable to that of gravity. Scalar-vector fields of this strength can compensate for a solar quadrupole moment contribution to Mercury's anomalous perihelion precession.

  2. Long-range antigravity

    International Nuclear Information System (INIS)

    Macrae, K.I.; Riegert, R.J.

    1984-01-01

    We consider a theory in which fermionic matter interacts via long-range scalar, vector and tensor fields. In order not to be in conflict with experiment, the scalar and vector couplings for a given fermion must be equal, as is natural in a dimensionally reduced model. Assuming that the Sun is not approximately neutral with respect to these new scalar-vector charges, and if the couplings saturate the experimental bounds, then their strength can be comparable to that of gravity. Scalar-vector fields of this strength can compensate for a solar quadrupole moment contribution to Mercury's anomalous perihelion precession. (orig.)

  3. IMPlementation of A Relatives' Toolkit (IMPART study): an iterative case study to identify key factors impacting on the implementation of a web-based supported self-management intervention for relatives of people with psychosis or bipolar experiences in a National Health Service: a study protocol.

    Science.gov (United States)

    Lobban, Fiona; Appleton, Victoria; Appelbe, Duncan; Barraclough, Johanna; Bowland, Julie; Fisher, Naomi R; Foster, Sheena; Johnson, Sonia; Lewis, Elizabeth; Mateus, Céu; Mezes, Barbara; Murray, Elizabeth; O'Hanlon, Puffin; Pinfold, Vanessa; Rycroft-Malone, Jo; Siddle, Ron; Smith, Jo; Sutton, Chris J; Walker, Andrew; Jones, Steven H

    2017-12-28

    Web-based interventions to support people to manage long-term health conditions are available and effective but rarely used in clinical services. The aim of this study is to identify critical factors impacting on the implementation of an online supported self-management intervention for relatives of people with recent onset psychosis or bipolar disorder into routine clinical care and to use this information to inform an implementation plan to facilitate widespread use and inform wider implementation of digital health interventions. A multiple case study design within six early intervention in psychosis (EIP) services in England, will be used to test and refine theory-driven hypotheses about factors impacting on implementation of the Relatives' Education And Coping Toolkit (REACT). Qualitative data including behavioural observation, document analysis, and in-depth interviews collected in the first two EIP services (wave 1) and analysed using framework analysis, combined with quantitative data describing levels of use by staff and relatives and impact on relatives' distress and wellbeing, will be used to identify factors impacting on implementation. Consultation via stakeholder workshops with staff and relatives and co-facilitated by relatives in the research team will inform development of an implementation plan to address these factors, which will be evaluated and refined in the four subsequent EIP services in waves 2 and 3. Transferability of the implementation plan to non-participating services will be explored. Observation of implementation in a real world clinical setting, across carefully sampled services, in real time provides a unique opportunity to understand factors impacting on implementation likely to be generalizable to other web-based interventions, as well as informing further development of implementation theories. However, there are inherent challenges in investigating implementation without influencing the process under observation. We outline our

  4. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  5. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  6. Range Process Simulation Tool

    Science.gov (United States)

    Phillips, Dave; Haas, William; Barth, Tim; Benjamin, Perakath; Graul, Michael; Bagatourova, Olga

    2005-01-01

    Range Process Simulation Tool (RPST) is a computer program that assists managers in rapidly predicting and quantitatively assessing the operational effects of proposed technological additions to, and/or upgrades of, complex facilities and engineering systems such as the Eastern Test Range. Originally designed for application to space transportation systems, RPST is also suitable for assessing effects of proposed changes in industrial facilities and large organizations. RPST follows a model-based approach that includes finite-capacity schedule analysis and discrete-event process simulation. A component-based, scalable, open architecture makes RPST easily and rapidly tailorable for diverse applications. Specific RPST functions include: (1) definition of analysis objectives and performance metrics; (2) selection of process templates from a processtemplate library; (3) configuration of process models for detailed simulation and schedule analysis; (4) design of operations- analysis experiments; (5) schedule and simulation-based process analysis; and (6) optimization of performance by use of genetic algorithms and simulated annealing. The main benefits afforded by RPST are provision of information that can be used to reduce costs of operation and maintenance, and the capability for affordable, accurate, and reliable prediction and exploration of the consequences of many alternative proposed decisions.

  7. Partitioned key-value store with atomic memory operations

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2017-02-07

    A partitioned key-value store is provided that supports atomic memory operations. A server performs a memory operation in a partitioned key-value store by receiving a request from an application for at least one atomic memory operation, the atomic memory operation comprising a memory address identifier; and, in response to the atomic memory operation, performing one or more of (i) reading a client-side memory location identified by the memory address identifier and storing one or more key-value pairs from the client-side memory location in a local key-value store of the server; and (ii) obtaining one or more key-value pairs from the local key-value store of the server and writing the obtained one or more key-value pairs into the client-side memory location identified by the memory address identifier. The server can perform functions obtained from a client-side memory location and return a result to the client using one or more of the atomic memory operations.

  8. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  9. Building capacity in Australian interprofessional health education: perspectives from key health and higher education stakeholders.

    Science.gov (United States)

    Matthews, Lynda R; Pockett, Rosalie B; Nisbet, Gillian; Thistlethwaite, Jill E; Dunston, Roger; Lee, Alison; White, Jill F

    2011-05-01

    A substantial literature engaging with the directions and experiences of stakeholders involved in interprofessional health education exists at the international level, yet almost nothing has been published that documents and analyses the Australian experience. Accordingly, this study aimed to scope the experiences of key stakeholders in health and higher education in relation to the development of interprofessional practice capabilities in health graduates in Australia. Twenty-seven semi-structured interviews and two focus groups of key stakeholders involved in the development and delivery of interprofessional health education in Australian higher education were undertaken. Interview data were coded to identify categories that were organised into key themes, according to principles of thematic analysis. Three themes were identified: the need for common ground between health and higher education, constraints and enablers in current practice, and the need for research to establish an evidence base. Five directions for national development were also identified. The study identified a range of interconnected changes that will be required to successfully mainstream interprofessional education within Australia, in particular, the importance of addressing issues of culture change and the need for a nationally coordinated and research informed approach. These findings reiterate those found in the international literature.

  10. Key Lake spill. Final report

    International Nuclear Information System (INIS)

    1984-03-01

    On January 5, 1984 contaminated water overflowed a storage reservoir at the Key Lake uranium mill onto the ice on a neighboring lake, into a muskeg area and onto a road. Outflow continued for two days, partially undercutting a retaining dyke. This report concludes the spill was the result of poor operation by the Key Lake Mining Corp.. The environmental impact will be minimal after cleanup. Improvements can be made in the regulatory process, and it is necessary to prepare for possible future mishaps

  11. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  12. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  13. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  14. Calculation of projected ranges

    International Nuclear Information System (INIS)

    Biersack, J.P.

    1980-09-01

    The concept of multiple scattering is reconsidered for obtaining the directional spreading of ion motion as a function of energy loss. From this the mean projection of each pathlength element of the ion trajectory is derived which - upon summation or integration - leads to the desired mean projected range. In special cases, the calculation can be carried out analytically, otherwise a simple general algorithm is derived which is suitable even for the smallest programmable calculators. Necessary input for the present treatment consists only of generally accessable stopping power and straggling formulas. The procedure does not rely on scattering cross sections, e.g. power potential or f(t 1 sup(/) 2 ) approximations. The present approach lends itself easily to include electronic straggling or to treat composed target materials, or even to account for the so-called time integral. (orig.)

  15. Praon haliday (Hymenoptera : Braconidae : Aphidiinae) of southeastern Europe: key, host range and phylogenetic relationships

    Czech Academy of Sciences Publication Activity Database

    Kavallieratos, N. G.; Tomanovic, Ž.; Starý, Petr; Athanassiou, CH. G.; Fasseas, C.; Petrovic, O.; Stanisavljevic, L. Ž.; Veroniki, M. A.

    2005-01-01

    Roč. 243, č. 3 (2005), s. 181-209 ISSN 0044-5231 R&D Projects: GA AV ČR(CZ) IAA6007105; GA AV ČR(CZ) IBS5007102 Grant - others:The Ministry of Science and Environmental Protection of the Republic of Serbia(YU) 1547 Institutional research plan: CEZ:AV0Z50070508 Keywords : review * taxonomy * morphological characters Subject RIV: EG - Zoology Impact factor: 0.750, year: 2005

  16. ISO Key Project: Exploring the Full Range of Quasar/Agn Properties

    Science.gov (United States)

    Wilkes, Belinda; Oliversen, Ronald J. (Technical Monitor)

    2003-01-01

    While most of the work on this program has been completed, as previously reported, the portion of the program dealing with the subtopic of ISO LWS data analysis and reduction for the LWS Extragalactic Science Team and its leader, Dr. Howard Smith, is still active. This program in fact continues to generate results, and newly available computer modeling has extended the value of the datasets. As a result the team requests a one-year no-cost extension to this program, through 31 December 2004. The essence of the proposal is to perform ISO spectroscopic studies, including data analysis and modeling, of star-formation regions using an ensemble of archival space-based data from the Infrared Space Observatory's Long Wavelength Spectrometer and Short Wavelength Spectrometer, but including as well some other spectroscopic databases. Four kinds of regions are considered in the studies: (1) disks around more evolved objects; (2) young, low or high mass pre-main sequence stars in star-formation regions; (3) star formation in external, bright IR galaxies; and (4) the galactic center. One prime focus of the program is the OH lines in the far infrared. The program has the following goals: 1) Refine the data analysis of ISO observations to obtain deeper and better SNR results on selected sources. The ISO data itself underwent 'pipeline 10' reductions in early 2001, and additional 'hands-on data reduction packages' were supplied by the ISO teams in 2001. The Fabry-Perot database is particularly sensitive to noise and slight calibration errors; 2) Model the atomic and molecular line shapes, in particular the OH lines, using revised Monte-Carlo techniques developed by the SWAS team at the Center for Astrophysics; 3) Attend scientific meetings and workshops; 4) Perform E&PO activities related to infrared astrophysics and/or spectroscopy.

  17. ANTITUBERCULOSIS DRUG DOSAGE FORMS: RANGE, KEY BENEFITS AND PROSPECTS OF TECHNOLOGICAL IMPROVEMENT

    Directory of Open Access Journals (Sweden)

    M. E. Kim

    2016-01-01

    Full Text Available Interest to research in the development of new formulations of antituberculosis drugs due to the high incidence of tuberculosis in the Republic of Kazakhstan and the Russian Federation nowadays, including with acquired drug resistance. The reason for the development of acquired drug resistance is to interrupt the treatment of patients is the high toxicity of antituberculosis drugs. The improving the efficiency of antituberculosis therapy remains one of the most pressing.The aim this study was to review the dosage forms of antituberculosis drugs currently used and the ways to improve them.Methods. The study was conducted on the basis of scientific analysis (eLibrary database, PubMed, Cyberleninca, patent (kzpatents, reference (Klifar, Drugs register and technical literature.Results. It was revealed that the antituberculosis drugs are available in the form of tablets, capsules, granules for oral use and injection solutions. The advantages and disadvantages of oral dosage forms of antituberculosis drugs: tablets, capsules, granules, syrups, suspensions are described. The importance of the development and implementation in practice of pediatric formulations of antituberculosis drugs is mentioned. The state of current research inhaled formulations for the treatment of tuberculosis is described. The prospects of directional inhalation exposure by immobilization of antituberculosis drugs in liposomes, niosomes, nanocapsules, micelles, micro- and nanoparticles are mentioned. The prospect of the rectal formulations use is described. The increase in interest in the molecular encapsulation of medicinal substances with cyclodextrins in connection with the possibility of increasing the bioavailability of active ingredients, reduce the harmful effects on the gastrointestinal tract, extension, elimination of interaction of incompatible components in combination preparations, the protection of unstable substances is marked.Conclusion: the analysis showed the possibility of improving the antituberculosis drugs by creating more comfortable for the reception in the different conditions of dosage forms, as well as the use of antituberculosis drugs immobilization for reducing toxicity, increasing bioavailability and sustained action.

  18. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so that dif...... that different structural problems can be reproduced successfully....

  19. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  20. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  1. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  2. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  3. Water dynamics clue to key residues in protein folding

    International Nuclear Information System (INIS)

    Gao, Meng; Zhu, Huaiqiu; Yao, Xin-Qiu; She, Zhen-Su

    2010-01-01

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  4. Thoughts on identifiers

    CERN Multimedia

    CERN. Geneva

    2005-01-01

    As business processes and information transactions have become an inextricably intertwined with the Web, the importance of assignment, registration, discovery, and maintenance of identifiers has increased. In spite of this, integrated frameworks for managing identifiers have been slow to emerge. Instead, identification systems arise (quite naturally) from immediate business needs without consideration for how they fit into larger information architectures. In addition, many legacy identifier systems further complicate the landscape, making it difficult for content managers to select and deploy identifier systems that meet both the business case and long term information management objectives. This presentation will outline a model for evaluating identifier applications and the functional requirements of the systems necessary to support them. The model is based on a layered analysis of the characteristics of identifier systems, including: * Functional characteristics * Technology * Policy * Business * Social T...

  5. Teamwork the key to good patient care.

    Science.gov (United States)

    Baillie, Jonathan

    2013-05-01

    In a year when, with the inception of the new Clinical Commissioning Groups, the way that healthcare is procured and delivered will see radical changes, this month's HefmA 2013 National Conference & Exhibition will have as its theme, 'Many Players, One Goal: The Patient'. As HEJ editor, Jonathan Baillie reports, among the wide-ranging estates and facilities topics set for discussion will be 'Getting the patient environment right'; 'Dementia Building for the Future'; 'Waterborne Infections; Lessons Learned'; 'Incorporating lean thinking into design', and the key challenges faced by the estates and facilities sector. The keynote address, touching on a wide range of issues common to all large organisations, will be given by one of the best known 'women in football', and will also reflect particularly on the importance of teamwork.

  6. Identifiability in stochastic models

    CERN Document Server

    1992-01-01

    The problem of identifiability is basic to all statistical methods and data analysis, occurring in such diverse areas as Reliability Theory, Survival Analysis, and Econometrics, where stochastic modeling is widely used. Mathematics dealing with identifiability per se is closely related to the so-called branch of ""characterization problems"" in Probability Theory. This book brings together relevant material on identifiability as it occurs in these diverse fields.

  7. Geotechnics - the key to ground water protection

    DEFF Research Database (Denmark)

    Baumann, Jens; Foged, Niels; Jørgensen, Peter

    2000-01-01

    During the past 5 to 10 years research into ground water protection has proved that fractures in clay till may increase the hydraulic conductivity and herby the vulnerability of the ground water considerably. However, research has not identified a non-expensive and efficient method to map...... the fracture conditions of the various clay tills. Tests performed at the Danish Geotechnical Institute with large undisturbed columns of clay till show that there is a relation between the strength of the clay till and the hydraulic conductivity. Geotechnical methods may therefore be the key to determine...

  8. Interactive simulations for quantum key distribution

    International Nuclear Information System (INIS)

    Kohnle, Antje; Rizzoli, Aluna

    2017-01-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels. (paper)

  9. Interactive simulations for quantum key distribution

    Science.gov (United States)

    Kohnle, Antje; Rizzoli, Aluna

    2017-05-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.

  10. Persistent Identifiers, Discoverability and Open Science (Communication)

    Science.gov (United States)

    Murphy, Fiona; Lehnert, Kerstin; Hanson, Brooks

    2016-04-01

    Early in 2016, the American Geophysical Union announced it was incorporating ORCIDs into its submission workflows. This was accompanied by a strong statement supporting the use of other persistent identifiers - such as IGSNs, and the CrossRef open registry 'funding data'. This was partly in response to funders' desire to track and manage their outputs. However the more compelling argument, and the reason why the AGU has also signed up to the Center for Open Science's Transparency and Openness Promotion (TOP) Guidelines (http://cos.io/top), is that ultimately science and scientists will be the richer for these initiatives due to increased opportunities for interoperability, reproduceability and accreditation. The AGU has appealed to the wider community to engage with these initiatives, recognising that - unlike the introduction of Digital Object Identifiers (DOIs) for articles by CrossRef - full, enriched use of persistent identifiers throughout the scientific process requires buy-in from a range of scholarly communications stakeholders. At the same time, across the general research landscape, initiatives such as Project CRediT (contributor roles taxonomy), Publons (reviewer acknowledgements) and the forthcoming CrossRef DOI Event Tracker are contributing to our understanding and accreditation of contributions and impact. More specifically for earth science and scientists, the cross-functional Coalition for Publishing Data in the Earth and Space Sciences (COPDESS) was formed in October 2014 and is working to 'provide an organizational framework for Earth and space science publishers and data facilities to jointly implement and promote common policies and procedures for the publication and citation of data across Earth Science journals'. Clearly, the judicious integration of standards, registries and persistent identifiers such as ORCIDs and International Geo Sample Numbers (IGSNs) to the research and research output processes is key to the success of this venture

  11. Key figures for the regional- and distribution grid

    International Nuclear Information System (INIS)

    Vikingstad, S.

    1996-02-01

    In Norway, improving the efficiency of the hydroelectric grid operation is a stated goal of the Energy Act. Several studies have identified potential profits of such improvement. This publication focuses on costs and improvement potentials. Publication of key figures may stimulate grid owners, boards and administrations to improve the operating efficiency of their grids. The publication shows key figures for the regional- and distribution grid and is based on accounting data for 1994. The key figures are divided into: (1) Cost structure: The key figures express the relative contributions of each cost component to the total income of the grid, (2) Costs and physical quantities: The key figures show the cost of delivering the transport services, (3) Physical quantities: The key figures describe the working conditions of the energy utility. It appears that the cost structure of the sector varies considerably. The same is true of the cost related to the delivery of grid services. 30 figs., 6 tabs

  12. Key papers in prostate cancer.

    Science.gov (United States)

    Rodney, Simon; Shah, Taimur Tariq; Patel, Hitendra R H; Arya, Manit

    2014-11-01

    Prostate cancer is the most common cancer and second leading cause of death in men. The evidence base for the diagnosis and treatment of prostate cancer is continually changing. We aim to review and discuss past and contemporary papers on these topics to provoke debate and highlight key dilemmas faced by the urological community. We review key papers on prostate-specific antigen screening, radical prostatectomy versus surveillance strategies, targeted therapies, timing of radiotherapy and alternative anti-androgen therapeutics. Previously, the majority of patients, irrespective of risk, underwent radical open surgical procedures associated with considerable morbidity and mortality. Evidence is emerging that not all prostate cancers are alike and that low-grade disease can be safely managed by surveillance strategies and localized treatment to the prostate. The question remains as to how to accurately stage the disease and ultimately choose which treatment pathway to follow.

  13. Long range trajectories

    Energy Technology Data Exchange (ETDEWEB)

    Allen, P. W.; Jessup, E. A.; White, R. E. [Air Resources Field Research Office, Las Vegas, Nevada (United States)

    1967-07-01

    A single air molecule can have a trajectory that can be described with a line, but most meteorologists use single lines to represent the trajectories of air parcels. A single line trajectory has the disadvantage that it is a categorical description of position. Like categorized forecasts it provides no qualification, and no provision for dispersion in case the parcel contains two or more molecules which may take vastly different paths. Diffusion technology has amply demonstrated that an initial aerosol cloud or volume of gas in the atmosphere not only grows larger, but sometimes divides into puffs, each having a different path or swath. Yet, the average meteorologist, faced with the problem of predicting the future motion of a cloud, usually falls back on the line trajectory approach with the explanation that he had no better tool for long range application. In his more rational moments, he may use some arbitrary device to spread his cloud with distance. One such technique has been to separate the trajectory into two or more trajectories, spaced about the endpoint of the original trajectory after a short period of travel, repeating this every so often like a chain reaction. This has the obvious disadvantage of involving a large amount of labor without much assurance of improved accuracy. Another approach is to draw a circle about the trajectory endpoint, to represent either diffusion or error. The problem then is to know what radius to give the circle and also whether to call it diffusion or error. Meteorologists at the Nevada Test Site (NTS) are asked frequently to provide advice which involves trajectory technology, such as prediction of an aerosol cloud path, reconstruction of the motion of a volume of air, indication of the dilution, and the possible trajectory prediction error over great distances. Therefore, we set out, nearly three years ago, to provide some statistical knowledge about the status of our trajectory technology. This report contains some of the

  14. Key Topics in Sports Medicine

    OpenAIRE

    2006-01-01

    Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1) Sports injuries, rehabilitation and injury prevention, 2) Exercise physiology, fitness testing and training, 3) Drugs in sport, 4) Exercise and health promotion, 5) Sport and exercise for special and clinical populations, 6) The ps...

  15. Key issues for passive safety

    International Nuclear Information System (INIS)

    Hayns, M.R.

    1996-01-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ''review paper'' as such and only record the highlights. (author)

  16. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  17. Key issues for passive safety

    Energy Technology Data Exchange (ETDEWEB)

    Hayns, M R [AEA Technology, Harwell, Didcot (United Kingdom). European Institutions; Hicken, E F [Forschungszentrum Juelich GmbH (Germany)

    1996-12-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ``review paper`` as such and only record the highlights. (author).

  18. Low carbon development. Key issues

    Energy Technology Data Exchange (ETDEWEB)

    Urban, Frauke; Nordensvaard, Johan (eds.)

    2013-03-07

    This comprehensive textbook addresses the interface between international development and climate change in a carbon constrained world. It discusses the key conceptual, empirical and policy-related issues of low carbon development and takes an international and interdisciplinary approach to the subject by drawing on insights from across the natural sciences and social sciences whilst embedding the discussion in a global context. The first part explores the concept of low carbon development and explains the need for low carbon development in a carbon constrained world. The book then discusses the key issues of socio-economic, political and technological nature for low carbon development, exploring topics such as the political economy, social justice, financing and carbon markets, and technologies and innovation for low carbon development. This is followed by key issues for low carbon development in policy and practice, which is presented based on cross-cutting issues such as low carbon energy, forestry, agriculture and transportation. Afterwards, practical case studies are discussed from low carbon development in low income countries in Africa, middle income countries in Asia and Latin America and high income countries in Europe and North America.

  19. Detector decoy quantum key distribution

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2009-01-01

    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is especially suited to those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement-based quantum key distribution scheme with an untrusted source without the need for a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single-photon security proof to its physical, full optical implementation. We show that in this scenario, the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.

  20. Ranging Behaviour of Commercial Free-Range Broiler Chickens 2: Individual Variation.

    Science.gov (United States)

    Taylor, Peta S; Hemsworth, Paul H; Groves, Peter J; Gebhardt-Henrich, Sabine G; Rault, Jean-Loup

    2017-07-20

    Little is known about broiler chicken ranging behaviour. Previous studies have monitored ranging behaviour at flock level but whether individual ranging behaviour varies within a flock is unknown. Using Radio Frequency Identification technology, we tracked 1200 individual ROSS 308 broiler chickens across four mixed sex flocks in two seasons on one commercial farm. Ranging behaviour was tracked from first day of range access (21 days of age) until 35 days of age in winter flocks and 44 days of age in summer flocks. We identified groups of chickens that differed in frequency of range visits: chickens that never accessed the range (13 to 67% of tagged chickens), low ranging chickens (15 to 44% of tagged chickens) that accounted for range visits and included chickens that used the range only once (6 to 12% of tagged chickens), and high ranging chickens (3 to 9% of tagged chickens) that accounted for 33 to 50% of all range visits. Males spent longer on the range than females in winter ( p ranging behaviour may help optimise ranging opportunities in free-range systems and is important to elucidate the potential welfare implications of ranging.

  1. SARS: Key factors in crisis management.

    Science.gov (United States)

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  2. A Recommended Set of Key Arctic Indicators

    Science.gov (United States)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  3. Key attributes of expert NRL referees.

    Science.gov (United States)

    Morris, Gavin; O'Connor, Donna

    2017-05-01

    Experiential knowledge of elite National Rugby League (NRL) referees was investigated to determine the key attributes contributing to expert officiating performance. Fourteen current first-grade NRL referees were asked to identify the key attributes they believed contributed to their expert refereeing performance. The modified Delphi method involved a 3-round process of an initial semi-structured interview followed by 2 questionnaires to reach consensus of opinion. The data revealed 25 attributes that were rated as most important that underpin expert NRL refereeing performance. Results illustrate the significance of the cognitive category, with the top 6 ranked attributes all cognitive skills. Of these, the referees ranked decision-making accuracy as the most important attribute, followed by reading the game, communication, game understanding, game management and knowledge of the rules. Player rapport, positioning and teamwork were the top ranked game skill attributes underpinning performance excellence. Expert referees also highlighted a number of psychological attributes (e.g., concentration, composure and mental toughness) that were significant to performance. There were only 2 physiological attributes (fitness, aerobic endurance) that were identified as significant to elite officiating performance. In summary, expert consensus was attained which successfully provided a hierarchy of the most significant attributes of expert NRL refereeing performance.

  4. Identifying Strategic Scientific Opportunities

    Science.gov (United States)

    As NCI's central scientific strategy office, CRS collaborates with the institute's divisions, offices, and centers to identify research opportunities to advance NCI's vision for the future of cancer research.

  5. Identifying Breast Cancer Oncogenes

    Science.gov (United States)

    2011-10-01

    cells we observed that it promoted transformation of HMLE cells, suggesting a tumor suppressive role of Merlin in breast cancer (Figure 4B). A...08-1-0767 TITLE: Identifying Breast Cancer Oncogenes PRINCIPAL INVESTIGATOR: Yashaswi Shrestha...Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 W81XWH-08-1-0767 Identifying Breast Cancer Oncogenes Yashaswi Shrestha Dana-Farber

  6. Key Performance Parameter Driven Technology Goals for Electric Machines and Power Systems

    Science.gov (United States)

    Bowman, Cheryl; Jansen, Ralph; Brown, Gerald; Duffy, Kirsten; Trudell, Jeffrey

    2015-01-01

    Transitioning aviation to low carbon propulsion is one of the crucial strategic research thrust and is a driver in the search for alternative propulsion system for advanced aircraft configurations. This work requires multidisciplinary skills coming from multiple entities. The feasibility of scaling up various electric drive system technologies to meet the requirements of a large commercial transport is discussed in terms of key parameters. Functional requirements are identified that impact the power system design. A breakeven analysis is presented to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  7. Identifying Key Drivers of the Impact of an HIV Cure Intervention in Sub-Saharan Africa

    DEFF Research Database (Denmark)

    Phillips, Andrew N; Cambiano, Valentina; Revill, Paul

    2016-01-01

    BACKGROUND: It is unknown what properties would be required to make an intervention in low income countries that can eradicate or control human immunodeficiency virus (HIV) without antiretroviral therapy (ART) cost-effective. METHODS: We used a model of HIV and ART to investigate the effect...... of introducing an ART-free viral suppression intervention in 2022 using Zimbabwe as an example country. We assumed that the intervention (cost: $500) would be accessible for 90% of the population, be given to those receiving effective ART, have sufficient efficacy to allow ART interruption in 95%, with a rate...... of viral rebound of 5% per year in the first 3 months, and a 50% decline in rate with each successive year. RESULTS: An ART-free viral suppression intervention with these properties would result in >0.53 million disability-adjusted-life-years averted over 2022-2042, with a reduction in HIV program costs...

  8. Identifying Key Events in AOPs for Embryonic Disruption using Computational Toxicology (European Teratology Society - AOP symp.)

    Science.gov (United States)

    Addressing safety aspects of drugs and environmental chemicals relies extensively on animal testing; however, the quantity of chemicals needing assessment and challenges of species extrapolation require alternative approaches to traditional animal studies. Newer in vitro and in s...

  9. Security as the Key Factor in Contemporary Tourism: Specificities Identified Through the Analysis of Responders’ Attitudes

    OpenAIRE

    Penić, Josipa; Kurečić, Petar

    2017-01-01

    The paper represents a product of mentor- graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. Following the latest threatening events and having in mind those yet to come, we can conclude that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive fa...

  10. Quantification of cytosolic interactions identifies Ede1 oligomers as key organizers of endocytosis.

    Science.gov (United States)

    Boeke, Dominik; Trautmann, Susanne; Meurer, Matthias; Wachsmuth, Malte; Godlee, Camilla; Knop, Michael; Kaksonen, Marko

    2014-11-03

    Clathrin-mediated endocytosis is a highly conserved intracellular trafficking pathway that depends on dynamic protein-protein interactions between up to 60 different proteins. However, little is known about the spatio-temporal regulation of these interactions. Using fluorescence (cross)-correlation spectroscopy in yeast, we tested 41 previously reported interactions in vivo and found 16 to exist in the cytoplasm. These detected cytoplasmic interactions included the self-interaction of Ede1, homolog of mammalian Eps15. Ede1 is the crucial scaffold for the organization of the early stages of endocytosis. We show that oligomerization of Ede1 through its central coiled coil domain is necessary for its localization to the endocytic site and we link the oligomerization of Ede1 to its function in locally concentrating endocytic adaptors and organizing the endocytic machinery. Our study sheds light on the importance of the regulation of protein-protein interactions in the cytoplasm for the assembly of the endocytic machinery in vivo. © 2014 The Authors. Published under the terms of the CC BY 4.0 license.

  11. Key identifiers and spelling conventions in MXit-lingo as found in conversations with Dr Math

    CSIR Research Space (South Africa)

    Butgereit, L

    2012-07-01

    Full Text Available Different human languages look different from other human languages. To use a term from the computer industry, each human language has its own “look and feel”. European English speakers can easily recognise a phrase such as “Comment allez...

  12. Integrative genome analyses identify key somatic driver mutations of small-cell lung cancer

    NARCIS (Netherlands)

    Peifer, Martin; Fernandez-Cuesta, Lynnette; Sos, Martin L.; George, Julie; Seidel, Danila; Kasper, Lawryn H.; Plenker, Dennis; Leenders, Frauke; Sun, Ruping; Zander, Thomas; Menon, Roopika; Koker, Mirjam; Dahmen, Ilona; Mueller, Christian; Di Cerbo, Vincenzo; Schildhaus, Hans-Ulrich; Altmueller, Janine; Baessmann, Ingelore; Becker, Christian; de Wilde, Bram; Vandesompele, Jo; Boehm, Diana; Ansen, Sascha; Gabler, Franziska; Wilkening, Ines; Heynck, Stefanie; Heuckmann, Johannes M.; Lu, Xin; Carter, Scott L.; Cibulskis, Kristian; Banerji, Shantanu; Getz, Gad; Park, Kwon-Sik; Rauh, Daniel; Gruetter, Christian; Fischer, Matthias; Pasqualucci, Laura; Wright, Gavin; Wainer, Zoe; Russell, Prudence; Petersen, Iver; Chen, Yuan; Stoelben, Erich; Ludwig, Corinna; Schnabel, Philipp; Hoffmann, Hans; Muley, Thomas; Brockmann, Michael; Engel-Riedel, Walburga; Muscarella, Lucia A.; Fazio, Vito M.; Groen, Harry; Timens, Wim; Sietsma, Hannie; Thunnissen, Erik; Smit, Egbert; Heideman, Danielle A. M.; Snijders, Peter J. F.; Cappuzzo, Federico; Ligorio, Claudia; Damiani, Stefania; Field, John; Solberg, Steinar; Brustugun, Odd Terje; Lund-Iversen, Marius; Saenger, Joerg; Clement, Joachim H.; Soltermann, Alex; Moch, Holger; Weder, Walter; Solomon, Benjamin; Soria, Jean-Charles; Validire, Pierre; Besse, Benjamin; Brambilla, Elisabeth; Brambilla, Christian; Lantuejoul, Sylvie; Lorimier, Philippe; Schneider, Peter M.; Hallek, Michael; Pao, William; Meyerson, Matthew; Sage, Julien; Shendure, Jay; Schneider, Robert; Buettner, Reinhard; Wolf, Juergen; Nuernberg, Peter; Perner, Sven; Heukamp, Lukas C.; Brindle, Paul K.; Haas, Stefan; Thomas, Roman K.

    2012-01-01

    Small-cell lung cancer (SCLC) is an aggressive lung tumor subtype with poor prognosis(1-3). We sequenced 29 SCLC exomes, 2 genomes and 15 transcriptomes and found an extremely high mutation rate of 7.4 +/- 1 protein-changing mutations per million base pairs. Therefore, we conducted integrated

  13. Genome-wide association study of classical Hodgkin lymphoma identifies key regulators of disease susceptibility

    DEFF Research Database (Denmark)

    Sud, Amit; Thomsen, Hauke; Law, Philip J.

    2017-01-01

    Several susceptibility loci for classical Hodgkin lymphoma have been reported. However, much of the heritable risk is unknown. Here, we perform a meta-analysis of two existing genome-wide association studies, a new genome-wide association study, and replication totalling 5,314 cases and 16,749 co...

  14. Identifying Key Workplace Stressors Affecting Twentieth Air Force: Analyses Conducted from December 2012 Through February 2013

    Science.gov (United States)

    2014-01-01

    24-hour basis include nursing , air traffic control, manufacturing, police service, and fire protection. Many studies have shown that evening, night...of occupational injuries for a variety of jobs, including construction workers, nurses , miners, truck drivers, firefighters, and nuclear power plant...lish a strict schedule of AFS-specific focus group times in advance. We could not reschedule if the times proved inconvenient for participants

  15. Identifying stabilizing key residues in proteins using interresidue interaction energy matrix

    Czech Academy of Sciences Publication Activity Database

    Biedermannová, Lada; Hobza, Pavel; Vondrášek, Jiří

    2008-01-01

    Roč. 72, č. 1 (2008), s. 402-413 ISSN 0887-3585 R&D Projects: GA ČR GA203/05/0009; GA ČR GA203/06/1727; GA ČR(CZ) GD203/05/H001; GA MŠk LC512 Institutional research plan: CEZ:AV0Z40550506 Keywords : protein stabilisation * an-initio calculation * interaction energy Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 3.419, year: 2008

  16. Genome-wide association study of classical Hodgkin lymphoma identifies key regulators of disease susceptibility

    NARCIS (Netherlands)

    Sud, A. (Amit); Thomsen, H. (Hauke); Law, P.J. (Philip J.); A. Försti (Asta); Filho, M.I.D.S. (Miguel Inacio Da Silva); Holroyd, A. (Amy); P. Broderick (Peter); Orlando, G. (Giulia); Lenive, O. (Oleg); Wright, L. (Lauren); R. Cooke (Rosie); D.F. Easton (Douglas); P.D.P. Pharoah (Paul); A.M. Dunning (Alison); J. Peto (Julian); F. Canzian (Federico); Eeles, R. (Rosalind); Z. Kote-Jarai; K.R. Muir (K.); Pashayan, N. (Nora); B.E. Henderson (Brian); C.A. Haiman (Christopher); S. Benlloch (Sara); F.R. Schumacher (Fredrick R); Olama, A.A.A. (Ali Amin Al); S.I. Berndt (Sonja); G. Conti (Giario); F. Wiklund (Fredrik); S.J. Chanock (Stephen); Stevens, V.L. (Victoria L.); C.M. Tangen (Catherine M.); Batra, J. (Jyotsna); Clements, J. (Judith); H. Grönberg (Henrik); Schleutker, J. (Johanna); D. Albanes (Demetrius); Weinstein, S. (Stephanie); K. Wolk (Kerstin); West, C. (Catharine); Mucci, L. (Lorelei); Cancel-Tassin, G. (Géraldine); Koutros, S. (Stella); Sorensen, K.D. (Karina Dalsgaard); L. Maehle; D. Neal (David); S.P.L. Travis (Simon); Hamilton, R.J. (Robert J.); S.A. Ingles (Sue); B.S. Rosenstein (Barry S.); Lu, Y.-J. (Yong-Jie); Giles, G.G. (Graham G.); A. Kibel (Adam); Vega, A. (Ana); M. Kogevinas (Manolis); Penney, K.L. (Kathryn L.); Park, J.Y. (Jong Y.); Stanford, J.L. (Janet L.); C. Cybulski (Cezary); B.G. Nordestgaard (Børge); Brenner, H. (Hermann); Maier, C. (Christiane); Kim, J. (Jeri); E.M. John (Esther); P.J. Teixeira; Neuhausen, S.L. (Susan L.); De Ruyck, K. (Kim); Razack, A. (Azad); Newcomb, L.F. (Lisa F.); Lessel, D. (Davor); Kaneva, R. (Radka); N. Usmani (Nawaid); F. Claessens; Townsend, P.A. (Paul A.); Dominguez, M.G. (Manuela Gago); Roobol, M.J. (Monique J.); F. Menegaux (Florence); P. Hoffmann (Per); M.M. Nöthen (Markus); K.-H. JöCkel (Karl-Heinz); Strandmann, E.P.V. (Elke Pogge Von); Lightfoot, T. (Tracy); Kane, E. (Eleanor); Roman, E. (Eve); Lake, A. (Annette); Montgomery, D. (Dorothy); Jarrett, R.F. (Ruth F.); A.J. Swerdlow (Anthony ); A. Engert (Andreas); N. Orr (Nick); K. Hemminki (Kari); Houlston, R.S. (Richard S.)

    2017-01-01

    textabstractSeveral susceptibility loci for classical Hodgkin lymphoma have been reported. However, much of the heritable risk is unknown. Here, we perform a meta-analysis of two existing genome-wide association studies, a new genome-wide association study, and replication totalling 5,314 cases and

  17. Identifying Key Topics for the Description of Sexual Behavior in the Danish Population: A Qualitative Study

    DEFF Research Database (Denmark)

    Jørgensen, Marianne Johansson

    and often lead to unsafe sex. 3) Low self-esteem increases the risk of ignoring crossing of one’s personal boundaries and thereby resulting in promiscuous sexual behavior. 4) Increased sexual experience was found to be associated with lack of condom use. Surprisingly, the informants did not consider drug...... and used to describe important points of interest regarding sexual behavior in the young population....

  18. Predicting establishment of non-native fishes in Greece: identifying key features

    Directory of Open Access Journals (Sweden)

    Christos Gkenas

    2015-11-01

    Full Text Available Non-native fishes are known to cause economic damage to human society and are considered a major threat to biodiversity loss in freshwater ecosystems. The growing concern about these impacts has driven to an investigation of the biological traits that facilitate the establishment of non-native fish. However, invalid assessment in choosing the appropriate statistical model can lead researchers to ambiguous conclusions. Here, we present a comprehensive comparison of traditional and alternative statistical methods for predicting fish invasions using logistic regression, classification trees, multicorrespondence analysis and random forest analysis to determine characteristics of successful and failed non-native fishes in Hellenic Peninsula through establishment. We defined fifteen categorical predictor variables with biological relevance and measures of human interest. Our study showed that accuracy differed according to the model and the number of factors considered. Among all the models tested, random forest and logistic regression performed best, although all approaches predicted non-native fish establishment with moderate to excellent results. Detailed evaluation among the models corresponded with differences in variables importance, with three biological variables (parental care, distance from nearest native source and maximum size and two variables of human interest (prior invasion success and propagule pressure being important in predicting establishment. The analyzed statistical methods presented have a high predictive power and can be used as a risk assessment tool to prevent future freshwater fish invasions in this region with an imperiled fish fauna.

  19. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  20. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  1. Key energy technologies for Europe

    DEFF Research Database (Denmark)

    Jørgensen, B.H.

    2005-01-01

    This report on key energy technologies is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. Senior Scientist BirteHolst Jørgensen, Risø National Laboratory...... contributed by Scientific Officer Edgar Thielmann, DG TREN, Head of Department Hans Larsen, RisøNational Laboratory, Senior Asset Manager Aksel Hauge Pedersen, DONG VE, Consultant Timon Wehnert, IZT-Berlin, and Senior Scientist Martine Uyterlinde, ECN...

  2. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken......“Now I can actually play soccer with the young people without fearing that my colleagues think I am escaping the paper work.” These were the words from a participant in a social pedagogy training course in England a few years ago. This understanding emerged through in-depth discussions...

  3. Identifying Knowledge and Communication

    Directory of Open Access Journals (Sweden)

    Eduardo Coutinho Lourenço de Lima

    2006-12-01

    Full Text Available In this paper, I discuss how the principle of identifying knowledge which Strawson advances in ‘Singular Terms and Predication’ (1961, and in ‘Identifying Reference and Truth-Values’ (1964 turns out to constrain communication. The principle states that a speaker’s use of a referring expression should invoke identifying knowledge on the part of the hearer, if the hearer is to understand what the speaker is saying, and also that, in so referring, speakers are attentive to hearers’ epistemic states. In contrasting it with Russell’s Principle (Evans 1982, as well as with the principle of identifying descriptions (Donnellan 1970, I try to show that the principle of identifying knowledge, ultimately a condition for understanding, makes sense only in a situation of conversation. This allows me to conclude that the cooperative feature of communication (Grice 1975 and reference (Clark andWilkes-Gibbs 1986 holds also at the understanding level. Finally, I discuss where Strawson’s views seem to be unsatisfactory, and suggest how they might be improved.

  4. Public/private key certification authority and key distribution. Draft

    Energy Technology Data Exchange (ETDEWEB)

    Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

    1995-09-25

    Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

  5. Medium Range Flood Forecasting for Agriculture Damage Reduction

    Science.gov (United States)

    Fakhruddin, S. H. M.

    2014-12-01

    Early warning is a key element for disaster risk reduction. In recent decades, major advancements have been made in medium range and seasonal flood forecasting. This progress provides a great opportunity to reduce agriculture damage and improve advisories for early action and planning for flood hazards. This approach can facilitate proactive rather than reactive management of the adverse consequences of floods. In the agricultural sector, for instance, farmers can take a diversity of options such as changing cropping patterns, applying fertilizer, irrigating and changing planting timing. An experimental medium range (1-10 day) flood forecasting model has been developed for Bangladesh and Thailand. It provides 51 sets of discharge ensemble forecasts of 1-10 days with significant persistence and high certainty. This type of forecast could assist farmers and other stakeholders for differential preparedness activities. These ensembles probabilistic flood forecasts have been customized based on user-needs for community-level application focused on agriculture system. The vulnerabilities of agriculture system were calculated based on exposure, sensitivity and adaptive capacity. Indicators for risk and vulnerability assessment were conducted through community consultations. The forecast lead time requirement, user-needs, impacts and management options for crops were identified through focus group discussions, informal interviews and community surveys. This paper illustrates potential applications of such ensembles for probabilistic medium range flood forecasts in a way that is not commonly practiced globally today.

  6. Three key affordances for serendipity

    DEFF Research Database (Denmark)

    Björneborn, Lennart

    2017-01-01

    Purpose Serendipity is an interesting phenomenon to study in information science as it plays a fundamental – but perhaps underestimated – role in how we discover, explore, and learn in all fields of life. The purpose of this paper is to operationalize the concept of serendipity by providing termi...... terminological “building blocks” for understanding connections between environmental and personal factors in serendipitous encounters. Understanding these connections is essential when designing affordances in physical and digital environments that can facilitate serendipity. Design....../methodology/approach In this paper, serendipity is defined as what happens when we, in unplanned ways, encounter resources (information, things, people, etc.) that we find interesting. In the outlined framework, serendipity is understood as an affordance, i.e., a usage potential when environmental and personal factors correspond...... the three key affordances and three key personal serendipity factors: curiosity, mobility, and sensitivity. Ten sub-affordances for serendipity and ten coupled personal sub-factors are also briefly outlined. Related research is compared with and mapped into the framework aiming at a theoretical validation...

  7. Key energy technologies for Europe

    International Nuclear Information System (INIS)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO 2 capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  8. Identifying Needs and Opportunities for Local Government ...

    African Journals Online (AJOL)

    4carolinebell@gmail.com

    attainment of sustainable development goals and socio-ecological balance in ... However, policy and legislation fall short of identifying the range of a priori competences ..... the precautionary principle, risk identification, risk management and ...

  9. Key Working for Families with Young Disabled Children

    Directory of Open Access Journals (Sweden)

    Bernie Carter

    2011-01-01

    Full Text Available For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop. Data were collected from 43 participants (parents, key workers, and other stakeholders. All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals

  10. HEVC for high dynamic range services

    Science.gov (United States)

    Kim, Seung-Hwan; Zhao, Jie; Misra, Kiran; Segall, Andrew

    2015-09-01

    Displays capable of showing a greater range of luminance values can render content containing high dynamic range information in a way such that the viewers have a more immersive experience. This paper introduces the design aspects of a high dynamic range (HDR) system, and examines the performance of the HDR processing chain in terms of compression efficiency. Specifically it examines the relation between recently introduced Society of Motion Picture and Television Engineers (SMPTE) ST 2084 transfer function and the High Efficiency Video Coding (HEVC) standard. SMPTE ST 2084 is designed to cover the full range of an HDR signal from 0 to 10,000 nits, however in many situations the valid signal range of actual video might be smaller than SMPTE ST 2084 supported range. The above restricted signal range results in restricted range of code values for input video data and adversely impacts compression efficiency. In this paper, we propose a code value remapping method that extends the restricted range code values into the full range code values so that the existing standards such as HEVC may better compress the video content. The paper also identifies related non-normative encoder-only changes that are required for remapping method for a fair comparison with anchor. Results are presented comparing the efficiency of the current approach versus the proposed remapping method for HM-16.2.

  11. Normal range of human dietary sodium intake

    DEFF Research Database (Denmark)

    McCarron, David A; Kazaks, Alexandra G; Geerling, Joel C

    2013-01-01

    The recommendation to restrict dietary sodium for management of hypertensive cardiovascular disease assumes that sodium intake exceeds physiologic need, that it can be significantly reduced, and that the reduction can be maintained over time. In contrast, neuroscientists have identified neural...... circuits in vertebrate animals that regulate sodium appetite within a narrow physiologic range. This study further validates our previous report that sodium intake, consistent with the neuroscience, tracks within a narrow range, consistent over time and across cultures....

  12. Hamiguitan Range: A sanctuary for native flora

    OpenAIRE

    Amoroso, Victor B.; Aspiras, Reyno A.

    2010-01-01

    Hamiguitan Range is one of the wildlife sanctuaries in the Philippines having unique biodiversity resources that are at risk due to forest degradation and conversion of forested land to agriculture, shifting cultivation, and over-collection. Thus, it is the main concern of this research to identify and assess the endemic and endangered flora of Hamiguitan Range. Field reconnaissance and transect walk showed five vegetation types namely: agro-ecosystem, dipterocarp, montane, typical mossy and ...

  13. Identifying and Managing Risk.

    Science.gov (United States)

    Abraham, Janice M.

    1999-01-01

    The role of the college or university chief financial officer in institutional risk management is (1) to identify risk (physical, casualty, fiscal, business, reputational, workplace safety, legal liability, employment practices, general liability), (2) to develop a campus plan to reduce and control risk, (3) to transfer risk, and (4) to track and…

  14. Setting Organizational Key Performance Indicators in the Precision Machine Industry

    Directory of Open Access Journals (Sweden)

    Mei-Hsiu Hong

    2015-11-01

    Full Text Available The aim of this research is to define (or set organizational key performance indicators (KPIs in the precision machine industry using the concept of core competence and the supply chain operations reference (SCOR model. The research is conducted in three steps. In the first step, a benchmarking study is conducted to collect major items of core competence and to group them into main categories in order to form a foundation for the research. In the second step, a case company questionnaire and interviews are conducted to identify the key factors of core competence in the precision machine industry. The analysis is conducted based on four dimensions and hence several analysis rounds are completed. Questionnaire data is analyzed with grey relational analysis (GRA and resulted in 5–6 key factors in each dimension or sub-dimension. Based on the conducted interviews, 13 of these identified key factors are separated into one organization objective, five key factors of core competence and seven key factors of core ability. In the final step, organizational KPIs are defined (or set for the five identified key factors of core competence. The most competitive core abilities for each of the five key factors are established. After that, organizational KPIs are set based on the core abilities within 3 main categories of KPIs (departmental, office grade and hierarchal for each key factor. The developed KPI system based on organizational objectives, core competences, and core abilities allow enterprises to handle dynamic market demand and business environments, as well as changes in overall corporate objectives.

  15. Key to Language Learning Success

    Directory of Open Access Journals (Sweden)

    Oktavian Mantiri

    2015-01-01

    Full Text Available This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these roles and nurture the best possible ways where language teaching and learning will thrive. This paper also suggested that both stake-holders should be open to holistic approach of language learning and that other factors such as the environment could play an important part in language teaching and learning success.

  16. Cogeneration: Key feasibility analysis parameters

    International Nuclear Information System (INIS)

    Coslovi, S.; Zulian, A.

    1992-01-01

    This paper first reviews the essential requirements, in terms of scope, objectives and methods, of technical/economic feasibility analyses applied to cogeneration systems proposed for industrial plants in Italy. Attention is given to the influence on overall feasibility of the following factors: electric power and fuel costs, equipment coefficients of performance, operating schedules, maintenance costs, Italian Government taxes and financial and legal incentives. Through an examination of several feasibility studies that were done on cogeneration proposals relative to different industrial sectors, a sensitivity analysis is performed on the effects of varying the weights of different cost benefit analysis parameters. With the use of statistical analyses, standard deviations are then determined for key analysis parameters, and guidelines are suggested for analysis simplifications

  17. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  18. Key determinants of managing the marketing asset of global companies

    OpenAIRE

    Tatyana Tsygankova; Roman Ponomarenko

    2016-01-01

    As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development). The article identified the optimal set of key elements of the system of marketing assets, which are th...

  19. Scalable Multi-group Key Management for Advanced Metering Infrastructure

    OpenAIRE

    Benmalek , Mourad; Challal , Yacine; Bouabdallah , Abdelmadjid

    2015-01-01

    International audience; Advanced Metering Infrastructure (AMI) is composed of systems and networks to incorporate changes for modernizing the electricity grid, reduce peak loads, and meet energy efficiency targets. AMI is a privileged target for security attacks with potentially great damage against infrastructures and privacy. For this reason, Key Management has been identified as one of the most challenging topics in AMI development. In this paper, we propose a new Scalable multi-group key ...

  20. Key energy technologies for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO{sub 2} capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  1. Mars’ First Billion Years: Key Findings, Key Unsolved Paradoxes, and Future Exploration

    Science.gov (United States)

    Ehlmann, Bethany

    2017-10-01

    In the evolution of terrestrial planets, the first billion years are the period most shrouded in mystery: How vigorous is early atmospheric loss? How do planetary climates respond to a brightening sun? When and how are plate tectonic recycling processes initiated? How do voluminous volcanism and heavy impact bombardment influence the composition of the atmosphere? Under what conditions might life arise? Looking outward to terrestrial planets around other stars, the record from Venus, Earth and Mars in this solar system is crucial for developing models of physical can chemical processes. Of these three worlds, Mars provides the longest record of planetary evolution from the first billion years, comprising >50% of exposed geologic units, which are only lightly overprinted by later processes.Orbital observations of the last decade have revealed abundant evidence for surface waters in the form of lakes, valley networks, and evidence of chemically open-system near-surface weathering. Groundwaters at temperatures ranging from just above freezing to hydrothermal have also left a rich record of process in the mineralogical record. A rsuite of environments - similar in diversity to Earth’s - has been discovered on Mars with water pH, temperature, redox, and chemistries varying in space and time.Here, I will focus on the consequences of the aqueous alteration of the Martian crust on the composition of the atmosphere based on recent work studying aspects of the volatile budget (Usui et al., 2015; Edwards & Ehlmann, 2015; Hu et al., 2015; Jakosky et al., 2017, Wordsworth et al., 2017, and Ehlmann, in prep.). The solid crust and mantle of Mars act as volatile reservoirs and volatile sources through volcanism, mineral precipitation, and release of gases. We examine the extent to which the budget is understood or ill-understood for hydrogen and carbon, and associated phases H2O, CO2, and CH4. Additionally, I identify some key stratigraphies where a combination of focused in

  2. Compressed Data Structures for Range Searching

    DEFF Research Database (Denmark)

    Bille, Philip; Gørtz, Inge Li; Vind, Søren Juhl

    2015-01-01

    matrices and web graphs. Our contribution is twofold. First, we show how to compress geometric repetitions that may appear in standard range searching data structures (such as K-D trees, Quad trees, Range trees, R-trees, Priority R-trees, and K-D-B trees), and how to implement subsequent range queries...... on the compressed representation with only a constant factor overhead. Secondly, we present a compression scheme that efficiently identifies geometric repetitions in point sets, and produces a hierarchical clustering of the point sets, which combined with the first result leads to a compressed representation...

  3. Soil fauna: key to new carbon models

    Science.gov (United States)

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; De Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; José Jiménez, Juan

    2016-11-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined mostly in terms of plant residue quality and input and microbial decomposition, overlooking the significant regulation provided by soil fauna. The fauna controls almost any aspect of organic matter turnover, foremost by regulating the activity and functional composition of soil microorganisms and their physical-chemical connectivity with soil organic matter. We demonstrate a very strong impact of soil animals on carbon turnover, increasing or decreasing it by several dozen percent, sometimes even turning C sinks into C sources or vice versa. This is demonstrated not only for earthworms and other larger invertebrates but also for smaller fauna such as Collembola. We suggest that inclusion of soil animal activities (plant residue consumption and bioturbation altering the formation, depth, hydraulic properties and physical heterogeneity of soils) can fundamentally affect the predictive outcome of SOM models. Understanding direct and indirect impacts of soil fauna on nutrient availability, carbon sequestration, greenhouse gas emissions and plant growth is key to the understanding of SOM dynamics in the context of global carbon cycling models. We argue that explicit consideration of soil fauna is essential to make realistic modelling predictions on SOM dynamics and to detect expected non-linear responses of SOM dynamics to global change. We present a decision framework, to be further developed through the activities of KEYSOM, a European COST Action, for when mechanistic SOM models

  4. Answering Key Fuel Cycle Questions

    International Nuclear Information System (INIS)

    Piet, S.J.; Dixon, B.W.; Bennett, R.G.; Smith, J.D.; Hill, R.N.

    2004-01-01

    Given the range of fuel cycle goals and criteria, and the wide range of fuel cycle options, how can the set of options eventually be narrowed in a transparent and justifiable fashion? It is impractical to develop all options. We suggest an approach that starts by considering a range of goals for the Advanced Fuel Cycle Initiative (AFCI) and then posits seven questions, such as whether Cs and Sr isotopes should be separated from spent fuel and, if so, what should be done with them. For each question, we consider which of the goals may be relevant to eventually providing answers. The AFCI program has both ''outcome'' and ''process'' goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geologic repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are rea diness to proceed and adaptability and robustness in the face of uncertainties

  5. Internally readable identifying tag

    International Nuclear Information System (INIS)

    Jefferts, K.B.; Jefferts, E.R.

    1980-01-01

    A method of identifying non-metallic objects by means of X-ray equipment is described in detail. A small metal pin with a number of grooves cut in a pre-determined equi-spaced pattern is implanted into the non-metallic object and by decoding the groove patterns using X-ray equipment, the object is uniquely identified. A specific example of such an application is in studying the migratory habits of fish. The pin inserted into the snout of the fish is 0.010 inch in diameter, 0.040 inch in length with 8 possible positions for grooves if spaced 0.005 inch apart. With 6 of the groove positions available for data, the capacity is 2 6 or 64 combinations; clearly longer pins would increase the data capacity. This method of identification is a major advance over previous techniques which necessitated destruction of the fish in order to recover the identification tag. (UK)

  6. Super-ranging. A new ranging strategy in European badgers.

    Directory of Open Access Journals (Sweden)

    Aoibheann Gaughran

    Full Text Available We monitored the ranging of a wild European badger (Meles meles population over 7 years using GPS tracking collars. Badger range sizes varied seasonally and reached their maximum in June, July and August. We analysed the summer ranging behaviour, using 83 home range estimates from 48 individuals over 6974 collar-nights. We found that while most adult badgers (males and females remained within their own traditional social group boundaries, several male badgers (on average 22% regularly ranged beyond these traditional boundaries. These adult males frequently ranged throughout two (or more social group's traditional territories and had extremely large home ranges. We therefore refer to them as super-rangers. While ranging across traditional boundaries has been recorded over short periods of time for extraterritorial mating and foraging forays, or for pre-dispersal exploration, the animals in this study maintained their super-ranges from 2 to 36 months. This study represents the first time such long-term extra-territorial ranging has been described for European badgers. Holding a super-range may confer an advantage in access to breeding females, but could also affect local interaction networks. In Ireland & the UK, badgers act as a wildlife reservoir for bovine tuberculosis (TB. Super-ranging may facilitate the spread of disease by increasing both direct interactions between conspecifics, particularly across social groups, and indirect interactions with cattle in their shared environment. Understanding super-ranging behaviour may both improve our understanding of tuberculosis epidemiology and inform future control strategies.

  7. Identifying Breast Cancer Oncogenes

    Science.gov (United States)

    2010-10-01

    tyrosine kinases with an SH3, SH2 and catalytic domain, it lacks a native myristylation signal shared by most members of this class [14], [38]. The...therapeutics and consequently, improve clinical outcomes. We aim to identify novel drivers of breast oncogenesis. We hypothesize that a kinase gain-of...human mammary epithelial cells. A pBabe-Puro-Myr-Flag kinase open reading frame (ORF) library was screened in immortalized human mammary epithelial

  8. Rock disposal problems identified

    Energy Technology Data Exchange (ETDEWEB)

    Knox, R

    1978-06-01

    Mathematical models are the only way of examining the return of radioactivity from nuclear waste to the environment over long periods of time. Work in Britain has helped identify areas where more basic data is required, but initial results look very promising for final disposal of high level waste in hard rock repositories. A report by the National Radiological Protection Board of a recent study, is examined.

  9. CCM key comparison CCM.D-K4 'Hydrometer'

    Science.gov (United States)

    Lorefice, S.; Becerra, L. O.; Lenard, E.; Lee, Y. J.; Lee, W. G.; Madec, T.; Meury, P. A.; Caceres, J.; Santos, C.; Vamossy, C.; Man, J.; Fen, K.; Toda, K.; Wright, J.; Bettin, H.; Toth, H.

    2016-01-01

    This report presents the comparison philosophy, methodology, analysis and the results of the designed CCM.D-K4 key comparison that covered the calibration of high resolution hydrometers for liquid and alcoholometers in the density range 600 kg/m3 to 2000 kg/m3 at the temperature of 20°C. The main purpose of this comparison was not only to evaluate the degree of equivalence in the calibration of high accuracy hydrometers between NMI participants, but also to link, were it is possible, the results of previous comparisons to Key Comparison Reference Values (KCRVs) of CCM.D-K4. Eleven NMI laboratories took part in the CCM.D-K4 divided in two groups (petals). With the CCM.D-K4 purpose, two similar sets consisting of three hydrometers for liquid density determinations and an alcoholometer were circulated to the NMI participants as a travelling standard in the time interval from January 2011 to April 2012. Twelve Key Comparison Reference Values (KCRVs) for each petal have been obtained at the density values related to the tested density marks of the transfer standards by the results of participants. The KCRVs and corresponding uncertainties were calculated by the weighted mean in the case of consistent results, otherwise the median was used. The degree of equivalence (DoE) with respect to the corresponding KCRV was determined for each participant and, in this particular comparison, the Weighted Least Squares (WLS) method was used to link the individual DoE of each participant by a continuous function. Significant drift of the transfer standards was not detected. This report also gives instructions on calculating pair-wise degrees of equivalence, with the addition of any information on correlations that may be necessary to estimate more accurately as well as the procedure for linking international comparisons to the CCM.D-K4. Finally an example of linkage to the CCM.D-K4 is given by dealing with the results of the bilateral comparison between INRiM and NMIA, which was

  10. Careful assessment key in managing prostatitis.

    Science.gov (United States)

    Gujadhur, Rahul; Aning, Jonathan

    2015-04-01

    Prostatitis is a common condition estimated to affect up to 30% of men in their lifetime, it is most prevalent in men aged between 35 and 50. Prostatitis is subclassified into: acute bacterial prostatitis, chronic bacterial prostatitis, chronic pelvic pain and asymptomatic inflammatory prostatitis. Acute bacterial prostatitis presents with acute onset pelvic pain which may or may not be related to voiding, lower urinary tract symptoms, sometimes haematuria or haematospermia and systemic symptoms such as fever and rigors. A documented history of recurrent urinary tract infections is the key feature of chronic bacterial prostatitis. Duration of symptoms > 3 months defines chronicity. The key symptom of chronic pelvic pain syndrome is pain. Patients may describe pain during or after ejaculation as their predominant symptom. Clinical assessment includes a thorough history and examination. A digital rectal examination should be performed after a midstream urine (MSU) sample has been collected for urine dipstick, microscopy and culture. The prostate should be checked for nodules. In acute bacterial prostatitis the MSU is the only laboratory investigation required. Chronic pelvic pain syndrome may be multifactorial and part of a more generalised pain disorder. Pelvic floor muscle abnormalities, altered neuroendocrine pathways, chemically induced inflammation, bacterial infection, autoimmune processes, dysfunctional voiding as well intraprostatic ductal reflux mechanisms have all been identified in men with chronic pelvic pain syndrome.

  11. KEY FACTORS IN MARKETING FOCUSED SERVICES BUSINESSES

    Directory of Open Access Journals (Sweden)

    Doris Yohanna Martínez Castrillón

    2016-07-01

    Full Text Available This article aims to identify the key success factors in the marketing area and describe them as managerial allies for companies that wish to position themselves in the market under a good sustainable performance , for it has been consulted theoretical references of Marketing as a management partner with collection and integration of data. Methodologically, it is located within the type of descriptive research field, with a design of transactional non-experimental, with an intentional non-probabilistic stratified sample of four reporting units. The findings established fifteen (15 points of influence called "key success factors (FCE in the area of marketing, and managerial allies of service companies in the security, surveillance and protection sector in industrial, commercial and residential sectors. Finally, it is intended that the actions of marketing service companies should focus to the welfare of both the organization, such as users, both in the environment, and economic, social and technological, characterized by ethics, sustainable development and transparency to respond appropriately.

  12. Rock glaciers, Zailiysiky Range, Kungei Ranges, Tienshan, Kazakhstan, Version 1

    Data.gov (United States)

    National Aeronautics and Space Administration — The Zailiyskiy Alatau is the northernmost parallel latitudinal ranges of the Northern Tien Shan. The highest point of this range is the Talgar peak (4973 m a.s.l.)....

  13. Key indicators for organizational performance measurement

    Directory of Open Access Journals (Sweden)

    Firoozeh Haddadi

    2014-09-01

    Full Text Available Each organization for assessing the amount of utility and desirability of their activities, especially in complex and dynamic environments, requires determining and ranking the vital performance indicators. Indicators provide essential links among strategy, execution and ultimate value creation. The aim of this paper is to develop a framework, which identifies and prioritizes Key Performance Indicators (KPIs that a company should focus on them to define and measure progress towards organizational objectives. For this purpose, an applied research was conducted in 2013 in an Iranian telecommunication company. We first determined the objectives of the company with respect to four perspectives of BSC (Balanced Scorecard framework. Next, performance indicators were listed and paired wise comparisons were accomplished by company's high-ranked employees through standard Analytic Hierarchy Process (AHP questionnaires. This helped us establish the weight of each indicator and to rank them, accordingly.

  14. Managing clinical education through understanding key principles.

    Science.gov (United States)

    Cunningham, Joanne; Wright, Caroline; Baird, Marilyn

    2015-01-01

    Traditionally, a practicum facilitated the integration of on-campus learning and practical workplace training. Over the past 3 decades, an educative practicum has evolved that promotes clinical reasoning, including analytical and evaluative abilities, through reflective practice. Anecdotal evidence indicates that the delivery of clinical education within medical radiation science entry-level programs continues to vacillate between traditional practicums and the new reflective practicums. To review the literature about clinical education within the medical radiation sciences and identify key principles for practitioners seeking to reflect upon and improve their approach to teaching and supporting students in the clinical environment. A search of 3 major journal databases, Internet searches, and hand searches of reference lists were conducted to identify literature about clinical education in the medical radiation sciences from January 1, 2000, to December 31, 2012. Twenty-two studies were included in this review. The 5 key elements associated with clinical education include the clinical support model and quality, overcoming the theory-practice gap, learning outcomes and reliable and valid assessment, preparing and supporting students, and accommodating differing teaching and learning needs. Many factors influence the quality of clinical education, including the culture of the clinical environment and clinical leadership roles. Several approaches can help students bridge the theory-practice gap, including simulators, role-playing activities, and reflective journals. In addition, clinical educators should use assessment strategies that objectively measure student progress, and they should be positive role models for their students. The successful clinical education of students in the medical radiation sciences depends upon the systems, structures, and people in the clinical environment. Clinical education is accomplished through the collaborative efforts of the

  15. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  16. VICKEY: Mining Conditional Keys on Knowledge Bases

    DEFF Research Database (Denmark)

    Symeonidou, Danai; Prado, Luis Antonio Galarraga Del; Pernelle, Nathalie

    2017-01-01

    A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs...

  17. Identifying ELIXIR Core Data Resources.

    Science.gov (United States)

    Durinx, Christine; McEntyre, Jo; Appel, Ron; Apweiler, Rolf; Barlow, Mary; Blomberg, Niklas; Cook, Chuck; Gasteiger, Elisabeth; Kim, Jee-Hyub; Lopez, Rodrigo; Redaschi, Nicole; Stockinger, Heinz; Teixeira, Daniel; Valencia, Alfonso

    2016-01-01

    The core mission of ELIXIR is to build a stable and sustainable infrastructure for biological information across Europe. At the heart of this are the data resources, tools and services that ELIXIR offers to the life-sciences community, providing stable and sustainable access to biological data. ELIXIR aims to ensure that these resources are available long-term and that the life-cycles of these resources are managed such that they support the scientific needs of the life-sciences, including biological research. ELIXIR Core Data Resources are defined as a set of European data resources that are of fundamental importance to the wider life-science community and the long-term preservation of biological data. They are complete collections of generic value to life-science, are considered an authority in their field with respect to one or more characteristics, and show high levels of scientific quality and service. Thus, ELIXIR Core Data Resources are of wide applicability and usage. This paper describes the structures, governance and processes that support the identification and evaluation of ELIXIR Core Data Resources. It identifies key indicators which reflect the essence of the definition of an ELIXIR Core Data Resource and support the promotion of excellence in resource development and operation. It describes the specific indicators in more detail and explains their application within ELIXIR's sustainability strategy and science policy actions, and in capacity building, life-cycle management and technical actions. The identification process is currently being implemented and tested for the first time. The findings and outcome will be evaluated by the ELIXIR Scientific Advisory Board in March 2017. Establishing the portfolio of ELIXIR Core Data Resources and ELIXIR Services is a key priority for ELIXIR and publicly marks the transition towards a cohesive infrastructure.

  18. Identifying PHM market and network opportunities.

    Science.gov (United States)

    Grube, Mark E; Krishnaswamy, Anand; Poziemski, John; York, Robert W

    2015-11-01

    Two key processes for healthcare organizations seeking to assume a financially sustainable role in population health management (PHM), after laying the groundwork for the effort, are to identify potential PHM market opportunities and determine the scope of the PHM network. Key variables organizations should consider with respect to market opportunities include the patient population, the overall insurance/employer market, and available types of insurance products. Regarding the network's scope, organizations should consider both traditional strategic criteria for a viable network and at least five additional criteria: network essentiality and PHM care continuum, network adequacy, service distribution right-sizing, network growth strategy, and organizational agility.

  19. Key factors influencing lung cancer survival in northern Italy.

    Science.gov (United States)

    Mangone, Lucia; Minicozzi, Pamela; Vicentini, Massimo; Giacomin, Adriano; Caldarella, Adele; Cirilli, Claudia; Falcini, Fabio; Giorgi Rossi, Paolo; Sant, Milena

    2013-06-01

    Lung cancer is a major cause of cancer death worldwide. The aims of this study were to analyze presentation, treatment and survival for lung cancer in northern Italy, and identify factors influencing survival. A total of 1180 lung cancer cases diagnosed in four north Italian cancer registries (Biella, Modena, Reggio Emilia, Romagna) in 2003-2005 were analyzed. Information on morphology, stage, diagnostic examinations, chemotherapy, radiotherapy, and surgical treatment was collected from clinical records. Three-year relative survival and relative excess risks of death were estimated. Overall, 10% of cases were stage I, 50% stage IV, and 12% stage unknown. Romagna - where sophisticated diagnostic examinations were performed more often - had proportionately more microscopically verified cases and resected cases than Biella. Romagna had also high proportions of cases given chemotherapy and radiotherapy. Three-year survival was 14%, range 10% (Biella) to 19% (Romagna); 69% for stage I, 3% for stage IV. Stage I survival was higher in Romagna (82%) than Reggio Emilia and Biella (60-61%) but for operated stage I cases, survival was similar (88%) in Romagna and Biella. The fully adjusted model showed a higher risk of death in Biella (1.23, 95%CI 1.02-1.48) than Modena (reference). Stage and surgery are key factors influencing survival. Centralizing lung cancer treatment to improve diagnostic work-up may improve outcomes. Copyright © 2013 Elsevier Ltd. All rights reserved.

  20. Identifying phenomenal consciousness.

    Science.gov (United States)

    Schier, Elizabeth

    2009-03-01

    This paper examines the possibility of finding evidence that phenomenal consciousness is independent of access. The suggestion reviewed is that we should look for isomorphisms between phenomenal and neural activation spaces. It is argued that the fact that phenomenal spaces are mapped via verbal report is no problem for this methodology. The fact that activation and phenomenal space are mapped via different means does not mean that they cannot be identified. The paper finishes by examining how data addressing this theoretical question could be obtained.

  1. Quantum key distribution and cryptography

    International Nuclear Information System (INIS)

    Alleaume, R.

    2005-01-01

    Full text: Originally proposed by classical cryptographers, the ideas behind Quantum Key Distribution (QKD) have attracted considerable interest among the quantum optics community, which has significantly helped bring these ideas to reality. Experimental realizations have quickly evolved from early lab demonstrations to QKD systems that are now deployed in real conditions and targeting commercial applications. Although QKD can be theoretically proven to rely on 'unconditional security proofs' and should thus be able to provide security levels unachievable through computationally-based cryptographic techniques, the debate on the cryptographic applications of QKD remains somehow controversial. It seems that a consensus on that matter cannot be reached without a careful analysis of assumptions and definitions related to security models used in classical or in quantum cryptography. In this talk, we will try to present a comprehensive synthesis on this topic. We have initiated this work as a contribution to the European IP SECOQC project, confronting views and knowledge among experimental and theoretical quantum physicists, as well as classical cryptographers. (author)

  2. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  3. Does this range suit me? Range satisfaction of battery electric vehicle users.

    Science.gov (United States)

    Franke, Thomas; Günther, Madlen; Trantow, Maria; Krems, Josef F

    2017-11-01

    User satisfaction is a vital design criterion for sustainable systems. The present research aimed to understand factors relating to individually perceived range satisfaction of battery electric vehicle (BEV) users. Data from a large-scale BEV field trial (N = 72) were analyzed. Apart from an initial drop in range satisfaction, increasing practical experience was related to increased range satisfaction. Classical indicators of users' mobility profiles (daily travel distances) were only weakly related to lower range satisfaction (not significant), after controlling for practical experience and preferred coverage of mobility needs. The regularity/predictability of users' mobility patterns, the percentage of journeys not coverable because of range issues, and users' individual comfortable range accounted for variance in range satisfaction. Finally, range satisfaction was related to key indicators of general BEV acceptance (e.g., purchase intentions). These results underline the complex dynamics involved in individual range satisfaction, as well as its central role for BEV acceptance. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. KEY TOPICS IN SPORTS MEDICINE

    Directory of Open Access Journals (Sweden)

    Amir Ali Narvani

    2006-12-01

    Full Text Available Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1 Sports injuries, rehabilitation and injury prevention, 2 Exercise physiology, fitness testing and training, 3 Drugs in sport, 4 Exercise and health promotion, 5 Sport and exercise for special and clinical populations, 6 The psychology of performance and injury. PURPOSE The Key Topics format provides extensive, concise information in an accessible, easy-to-follow manner. AUDIENCE The book is targeted the students and specialists in sports medicine and rehabilitation, athletic training, physiotherapy and orthopaedic surgery. The editors are authorities in their respective fields and this handbook depends on their extensive experience and knowledge accumulated over the years. FEATURES The book contains the information for clinical guidance, rapid access to concise details and facts. It is composed of 99 topics which present the information in an order that is considered logical and progressive as in most texts. Chapter headings are: 1. Functional Anatomy, 2. Training Principles / Development of Strength and Power, 3. Biomechanical Principles, 4. Biomechanical Analysis, 5. Physiology of Training, 6. Monitoring of Training Progress, 7. Nutrition, 8. Hot and Cold Climates, 9. Altitude, 10. Sport and Travelling, 11. Principles of Sport Injury Diagnosis, 12. Principles of Sport and Soft Tissue Management, 13. Principles of Physical Therapy and Rehabilitation, 14. Principles of Sport Injury Prevention, 15. Sports Psychology, 16. Team Sports, 17. Psychological Aspects of Injury in Sport, 18. Injury Repair Process, 19. Basic Biomechanics of Tissue Injury, 20. Plain Film Radiography in Sport, 21. Nuclear Medicine, 22. Diagnostic Ultrasound, 23. MRI Scan, 24. Other Imaging, 5. Head Injury, 26. Eye

  5. Key issues in transplant tourism.

    Science.gov (United States)

    Akoh, Jacob A

    2012-02-24

    Access to organ transplantation depends on national circumstances, and is partly determined by the cost of health care, availability of transplant services, the level of technical capacity and the availability of organs. Commercial transplantation is estimated to account for 5%-10% (3500-7000) of kidney transplants performed annually throughout the world. This review is to determine the state and outcome of renal transplantation associated with transplant tourism (TT) and the key challenges with such transplantation. The stakeholders of commercial transplantation include: patients on the waiting lists in developed countries or not on any list in developing countries; dialysis funding bodies; middlemen, hosting transplant centres; organ-exporting countries; and organ vendors. TT and commercial kidney transplants are associated with a high incidence of surgical complications, acute rejection and invasive infection which cause major morbidity and mortality. There are ethical and medical concerns regarding the management of recipients of organs from vendors. The growing demand for transplantation, the perceived failure of altruistic donation in providing enough organs has led to calls for a legalised market in organ procurement or regulated trial in incentives for donation. Developing transplant services worldwide has many benefits - improving results of transplantation as they would be performed legally, increasing the donor pool and making TT unnecessary. Meanwhile there is a need to re-examine intrinsic attitudes to TT bearing in mind the cultural and economic realities of globalisation. Perhaps the World Health Organization in conjunction with The Transplantation Society would set up a working party of stakeholders to study this matter in greater detail and make recommendations.

  6. List identifies threatened ecosystems

    Science.gov (United States)

    Showstack, Randy

    2012-09-01

    The International Union for Conservation of Nature (IUCN) announced on 9 September that it will develop a new Red List of Ecosystems that will identify which ecosystems are vulnerable or endangered. The list, which is modeled on the group's Red List of Threatened Species™, could help to guide conservation activities and influence policy processes such as the Convention on Biological Diversity, according to the group. “We will assess the status of marine, terrestrial, freshwater, and subterranean ecosystems at local, regional, and global levels,” stated Jon Paul Rodriguez, leader of IUCN's Ecosystems Red List Thematic Group. “The assessment can then form the basis for concerted implementation action so that we can manage them sustainably if their risk of collapse is low or restore them if they are threatened and then monitor their recovery.”

  7. Global Microbial Identifier

    DEFF Research Database (Denmark)

    Wielinga, Peter; Hendriksen, Rene S.; Aarestrup, Frank Møller

    2017-01-01

    ) will likely also enable a much better understanding of the pathogenesis of the infection and the molecular basis of the host response to infection. But the full potential of these advances will only transpire if the data in this area become transferable and thereby comparable, preferably in open-source...... of microorganisms, for the identification of relevant genes and for the comparison of genomes to detect outbreaks and emerging pathogens. To harness the full potential of WGS, a shared global database of genomes linked to relevant metadata and the necessary software tools needs to be generated, hence the global...... microbial identifier (GMI) initiative. This tool will ideally be used in amongst others in the diagnosis of infectious diseases in humans and animals, in the identification of microorganisms in food and environment, and to track and trace microbial agents in all arenas globally. This will require...

  8. Photon nonlinear mixing in subcarrier multiplexed quantum key distribution systems.

    Science.gov (United States)

    Capmany, José

    2009-04-13

    We provide, for the first time to our knowledge, an analysis of the influence of nonlinear photon mixing on the end to end quantum bit error rate (QBER) performance of subcarrier multiplexed quantum key distribution systems. The results show that negligible impact is to be expected for modulation indexes in the range of 2%.

  9. Lunar laser ranging: the millimeter challenge

    International Nuclear Information System (INIS)

    Murphy, T W

    2013-01-01

    Lunar laser ranging has provided many of the best tests of gravitation since the first Apollo astronauts landed on the Moon. The march to higher precision continues to this day, now entering the millimeter regime, and promising continued improvement in scientific results. This review introduces key aspects of the technique, details the motivations, observables, and results for a variety of science objectives, summarizes the current state of the art, highlights new developments in the field, describes the modeling challenges, and looks to the future of the enterprise. (review article)

  10. Genetic stratigraphy of key demographic events in Arabia.

    Science.gov (United States)

    Fernandes, Verónica; Triska, Petr; Pereira, Joana B; Alshamali, Farida; Rito, Teresa; Machado, Alison; Fajkošová, Zuzana; Cavadas, Bruno; Černý, Viktor; Soares, Pedro; Richards, Martin B; Pereira, Luísa

    2015-01-01

    At the crossroads between Africa and Eurasia, Arabia is necessarily a melting pot, its peoples enriched by successive gene flow over the generations. Estimating the timing and impact of these multiple migrations are important steps in reconstructing the key demographic events in the human history. However, current methods based on genome-wide information identify admixture events inefficiently, tending to estimate only the more recent ages, as here in the case of admixture events across the Red Sea (~8-37 generations for African input into Arabia, and 30-90 generations for "back-to-Africa" migrations). An mtDNA-based founder analysis, corroborated by detailed analysis of the whole-mtDNA genome, affords an alternative means by which to identify, date and quantify multiple migration events at greater time depths, across the full range of modern human history, albeit for the maternal line of descent only. In Arabia, this approach enables us to infer several major pulses of dispersal between the Near East and Arabia, most likely via the Gulf corridor. Although some relict lineages survive in Arabia from the time of the out-of-Africa dispersal, 60 ka, the major episodes in the peopling of the Peninsula took place from north to south in the Late Glacial and, to a lesser extent, the immediate post-glacial/Neolithic. Exchanges across the Red Sea were mainly due to the Arab slave trade and maritime dominance (from ~2.5 ka to very recent times), but had already begun by the early Holocene, fuelled by the establishment of maritime networks since ~8 ka. The main "back-to-Africa" migrations, again undetected by genome-wide dating analyses, occurred in the Late Glacial period for introductions into eastern Africa, whilst the Neolithic was more significant for migrations towards North Africa.

  11. EZID: Long term identifiers made easy (Invited)

    Science.gov (United States)

    Starr, J.

    2013-12-01

    Scholarly research is producing ever increasing amounts of digital research data, and this data should be managed throughout the research life cycle both as part of good scientific practice, but also to comply with funder mandates, such as the 2013 OSTP Public Access Memo (http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp_public_access_memo_2013.pdf). By assigning unique and persistent identifiers to data objects, data managers can gain control and flexibility over what can be a daunting task. This is due to the fact that the objects can be moved to new locations without disruption to links, as long as the identifier target is maintained. EZID is a tool that makes assigning and maintaining unique, persistent identifiers easy. It was designed and built by California Digital Library (CDL) and has both a user interface and a RESTful API. EZID currently offers services for two globally unique, persistent identifier schemes: Digital Object Identifiers (DOIs) and Archival Resource Keys (ARKs). DOIs are identifiers originating from the publishing world and are in widespread use for journal articles. CDL is able to offer DOIs because of being a founding member of DataCite (http://www.datacite.org/), an international consortium established to provide easier access to scientific research data on the Internet. ARKs are identifiers originating from the library, archive and museum community. Like DOIs, they become persistent when the objects and identifier forwarding information is maintained. DOIs and ARKs have a key role in data management and, therefore, in data management plans. DOIs are the recommended identifier for use in data citation, and ARKs provide the maximum flexibility needed for data documentation and management throughout the early phases of a project. The two identifier schemes are able to be used together, and EZID is made to work with both. EZID clients, coming from education, research, government, and the private sector, are utilizing the

  12. Medium Range Ensembles Flood Forecasts for Community Level Applications

    Science.gov (United States)

    Fakhruddin, S.; Kawasaki, A.; Babel, M. S.; AIT

    2013-05-01

    Early warning is a key element for disaster risk reduction. In recent decades, there has been a major advancement in medium range and seasonal forecasting. These could provide a great opportunity to improve early warning systems and advisories for early action for strategic and long term planning. This could result in increasing emphasis on proactive rather than reactive management of adverse consequences of flood events. This can be also very helpful for the agricultural sector by providing a diversity of options to farmers (e.g. changing cropping pattern, planting timing, etc.). An experimental medium range (1-10 days) flood forecasting model has been developed for Bangladesh which provides 51 set of discharge ensembles forecasts of one to ten days with significant persistence and high certainty. This could help communities (i.e. farmer) for gain/lost estimation as well as crop savings. This paper describe the application of ensembles probabilistic flood forecast at the community level for differential decision making focused on agriculture. The framework allows users to interactively specify the objectives and criteria that are germane to a particular situation, and obtain the management options that are possible, and the exogenous influences that should be taken into account before planning and decision making. risk and vulnerability assessment was conducted through community consultation. The forecast lead time requirement, users' needs, impact and management options for crops, livestock and fisheries sectors were identified through focus group discussions, informal interviews and questionnaire survey.

  13. Key acceptability attributes of orodispersible films.

    Science.gov (United States)

    Scarpa, Mariagiovanna; Paudel, Amrit; Kloprogge, Frank; Hsiao, Wen Kai; Bresciani, Massimo; Gaisford, Simon; Orlu, Mine

    2018-04-01

    The features rendering orodispersible films (ODFs) patient-centric formulations are widely discussed in the scientific literature. However there is a lack of research studies exploring ODF characteristics with a potential impact on end-user acceptability. The aim of this study was to identify the key ODF characteristics affecting end-user acceptability by developing in vitro test methods for the prediction of ODFs acceptability and correlate these formulation characteristics with the data obtained from a human panel study. Four drug-free single-polymer films were prepared by solvent casting. Solutions of poly(vinyl) alcohol (PVOH) 39 KDa (P1), PVOH 197 KDa (P2), carboxymethylcellulose (CMC) 395 KDa (C1), and CMC 725 KDa (C2) were prepared. Texture analysis and Dynamic Mechanical Analysis (DMA) were used to assess film tack. Petri dish and drop methods were used to assess disintegration time. A human panel of 24 healthy young adults was employed to identify end-user acceptability criteria of the four study film samples. Texture analysis data of ODF tack were not found to be in agreement with the in vivo perceived stickiness in the mouth. However, measurement of the area under the adhesive force curve obtained by DMA correlated with in vivo perceived stickiness data for all samples. The disintegration times obtained by drop method were more comparable to human panel data than the petri dish method. Hence DMA and drop methods proved to be promising methodologies for the prediction of the end-user acceptability. The type and molecular weight of the film-forming polymer had a strong influence on stickiness perception, whereas only polymeric molecular weight influenced perceived disintegration time. The human panel study showed that Participant Reported Outcomes (PROs) for the perceived stickiness in the mouth and disintegration time of test films received significantly different scores between samples, and thus were identified as the key attributes with the

  14. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  15. The Genus Cerion (Gastropoda: Cerionidae in the Florida Keys.

    Directory of Open Access Journals (Sweden)

    Yesha Shrestha

    Full Text Available The systematic relationships and phylogeography of Cerion incanum, the only species of Cerion native to the Florida Keys, are reviewed based on partial sequences of the mitochondrial COI and 16S genes derived from 18 populations spanning the range of this species and including the type localities of all four described subspecies. Our samples included specimens of Cerion casablancae, a species introduced to Indian Key in 1912, and a population of C. incanum x C. casablancae hybrids descended from a population of C. casablancae introduced onto Bahia Honda Key in the same year. Molecular data did not support the partition of C. incanum into subspecies, nor could populations be apportioned reliably into subspecies based on morphological features used to define the subspecies. Phylogenetic analyses affirmed the derived relationship of C. incanum relative to other cerionids, and indicated a Bahamian origin for the Cerion fauna of southern Florida. Relationships among the populations throughout the Keys indicate that the northernmost populations, closest to the Tomeu paleoislands that had been inhabited by Cerion petuchi during the Calabrian Pleistocene, are the oldest. The range of Cerion incanum expanded as the archipelago that is the Florida Keys was formed since the lower Tarantian Pleistocene by extension from the northeast to the southwest, with new islands populated as they were formed. The faunas of the High Coral Keys in the northeast and the Oölite Keys in the southwest, both with large islands that host multiple discontinuous populations of Cerion, are each composed of well supported clades that are characterized by distinctive haplotypes. In contrast, the fauna of the intervening Low Coral Keys consist of a heterogeneous series of populations, some with haplotypes derived from the High Coral Keys, others from the Oölite Keys. Individuals from the C. incanum x C. casablancae hybrid population inhabiting the southeastern coast of Bahia

  16. Radiograph identifying means

    International Nuclear Information System (INIS)

    Sheldon, A.D.

    1983-01-01

    A flexible character-indentable plastics embossing tape is backed by and bonded to a lead strip, not more than 0.025 inches thick, to form a tape suitable for identifying radiographs. The lead strip is itself backed by a relatively thin and flimsy plastics or fabric strip which, when removed, allows the lead plastic tape to be pressure-bonded to the surface to be radiographed. A conventional tape-embossing gun is used to indent the desired characters in succession into the lead-backed tape, without necessarily severing the lead; and then the backing strip is peeled away to expose the layer of adhesive which pressure-bonds the indented tape to the object to be radiographed. X-rays incident on the embossed tape will cause the raised characters to show up dark on the subsequently-developed film, whilst the raised side areas will show up white. Each character will thus stand out on the developed film. (author)

  17. Evaluating FOMC forecast ranges: an interval data approach

    OpenAIRE

    Henning Fischer; Marta García-Bárzana; Peter Tillmann; Peter Winker

    2012-01-01

    The Federal Open Market Committee (FOMC) of the U.S. Federal Reserve publishes the range of members' forecasts for key macroeconomic variables, but not the distribution of forecasts within this range. To evaluate these projections, previous papers compare the midpoint of the ranges with the realized outcome. This paper proposes a new approach to forecast evaluation that takes account of the interval nature of projections. It is shown that using the conventional Mincer-Zarnowitz approach to ev...

  18. Phylogenetic distribution of extant richness suggests metamorphosis is a key innovation driving diversification in insects.

    Directory of Open Access Journals (Sweden)

    James L Rainford

    Full Text Available Insects and their six-legged relatives (Hexapoda comprise more than half of all described species and dominate terrestrial and freshwater ecosystems. Understanding the macroevolutionary processes generating this richness requires a historical perspective, but the fossil record of hexapods is patchy and incomplete. Dated molecular phylogenies provide an alternative perspective on divergence times and have been combined with birth-death models to infer patterns of diversification across a range of taxonomic groups. Here we generate a dated phylogeny of hexapod families, based on previously published sequence data and literature derived constraints, in order to identify the broad pattern of macroevolutionary changes responsible for the composition of the extant hexapod fauna. The most prominent increase in diversification identified is associated with the origin of complete metamorphosis, confirming this as a key innovation in promoting insect diversity. Subsequent reductions are recovered for several groups previously identified as having a higher fossil diversity during the Mesozoic. In addition, a number of recently derived taxa are found to have radiated following the development of flowering plant (angiosperm floras during the mid-Cretaceous. These results reveal that the composition of the modern hexapod fauna is a product of a key developmental innovation, combined with multiple and varied evolutionary responses to environmental changes from the mid Cretaceous floral transition onward.

  19. Key beliefs related to decisions for physical activity engagement among first-in-family students transitioning to university.

    Science.gov (United States)

    Cowie, Eloise; Hamilton, Kyra

    2014-08-01

    The current study investigated key beliefs related to decisions for physical activity (PA) engagement among first-in-family (FIF) students transitioning to university. FIF students (n = 157) completed an online questionnaire assessing standard theory of planned behaviour constructs and belief-based items. One week later, participants completed a follow-up questionnaire assessing self-reported PA during the previous week. Results identified a range of behavioural, normative, and control beliefs that were significantly correlated with both PA intention and behaviour. Various key beliefs were also identified in relation to FIF students' decisions to be regularly physically active, with behavioural beliefs such as "take up too much time", normative beliefs including "friends outside of university", and control beliefs such as "cost", identified. Finally, frequencies of those who strongly or fully accepted these beliefs were analysed, demonstrating that typically, a large number of FIF students did not hold the beliefs, and as such, these are relevant to target in resultant interventions. The current study effectively highlights a number of key beliefs that can be targeted in programs aimed at encouraging FIF students' PA. Further, the study addresses a gap in the literature of targeting FIF students, a cohort at risk for inactivity, and utilises a sound theoretical framework to identify the unique set of beliefs guiding decisions for PA for this at-risk community group.

  20. Toward identifying a broader range of social cognitive determinants of dietary intentions and behaviors.

    Science.gov (United States)

    Hankonen, Nelli; Absetz, Pilvikki; Kinnunen, Marja; Haukkala, Ari; Jallinoja, Piia

    2013-03-01

    Measurement of social cognitive variables is often restricted to long-term and health-related outcomes. A more comprehensive measurement of cognitive determinants would enable evidence-based design of health behavior interventions with a focus on the most relevant targets. The purpose of this study was to examine the relative impact of different social cognitive determinants on fruit and vegetable (FV) and fast food consumption. Finnish male conscripts (N = 855, age M = 20) filled in questionnaires on social cognitive factors when entering the military service, and on food consumption frequency after two months. The data were analysed using structural equation modeling. Physical well-being expectation and bad taste expectation were most strongly related to both FV and fat avoidance intentions. Perceived weight gain risk predicted fat avoidance intention, whereas perceived risk for other health problems predicted FV intention. Social self-efficacy was associated with FV intention only. Consumption of both FV and fast food was predicted by action planning and intention. A more careful evaluation of subtypes of social cognitions sheds light on the specific content behind motivation. Such understanding might help in designing more effective intervention messages. © 2012 The Authors. Applied Psychology: Health and Well-Being © 2012 The International Association of Applied Psychology.

  1. Structural identifiability of cyclic graphical models of biological networks with latent variables.

    Science.gov (United States)

    Wang, Yulin; Lu, Na; Miao, Hongyu

    2016-06-13

    Graphical models have long been used to describe biological networks for a variety of important tasks such as the determination of key biological parameters, and the structure of graphical model ultimately determines whether such unknown parameters can be unambiguously obtained from experimental observations (i.e., the identifiability problem). Limited by resources or technical capacities, complex biological networks are usually partially observed in experiment, which thus introduces latent variables into the corresponding graphical models. A number of previous studies have tackled the parameter identifiability problem for graphical models such as linear structural equation models (SEMs) with or without latent variables. However, the limited resolution and efficiency of existing approaches necessarily calls for further development of novel structural identifiability analysis algorithms. An efficient structural identifiability analysis algorithm is developed in this study for a broad range of network structures. The proposed method adopts the Wright's path coefficient method to generate identifiability equations in forms of symbolic polynomials, and then converts these symbolic equations to binary matrices (called identifiability matrix). Several matrix operations are introduced for identifiability matrix reduction with system equivalency maintained. Based on the reduced identifiability matrices, the structural identifiability of each parameter is determined. A number of benchmark models are used to verify the validity of the proposed approach. Finally, the network module for influenza A virus replication is employed as a real example to illustrate the application of the proposed approach in practice. The proposed approach can deal with cyclic networks with latent variables. The key advantage is that it intentionally avoids symbolic computation and is thus highly efficient. Also, this method is capable of determining the identifiability of each single parameter and

  2. Ranging Behaviour of Commercial Free-Range Laying Hens.

    Science.gov (United States)

    Chielo, Leonard Ikenna; Pike, Tom; Cooper, Jonathan

    2016-04-26

    In this study, the range use and behaviour of laying hens in commercial free-range flocks was explored. Six flocks were each visited on four separate days and data collected from their outdoor area (divided into zones based on distance from shed and available resources). These were: apron (0-10 m from shed normally without cover or other enrichments); enriched belt (10-50 m from shed where resources such as manmade cover, saplings and dust baths were provided); and outer range (beyond 50 m from shed with no cover and mainly grass pasture). Data collection consisted of counting the number of hens in each zone and recording behaviour, feather condition and nearest neighbour distance (NND) of 20 birds per zone on each visit day. In addition, we used techniques derived from ecological surveys to establish four transects perpendicular to the shed, running through the apron, enriched belt and outer range. Number of hens in each 10 m × 10 m quadrat was recorded four times per day as was the temperature and relative humidity of the outer range. On average, 12.5% of hens were found outside. Of these, 5.4% were found in the apron; 4.3% in the enriched zone; and 2.8% were in the outer range. This pattern was supported by data from quadrats, where the density of hens sharply dropped with increasing distance from shed. Consequently, NND was greatest in the outer range, least in the apron and intermediate in the enriched belt. Hens sampled in outer range and enriched belts had better feather condition than those from the apron. Standing, ground pecking, walking and foraging were the most commonly recorded activities with standing and pecking most likely to occur in the apron, and walking and foraging more common in the outer range. Use of the outer range declined with lower temperatures and increasing relative humidity, though use of apron and enriched belt was not affected by variation in these measures. These data support previous findings that outer range areas tend to be

  3. Ranging Behaviour of Commercial Free-Range Laying Hens

    Directory of Open Access Journals (Sweden)

    Leonard Ikenna Chielo

    2016-04-01

    Full Text Available In this study, the range use and behaviour of laying hens in commercial free-range flocks was explored. Six flocks were each visited on four separate days and data collected from their outdoor area (divided into zones based on distance from shed and available resources. These were: apron (0–10 m from shed normally without cover or other enrichments; enriched belt (10–50 m from shed where resources such as manmade cover, saplings and dust baths were provided; and outer range (beyond 50 m from shed with no cover and mainly grass pasture. Data collection consisted of counting the number of hens in each zone and recording behaviour, feather condition and nearest neighbour distance (NND of 20 birds per zone on each visit day. In addition, we used techniques derived from ecological surveys to establish four transects perpendicular to the shed, running through the apron, enriched belt and outer range. Number of hens in each 10 m × 10 m quadrat was recorded four times per day as was the temperature and relative humidity of the outer range. On average, 12.5% of hens were found outside. Of these, 5.4% were found in the apron; 4.3% in the enriched zone; and 2.8% were in the outer range. This pattern was supported by data from quadrats, where the density of hens sharply dropped with increasing distance from shed. Consequently, NND was greatest in the outer range, least in the apron and intermediate in the enriched belt. Hens sampled in outer range and enriched belts had better feather condition than those from the apron. Standing, ground pecking, walking and foraging were the most commonly recorded activities with standing and pecking most likely to occur in the apron, and walking and foraging more common in the outer range. Use of the outer range declined with lower temperatures and increasing relative humidity, though use of apron and enriched belt was not affected by variation in these measures. These data support previous findings that outer range

  4. Nutrition and healthy ageing: the key ingredients.

    Science.gov (United States)

    Kiefte-de Jong, Jessica C; Mathers, John C; Franco, Oscar H

    2014-05-01

    Healthy longevity is a tangible possibility for many individuals and populations, with nutritional and other lifestyle factors playing a key role in modulating the likelihood of healthy ageing. Nevertheless, studies of effects of nutrients or single foods on ageing often show inconsistent results and ignore the overall framework of dietary habits. Therefore, the use of dietary patterns (e.g. a Mediterranean dietary pattern) and the specific dietary recommendations (e.g. dietary approaches to stop hypertension, Polymeal and the American Healthy Eating Index) are becoming more widespread in promoting lifelong health. A posteriori defined dietary patterns are described frequently in relation to age-related diseases but their generalisability is often a challenge since these are developed specifically for the population under study. Conversely, the dietary guidelines are often developed based on prevention of disease or nutrient deficiency, but often less attention is paid to how well these dietary guidelines promote health outcomes. In the present paper, we provide an overview of the state of the art of dietary patterns and dietary recommendations in relation to life expectancy and the risk of age-related disorders (with emphasis on cardiometabolic diseases and cognitive outcomes). According to both a posteriori and a priori dietary patterns, some key 'ingredients' can be identified that are associated consistently with longevity and better cardiometabolic and cognitive health. These include high intake of fruit, vegetables, fish, (whole) grains and legumes/pulses and potatoes, whereas dietary patterns rich in red meat and sugar-rich foods have been associated with an increased risk of mortality and cardiometabolic outcomes.

  5. Lifelong Learning Key Competence Levels of Graduate Students

    Science.gov (United States)

    Adabas, Abdurrahman; Kaygin, Hüseyin

    2016-01-01

    The European Union defines lifelong learning as all activities aimed at improving an individual's knowledge, skills and competences individually, socially or vocationally throughout his/her life. In 2007, eight key competences necessary for lifelong learning were identified by the European Union Education and Culture Commission. These competences…

  6. Field Keys to Common Hawaiian Marine Animals and Plants.

    Science.gov (United States)

    Hawaii State Dept. of Education, Honolulu. Office of Instructional Services.

    Presented are keys for identifying common Hawaiian marine algae, beach plants, reef corals, sea urchins, tidepool fishes, and sea cucumbers. Nearly all species considered can be distinguished by characteristics visible to the naked eye. Line drawings illustrate most plants and animals included, and a list of suggested readings follows each…

  7. Identification of Key Indicators for Sustainable Construction Materials

    Directory of Open Access Journals (Sweden)

    Humphrey Danso

    2018-01-01

    Full Text Available Studies on sustainable construction materials are on the rise with their environmental, social, and economic benefits. This study identifies the key indicators for measuring sustainable construction materials. The design used for the study was that of a survey which relied on a questionnaire with five-point Likert scale to generate data for the analysis. For this purpose, 25 indicators from the three dimensions (environmental, social, and economic identified from the literature were presented to the respondents in a structured questionnaire, and responses were collected and analysed using SPSS. The study identified three key environmental indicators for measuring sustainable construction materials, and these indicators are human toxicity, climate change, and solid waste. Furthermore, adaptability, thermal comfort, local resources, and housing for all were identified as the four key social indicators for sustainable construction materials. In addition, maintenance cost, operational cost, initial cost, long-term savings, and life span were found to be the five key economic indicators for measuring sustainable construction materials. The study therefore suggests that these twelve indicators should be considered in future studies that seek to measure sustainable construction materials.

  8. The Key Pieces of the Career Survival and Success Puzzle.

    Science.gov (United States)

    Simonetti, Jack L.

    1999-01-01

    Analysis of career-success factors identified by 5,000 managers yielded 10 key pieces: excellent performance record, communication skills, interpersonal skills, personality, skill currency, significant work experiences, power, ability to withstand pressure, ability to make difficult decisions, and having a mentor. (SK)

  9. Positioning and deciding : key factors for talent development in soccer

    NARCIS (Netherlands)

    Kannekens, R.; Elferink-Gemser, M. T.; Visscher, C.

    2011-01-01

    Talent identification and development implicate recognizing youth players who will be successful in the future and guiding them to the top. A major determinant of this success is tactical skills. To identify possible key factors that help in predicting success over time, this study assesses the

  10. Key Elements of a Successful Drive toward Marketing Strategy Making

    Science.gov (United States)

    Cann, Cynthia W.; George, Marie A.

    2003-01-01

    A conceptual model is presented that depicts the relationship between an internal marketing function and an organization's readiness to learn. Learning and marketing orientations are identified as components to marketing strategy making. Key organizational functions, including communication and decision-making, are utilized in a framework for…

  11. Individual Ranging Behaviour Patterns in Commercial Free-Range Layers as Observed through RFID Tracking.

    Science.gov (United States)

    Larsen, Hannah; Cronin, Greg M; Gebhardt-Henrich, Sabine G; Smith, Carolynn L; Hemsworth, Paul H; Rault, Jean-Loup

    2017-03-09

    In this exploratory study, we tracked free-range laying hens on two commercial flocks with Radio Frequency Identification (RFID) technology with the aim to examine individual hen variation in range use. Three distinct outdoor zones were identified at increasing distances from the shed; the veranda [0-2.4 m], close range [2.4-11.4 m], and far range [>11.4 m]. Hens' movements between these areas were tracked using radio frequency identification technology. Most of the hens in both flocks (68.6% in Flock A, and 82.2% in Flock B) accessed the range every day during the study. Of the hens that accessed the range, most hens accessed all three zones (73.7% in Flock A, and 84.5% in Flock B). Hens spent half of their time outdoors in the veranda area. Within-individual consistency of range use (daily duration and frequency) varied considerably, and hens which were more consistent in their daily range use spent more time on the range overall ( p ranging behaviour may help elucidate the implications of ranging for laying hens.

  12. Quantum key distribution network for multiple applications

    Science.gov (United States)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  13. Electronic Nicotine Delivery Systems Key Facts Infographic

    Data.gov (United States)

    U.S. Department of Health & Human Services — Explore the Electronic Nicotine Delivery Systems Key Facts Infographic which outlines key facts related to electronic nicotine delivery systems (ENDS), including...

  14. Parametric Human Body Reconstruction Based on Sparse Key Points.

    Science.gov (United States)

    Cheng, Ke-Li; Tong, Ruo-Feng; Tang, Min; Qian, Jing-Ye; Sarkis, Michel

    2016-11-01

    We propose an automatic parametric human body reconstruction algorithm which can efficiently construct a model using a single Kinect sensor. A user needs to stand still in front of the sensor for a couple of seconds to measure the range data. The user's body shape and pose will then be automatically constructed in several seconds. Traditional methods optimize dense correspondences between range data and meshes. In contrast, our proposed scheme relies on sparse key points for the reconstruction. It employs regression to find the corresponding key points between the scanned range data and some annotated training data. We design two kinds of feature descriptors as well as corresponding regression stages to make the regression robust and accurate. Our scheme follows with dense refinement where a pre-factorization method is applied to improve the computational efficiency. Compared with other methods, our scheme achieves similar reconstruction accuracy but significantly reduces runtime.

  15. Key Nuclear Verification Priorities: Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  16. Key Nuclear Verification Priorities - Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  17. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  18. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  19. Improved Range Searching Lower Bounds

    DEFF Research Database (Denmark)

    Larsen, Kasper Green; Nguyen, Huy L.

    2012-01-01

    by constructing a hard input set and query set, and then invoking Chazelle and Rosenberg's [CGTA'96] general theorem on the complexity of navigation in the pointer machine. For the group model, we show that input sets and query sets that are hard for range reporting in the pointer machine (i.e. by Chazelle...... and Rosenberg's theorem), are also hard for dynamic range searching in the group model. This theorem allows us to reuse decades of research on range reporting lower bounds to immediately obtain a range of new group model lower bounds. Amongst others, this includes an improved lower bound for the fundamental...

  20. Short-range fundamental forces

    International Nuclear Information System (INIS)

    Antoniadis, I.; Baessler, S.; Buchner, M.; Fedorov, V.V.; Hoedl, S.; Nesvizhevsky, V.V.; Pignol, G.; Protasov, K.V.; Lambrecht, A.; Reynaud, S.; Sobolev, Y.

    2010-01-01

    We consider theoretical motivations to search for extra short-range fundamental forces as well as experiments constraining their parameters. The forces could be of two types: 1) spin-independent forces; 2) spin-dependent axion-like forces. Different experimental techniques are sensitive in respective ranges of characteristic distances. The techniques include measurements of gravity at short distances, searches for extra interactions on top of the Casimir force, precision atomic and neutron experiments. We focus on neutron constraints, thus the range of characteristic distances considered here corresponds to the range accessible for neutron experiments

  1. Safety assessment of outdoor live fire range

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1989-05-01

    The following Safety Assessment (SA) pertains to the outdoor live fire range facility (LFR). The purpose of this facility is to supplement the indoor LFR. In particular it provides capacity for exercises that would be inappropriate on the indoor range. This SA examines the risks that are attendant to the training on the outdoor LFR. The outdoor LFR used by EG&G Mound is privately owned. It is identified as the Miami Valley Shooting Grounds. Mondays are leased for the exclusive use of EG&G Mound.

  2. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  3. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  4. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  5. Periods of child growth up to age 8 years in Ethiopia, India, Peru and Vietnam: Key distal household and community factors

    OpenAIRE

    Schott, Whitney B.; Crookston, Benjamin T.; Lundeen, Elizabeth A.; Stein, Aryeh D.; Behrman, Jere R.

    2013-01-01

    Recent research has demonstrated some growth recovery among children stunted in infancy. Less is known about key age ranges for such growth recovery, and what factors are correlates with this growth. This study characterized child growth up to age 1 year, and from ages 1 to 5 and 5 to 8 years controlling for initial height-for-age z-score (HAZ), and identified key distal household and community factors associated with these growth measures using longitudinal data on 7,266 children in the Youn...

  6. Dynamic range majority data structures

    DEFF Research Database (Denmark)

    Elmasry, Amr Ahmed Abd Elmoneim; He, Meng; Munro, J. Ian

    2011-01-01

    Given a set P of n coloured points on the real line, we study the problem of answering range α-majority (or "heavy hitter") queries on P. More specifically, for a query range Q, we want to return each colour that is assigned to more than an α-fraction of the points contained in Q. We present a ne...

  7. Range Compressed Holographic Aperture Ladar

    Science.gov (United States)

    2017-06-01

    entropy saturation behavior of the estimator is analytically described. Simultaneous range-compression and aperture synthesis is experimentally...4 2.1 Circular and Inverse -Circular HAL...2.3 Single Aperture, Multi-λ Imaging ...................................................................................... 14 2.4 Simultaneous Range

  8. Precise Range Determination Using Laser Ranging Data of LAGEOS

    Directory of Open Access Journals (Sweden)

    Kwang-Ryul Kim

    1993-12-01

    Full Text Available Satellite laser ranging observation of LAGEOS ¥± has been performed using the SLR System at Sheshan Laser Ranging Station, Shanghai Observatory. And we obtained 1,838 observational points The observed range data is corrected by means of system delay correction using ground target observation, atmospheric refraction delay correction, offset correction, general relativistic correction and tide correction including solid tide, polar tide and ocean tide. As a result, the determined range delay mean value is 19.12m and the mean internal accuracy by means of polynomial fitting and least square method is ¡¾7cm. Corrected observational points are 1,340 and noise ratio to total observational points is 27.1%

  9. VICKEY: Mining Conditional Keys on Knowledge Bases

    OpenAIRE

    Symeonidou , Danai; Galárraga , Luis; Pernelle , Nathalie; Saïs , Fatiha; Suchanek , Fabian

    2017-01-01

    International audience; A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs of millions of facts. We also show that the conditional keys we mine can improve the quality of entity linking by up to 47 percentage points.

  10. Foraging optimally for home ranges

    Science.gov (United States)

    Mitchell, Michael S.; Powell, Roger A.

    2012-01-01

    Economic models predict behavior of animals based on the presumption that natural selection has shaped behaviors important to an animal's fitness to maximize benefits over costs. Economic analyses have shown that territories of animals are structured by trade-offs between benefits gained from resources and costs of defending them. Intuitively, home ranges should be similarly structured, but trade-offs are difficult to assess because there are no costs of defense, thus economic models of home-range behavior are rare. We present economic models that predict how home ranges can be efficient with respect to spatially distributed resources, discounted for travel costs, under 2 strategies of optimization, resource maximization and area minimization. We show how constraints such as competitors can influence structure of homes ranges through resource depression, ultimately structuring density of animals within a population and their distribution on a landscape. We present simulations based on these models to show how they can be generally predictive of home-range behavior and the mechanisms that structure the spatial distribution of animals. We also show how contiguous home ranges estimated statistically from location data can be misleading for animals that optimize home ranges on landscapes with patchily distributed resources. We conclude with a summary of how we applied our models to nonterritorial black bears (Ursus americanus) living in the mountains of North Carolina, where we found their home ranges were best predicted by an area-minimization strategy constrained by intraspecific competition within a social hierarchy. Economic models can provide strong inference about home-range behavior and the resources that structure home ranges by offering falsifiable, a priori hypotheses that can be tested with field observations.

  11. High Precision Ranging and Range-Rate Measurements over Free-Space-Laser Communication Link

    Science.gov (United States)

    Yang, Guangning; Lu, Wei; Krainak, Michael; Sun, Xiaoli

    2016-01-01

    We present a high-precision ranging and range-rate measurement system via an optical-ranging or combined ranging-communication link. A complete bench-top optical communication system was built. It included a ground terminal and a space terminal. Ranging and range rate tests were conducted in two configurations. In the communication configuration with 622 data rate, we achieved a two-way range-rate error of 2 microns/s, or a modified Allan deviation of 9 x 10 (exp -15) with 10 second averaging time. Ranging and range-rate as a function of Bit Error Rate of the communication link is reported. They are not sensitive to the link error rate. In the single-frequency amplitude modulation mode, we report a two-way range rate error of 0.8 microns/s, or a modified Allan deviation of 2.6 x 10 (exp -15) with 10 second averaging time. We identified the major noise sources in the current system as the transmitter modulation injected noise and receiver electronics generated noise. A new improved system will be constructed to further improve the system performance for both operating modes.

  12. Key Biodiversity Areas in the Philippines: Priorities for Conservation

    Directory of Open Access Journals (Sweden)

    R.G.R. Ambal

    2012-08-01

    Full Text Available A process for identifying Key Biodiversity Areas (KBAs for the Philippines was undertaken in two phases. The 128 terrestrial and freshwater KBAs were identified in 2006 and the 123 marine KBAs were identified in 2009. A total of 228 KBAs resulted from the integration of the terrestrial, freshwater and marine KBAs. These KBAs represent the known habitat of 855 globally important species of plants, corals, molluscs, elasmobranchs, fishes, amphibians, reptiles, birds and mammals in the country. Inclusion of these KBAs in the country’s protected area system will be a significant step towards ensuring the conservation of the full scope of the country’s natural heritage.

  13. Why and how might genetic and phylogenetic diversity be reflected in the identification of key biodiversity areas?

    Science.gov (United States)

    Brooks, T M; Cuttelod, A; Faith, D P; Garcia-Moreno, J; Langhammer, P; Pérez-Espona, S

    2015-02-19

    'Key biodiversity areas' are defined as sites contributing significantly to the global persistence of biodiversity. The identification of these sites builds from existing approaches based on measures of species and ecosystem diversity and process. Here, we therefore build from the work of Sgró et al. (2011 Evol. Appl. 4, 326-337. (doi:10.1111/j.1752-4571.2010.00157.x)) to extend a framework for how components of genetic diversity might be considered in the identification of key biodiversity areas. We make three recommendations to inform the ongoing process of consolidating a key biodiversity areas standard: (i) thresholds for the threatened species criterion currently consider a site's share of a threatened species' population; expand these to include the proportion of the species' genetic diversity unique to a site; (ii) expand criterion for 'threatened species' to consider 'threatened taxa' and (iii) expand the centre of endemism criterion to identify as key biodiversity areas those sites holding a threshold proportion of the compositional or phylogenetic diversity of species (within a taxonomic group) whose restricted ranges collectively define a centre of endemism. We also recommend consideration of occurrence of EDGE species (i.e. threatened phylogenetic diversity) in key biodiversity areas to prioritize species-specific conservation actions among sites.

  14. Key personality traits of sales managers.

    Science.gov (United States)

    Lounsbury, John W; Foster, Nancy A; Levy, Jacob J; Gibson, Lucy W

    2014-01-01

    Sales managers are crucial for producing positive sales outcomes for companies. However, there has been a relative dearth of scholarly investigations into the personal attributes of sales managers. Such information could prove important in the recruitment, selection, training needs identification, career planning, counseling, and development of sales managers. Drawing on Holland's vocational theory, we sought to identify key personality traits that distinguish sales managers from other occupations and are related to their career satisfaction. The main sample was comprised of a total of 978 sales managers employed in a large number of companies across the United States (along with a comparison sample drawn from 79,512 individuals from other professional occupations). Participants completed an online version of Resource Associates' Personal Style Inventory as well a measure of career satisfaction. Our sample of 978 sales managers had higher levels of Assertiveness, Customer Service Orientation, Extraversion, Image Management, Optimism, and Visionary Style; and lower levels of Conscientiousness, Agreeableness, Intrinsic Motivation, Openness, and Tough-Mindedness than a sample of 79,512 individuals in a variety of other occupations. Nine of these traits were significantly correlated with sales managers' career satisfaction. Based on the results, a psychological profile of sales managers was presented as were implications for their recruitment, selection, training, development, and mentoring.

  15. KEY PERFORMING FACTORS OF LEADING ROMANIAN COMPANIES

    Directory of Open Access Journals (Sweden)

    BURJA CAMELIA

    2014-08-01

    Full Text Available The analysis of financial economic ratios provides managers and external partners feedback on the results obtained from operational activities and the associated performance and risks. This paper studies the functional dependence of the companies’ success (on performance over internal financial management elements. The research was carried out for the most traded non-financial securities Bucharest listed companies and covers the period 2011- 2013. To carry out its purpose it analyzed the interdependence between the key financial ratios, studying the impact of liquidity ratios, solvency and efficiency on profitability. The study provides empirical evidences to identify factors that have ensured the performance of companies and their ranking in the segment of the most traded companies in Romania. Results suggest the view that the source of company success on the capital market lies in the positive signals sent to investors regarding profitability and the low risk of solvency. This study gives additional information for managerial decision-making in order to create more value and a better positioning of the companies in the market

  16. On inertial range scaling laws

    International Nuclear Information System (INIS)

    Bowman, J.C.

    1994-12-01

    Inertial-range scaling laws for two- and three-dimensional turbulence are re-examined within a unified framework. A new correction to Kolmogorov's k -5/3 scaling is derived for the energy inertial range. A related modification is found to Kraichnan's logarithmically corrected two-dimensional enstrophy cascade law that removes its unexpected divergence at the injection wavenumber. The significance of these corrections is illustrated with steady-state energy spectra from recent high-resolution closure computations. The results also underscore the asymptotic nature of inertial-range scaling laws. Implications for conventional numerical simulations are discussed

  17. GPS test range mission planning

    Science.gov (United States)

    Roberts, Iris P.; Hancock, Thomas P.

    The principal features of the Test Range User Mission Planner (TRUMP), a PC-resident tool designed to aid in deploying and utilizing GPS-based test range assets, are reviewed. TRUMP features time history plots of time-space-position information (TSPI); performance based on a dynamic GPS/inertial system simulation; time history plots of TSPI data link connectivity; digital terrain elevation data maps with user-defined cultural features; and two-dimensional coverage plots of ground-based test range assets. Some functions to be added during the next development phase are discussed.

  18. E-Commerce Performance. Shopping Cart Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Mihaela I. MUNTEAN

    2016-01-01

    Full Text Available In an e-commerce performance framework is important to identify the key performance indicators that measure success and together provide the greatest context into the business perfor-mance. Shopping carts are an essential part of ecommerce, a minimal set of key performance indicators being the subject of our debate. The theoretical approach is sustained by a case study, an e-shop implemented using PHP and MySQL, for simulating main business processes within the considered performance framework. Our approach opens a perspective for future research using additional indicators in order to properly evaluate the global performance of any e-shop.

  19. Mapping key antecedents of employee-driven innovations

    DEFF Research Database (Denmark)

    Smith, Pernille; Ulhøi, John Parm; Kesting, Peter

    2012-01-01

    Research on employee-driven innovation (EDI) is still in its infancy, and as yet there is no independent body of literature on the topic. The aim of this paper is to review existing insights into the key antecedents of EDI in other research contexts. In particular, we focus on: leader support......, autonomy, collaboration, and organisational norms of exploration. The main contribution of this paper is to discuss how these key antecedents apply to the specific case of EDI and to identify an agenda for new research....

  20. Low acclimation capacity of narrow-ranging thermal specialists exposes susceptibility to global climate change.

    Science.gov (United States)

    Markle, Tricia M; Kozak, Kenneth H

    2018-05-01

    Thermal acclimation is hypothesized to offer a selective advantage in seasonal habitats and may underlie disparities in geographic range size among closely-related species with similar ecologies. Understanding this relationship is also critical for identifying species that are more sensitive to warming climates. Here, we study North American plethodontid salamanders to investigate whether acclimation ability is associated with species' latitudinal extents and the thermal range of the environments they inhabit. We quantified variation in thermal physiology by measuring standard metabolic rate (SMR) at different test and acclimation temperatures for 16 species of salamanders with varying latitudinal extents. A phylogenetically-controlled Markov chain Monte Carlo generalized linear mixed model (MCMCglmm) was then employed to determine whether there are differences in SMR between wide- and narrow-ranging species at different acclimation temperatures. In addition, we tested for a relationship between the acclimation ability of species and the environmental temperature ranges they inhabit. Further, we investigated if there is a trade-off between critical thermal maximum (CTMax) and thermal acclimation ability. MCMCglmm results show a significant difference in acclimation ability between wide and narrow-ranging temperate salamanders. Salamanders with wide latitudinal distributions maintain or slightly increase SMR when subjected to higher test and acclimation temperatures, whereas several narrow-ranging species show significant metabolic depression. We also found significant, positive relationships between acclimation ability and environmental thermal range, and between acclimation ability and CTMax. Wide-ranging salamander species exhibit a greater capacity for thermal acclimation than narrow-ranging species, suggesting that selection for acclimation ability may have been a key factor enabling geographic expansion into areas with greater thermal variability. Further

  1. Intentionally Short Range Communications (ISRC)

    Science.gov (United States)

    1993-05-01

    molecular oxygen in the atmosphere at 60 GHz (figure 9 LIppolito, 1981]). The MMW range is similar to that of the UV links. 3.3.1 Variable Range Similar to...option also requires that the signal be strong enough to overcome the noise from the solar and background sources, although the molecular oxygen and... emisions . Lasing will occur only within the cavity when the alignment is correct and not lasing othem ise. Such a cavity is dcteclable only when an observer

  2. Key processes from tree to stand level

    International Nuclear Information System (INIS)

    Hinckley, T.; Ford, D.; Segura, G.; Sprugel, D.

    1991-01-01

    Changes in six factors have been identified as having potential major future impacts on the productivity and survival of forest trees and stands. These factors are atmospheric carbon dioxide concentration, tropospheric ozone concentration, mean annual air temperature and precipitation, extremes in temperature and precipitation, and levels of ultraviolet radiation. Except for precipitation, all of these factors are expected to increase with climatic change. However, the likelihood of their increase or change ranges from the given to the unknown. The way in which one or more of these factors might individually or in combination affect the productivity and survival of trees is discussed, and particularly sensitive physiological processes are identified. For example, increases in winter temperature and a doubling of CO 2 will result in early budburst in many species and therefore increase the risk of frost damage. In other species or locations, warm winters may mean insufficient chilling hours and the requirements for release from bud dormancy may not be met. The interaction of these processes with current species distribution, genotype selection, and management alternatives is reviewed. 52 refs., 1 fig., 1 tab

  3. Remote sensing of key grassland nutrients using hyperspectral techniques in KwaZulu-Natal, South Africa

    Science.gov (United States)

    Singh, Leeth; Mutanga, Onisimo; Mafongoya, Paramu; Peerbhay, Kabir

    2017-07-01

    The concentration of forage fiber content is critical in explaining the palatability of forage quality for livestock grazers in tropical grasslands. Traditional methods of determining forage fiber content are usually time consuming, costly, and require specialized laboratory analysis. With the potential of remote sensing technologies, determination of key fiber attributes can be made more accurately. This study aims to determine the effectiveness of known absorption wavelengths for detecting forage fiber biochemicals, neutral detergent fiber, acid detergent fiber, and lignin using hyperspectral data. Hyperspectral reflectance spectral measurements (350 to 2500 nm) of grass were collected and implemented within the random forest (RF) ensemble. Results show successful correlations between the known absorption features and the biochemicals with coefficients of determination (R2) ranging from 0.57 to 0.81 and root mean square errors ranging from 6.97 to 3.03 g/kg. In comparison, using the entire dataset, the study identified additional wavelengths for detecting fiber biochemicals, which contributes to the accurate determination of forage quality in a grassland environment. Overall, the results showed that hyperspectral remote sensing in conjunction with the competent RF ensemble could discriminate each key biochemical evaluated. This study shows the potential to upscale the methodology to a space-borne multispectral platform with similar spectral configurations for an accurate and cost effective mapping analysis of forage quality.

  4. Modeling key processes causing climate change and variability

    Energy Technology Data Exchange (ETDEWEB)

    Henriksson, S.

    2013-09-01

    Greenhouse gas warming, internal climate variability and aerosol climate effects are studied and the importance to understand these key processes and being able to separate their influence on the climate is discussed. Aerosol-climate model ECHAM5-HAM and the COSMOS millennium model consisting of atmospheric, ocean and carbon cycle and land-use models are applied and results compared to measurements. Topics at focus are climate sensitivity, quasiperiodic variability with a period of 50-80 years and variability at other timescales, climate effects due to aerosols over India and climate effects of northern hemisphere mid- and high-latitude volcanic eruptions. The main findings of this work are (1) pointing out the remaining challenges in reducing climate sensitivity uncertainty from observational evidence, (2) estimates for the amplitude of a 50-80 year quasiperiodic oscillation in global mean temperature ranging from 0.03 K to 0.17 K and for its phase progression as well as the synchronising effect of external forcing, (3) identifying a power law shape S(f) {proportional_to} f-{alpha} for the spectrum of global mean temperature with {alpha} {approx} 0.8 between multidecadal and El Nino timescales with a smaller exponent in modelled climate without external forcing, (4) separating aerosol properties and climate effects in India by season and location (5) the more efficient dispersion of secondary sulfate aerosols than primary carbonaceous aerosols in the simulations, (6) an increase in monsoon rainfall in northern India due to aerosol light absorption and a probably larger decrease due to aerosol dimming effects and (7) an estimate of mean maximum cooling of 0.19 K due to larger northern hemisphere mid- and high-latitude volcanic eruptions. The results could be applied or useful in better isolating the human-caused climate change signal, in studying the processes further and in more detail, in decadal climate prediction, in model evaluation and in emission policy

  5. SPARQL-enabled identifier conversion with Identifiers.org

    Science.gov (United States)

    Wimalaratne, Sarala M.; Bolleman, Jerven; Juty, Nick; Katayama, Toshiaki; Dumontier, Michel; Redaschi, Nicole; Le Novère, Nicolas; Hermjakob, Henning; Laibe, Camille

    2015-01-01

    Motivation: On the semantic web, in life sciences in particular, data is often distributed via multiple resources. Each of these sources is likely to use their own International Resource Identifier for conceptually the same resource or database record. The lack of correspondence between identifiers introduces a barrier when executing federated SPARQL queries across life science data. Results: We introduce a novel SPARQL-based service to enable on-the-fly integration of life science data. This service uses the identifier patterns defined in the Identifiers.org Registry to generate a plurality of identifier variants, which can then be used to match source identifiers with target identifiers. We demonstrate the utility of this identifier integration approach by answering queries across major producers of life science Linked Data. Availability and implementation: The SPARQL-based identifier conversion service is available without restriction at http://identifiers.org/services/sparql. Contact: sarala@ebi.ac.uk PMID:25638809

  6. SPARQL-enabled identifier conversion with Identifiers.org.

    Science.gov (United States)

    Wimalaratne, Sarala M; Bolleman, Jerven; Juty, Nick; Katayama, Toshiaki; Dumontier, Michel; Redaschi, Nicole; Le Novère, Nicolas; Hermjakob, Henning; Laibe, Camille

    2015-06-01

    On the semantic web, in life sciences in particular, data is often distributed via multiple resources. Each of these sources is likely to use their own International Resource Identifier for conceptually the same resource or database record. The lack of correspondence between identifiers introduces a barrier when executing federated SPARQL queries across life science data. We introduce a novel SPARQL-based service to enable on-the-fly integration of life science data. This service uses the identifier patterns defined in the Identifiers.org Registry to generate a plurality of identifier variants, which can then be used to match source identifiers with target identifiers. We demonstrate the utility of this identifier integration approach by answering queries across major producers of life science Linked Data. The SPARQL-based identifier conversion service is available without restriction at http://identifiers.org/services/sparql. © The Author 2015. Published by Oxford University Press.

  7. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  8. Identifying specific interstellar polycyclic aromatic hydrocarbons

    International Nuclear Information System (INIS)

    Mulas, Giacomo; Malloci, Giuliano; Porceddu, Ignazio

    2005-01-01

    Interstellar Polycyclic Aromatic Hydrocarbons (PAHs) have been thought to be ubiquitous for more than twenty years, yet no single species in this class has been identified in the Interstellar Medium (ISM) to date. The unprecedented sensitivity and resolution of present Infrared Space Observatory (ISO) and forthcoming Herschel observations in the far infrared spectral range will offer a unique way out of this embarrassing impasse

  9. Identifying motivational factors within a multinational company

    Directory of Open Access Journals (Sweden)

    Daniela Bradutanu

    2011-08-01

    Full Text Available The aim of the study is to identify the main motivational factors within a multinational company. The first objective is to identify work functions, formulated on Abraham Maslow’s pyramid, following the identification of the key characteristics that motivate an employee at the work place and last, but not least, the type of motivation that employees focus, intrinsic or extrinsic. The research method targeted a questionnaire based survey, including various company employees and an interview with the manager. The results confirmed that in Romania, employees put great emphasis on extrinsic motivation, a certain income and job security being primary. These results have implications for managers that in order to effectively motivate staff, first, must know their needs and expectations. To identify the main needs and motivational factors we had as a starting point Maslow's pyramid.

  10. Establishing Key Performance Indicators : Case company X

    OpenAIRE

    Singh, Jatinder

    2015-01-01

    The key performance indicators serve as the navigational tools for a business organization to monitor its performance. They enable the management team to take real time decisions to keep organization’s resources aligned to its business strategy to accomplish its strategic objec-tives. This research was conducted to analyse the process of establishing successful key per-formance indicators for a business organization. The research was conducted to recommend key performance indicators developme...

  11. Competency Assessment Using Key Performance Indicators

    OpenAIRE

    Elena Alexandra Toader; Laura Brad

    2015-01-01

    The paper proposes a method for computing the scores of the key performance indicators resulted in the competency assessment process. The key performance indicators are estimated considering four performance levels that an IT professional can obtain at the end of the assessment process. We suggest as the best approach for estimating the performance key indicators an online questionnaire filled by 60 employees that work in IT Romanian companies. The results provide evidence that the difference...

  12. Enciphered Data Steganography Using Secret Key

    Directory of Open Access Journals (Sweden)

    BANGALORE G.Tilak

    2010-10-01

    Full Text Available A new method is proposed to maintain thesecrecy of data by enciphering and embedding using asecret key. There is no restriction on the length of thekey used to encipher and embed the data. Since the keyis not stored for validation, it prevents unauthorizedaccess to the key, even if decoding procedure is known.The correct message can be recovered only with thespecific key used in encipherment and embedding. Thismethod can also be used for multiple levelsteganography.

  13. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  14. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  15. EPA Monthly Key Performance Indicator Dashboards 2017

    Science.gov (United States)

    Each month, the Web Analytics Program posts updated Key Performance Indicator (KPI) dashboards that correspond to three Web performance goals: content consumption, content discovery, and audience engagement.

  16. Nickel exposure from keys: a Brazilian issue.

    Science.gov (United States)

    Suzuki, Nathalie Mie; Duarte, Ida Alzira Gomes; Hafner, Mariana de Figueiredo Silva; Lazzarini, Rosana

    2017-01-01

    Keys are a significant source of exposure to metal allergens and can be a relevant problem for nickel-allergic individuals. This study aimed to perform nickel and cobalt spot testing among the 5 most common Brazilian brands of keys. Among the tested keys, 100% showed positive result to nickel spot test, 83,3% presented strong positive reaction. 50% exhibited cobalt release as well. Nickel release from keys is very common in our country and may cause a negative impact on sensitized individual's quality of life. Study's results highlight the importance of establishing directives to regulate nickel release in Brazil.

  17. Brain insulin signaling: a key component of cognitive processes and a potential basis for cognitive impairment in type 2 diabetes

    Science.gov (United States)

    McNay, Ewan C.; Recknagel, Andrew K.

    2011-01-01

    Understanding of the role of insulin in the brain has gradually expanded, from initial conceptions of the brain as insulin-insensitive through identification of a role in regulation of feeding to recent demonstration of insulin as a key component of hippocampal memory processes. Conversely, systemic insulin resistance such as that seen in type 2 diabetes is associated with a range of cogntive and neural deficits. Here we review the evidence for insulin as a cognitive and neural modulator, including potential effector mechanisms, and examine the impact that type 2 diabetes has on these mechanisms in order to identify likely bases for the cognitive impairments seen in type 2 diabetic patients. PMID:21907815

  18. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  19. Eye safe laser range finders

    International Nuclear Information System (INIS)

    Snir, M.; Margaliot, M.; Amitzi, A.

    2004-01-01

    During the 1970's, Ruby (Q switched) laser based range finders with a wavelength of 694nm were first used. These lasers operated in a pulse mode within the visible light range and produced a risk for the eye retina. The laser beam striking the macula could damage the eye and might cause blindness. Over the years, Nd:YAG (Q switched) lasers were developed (operating at 1064nm) for range finding and designation uses. The wavelength of these lasers, operating in the near Infra-Red range (invisible), is also focused tightly on the retina. The human eye does not respond to the invisible light so there is no natural protection (eye blink reflex) as in the visible light. The operation of these lasers worldwide, especially when the laser beam is exposed, causes occasional eye accidents. Another risk is stemming from the use of observation systems with a high optical gain, in the laser operation areas, which enlarge the range of risk quite significantly. Therefore, research and development efforts were invested in order to introduce eye safe lasers. One of the solutions for this problem is presented in following document

  20. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  1. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  2. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  3. Key Features of the Manufacturing Vision Development Process

    DEFF Research Database (Denmark)

    Dukovska-Popovska, Iskra; Riis, Jens Ove; Boer, Harry

    2005-01-01

    of action research. The methodology recommends wide participation of people from different hierarchical and functional positions, who engage in a relatively short, playful and creative process and come up with a vision (concept) for the future manufacturing system in the company. Based on three case studies......This paper discusses the key features of the process of Manufacturing Vision Development, a process that enables companies to develop their future manufacturing concept. The basis for the process is a generic five-phase methodology (Riis and Johansen 2003) developed as a result of ten years...... of companies going through the initial phases of the methodology, this research identified the key features of the Manufacturing Vision Development process. The paper elaborates the key features by defining them, discussing how and when they can appear, and how they influence the process....

  4. GEA CRDA Range Data Analysis

    Science.gov (United States)

    1999-07-28

    E1, July-August 1998 18 3.3. Example 3: SatMex, Solidaridad 2, May-June 1998 27 3.4. Example 4: PanAmSat, Galaxy IV, May-June 1998 33 3.5...17 Millstone measurements residuals for Telstar 401 on Days 181-263. 26 3-18 Millstone measurement residuals for Solidaridad 1 on Days 141-153...with 29 SatMex range data. 3-19 Hermosillo B-- Solidaridad 1 range residuals through Days 135-144 with bias 30 removed. 3-20 Iztapalapa D

  5. Offshore wind power experiences, potential and key issues for deployment

    Energy Technology Data Exchange (ETDEWEB)

    Lemming, J.; Morthorst, P.E.; Clausen, Niels-Erik

    2009-01-15

    Wind power has been growing at spectacular rates. Today it is the largest non-hydro renewable power technology. Worldwide there is 74 GW of installed capacity which is 1.7% of power generation capacity and in 2006 it accounted for 0.82% of electricity production. However, offshore wind still only counts for a very small amount and development has only taken place in North European counties round the North Sea and the Baltic Sea over the last 15 years. Offshore wind is still some 50% more expensive than onshore wind, but more wind resources and lesser visual impacts from larger turbines are expected to compensate for the higher installation costs in the long term. Most offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs of installing wind energy in the UK are between 1,200 to 1,600 GBP/kW (1,781 to 2,375 Euro/kW) offshore, while in Sweden investment costs were 1,800 Euro/kW, and in Denmark 1,200 to 1,700 Euro/kW, though investment costs for a new wind farm are expected be in the range of 2.0 to 2.2 mill. Euro/MW for a near-shore shallow depth facility. Future developments in offshore wind technology concerning aerodynamics, structural dynamics, structural design, machine elements, electrical design and grid integration could drive investment costs from present-day range of 1.9 to 2.2 mill. Euro/MW down to 1.35 - 1.54 mill.Euro/MW in 2050, which accounts for a reduction of costs of approx. 35%. In order to sum up progress and identify future research needs, the International Energy Agency (IEA) Wind agreement Task 11 should arrange a new meeting concerning long term research needs for reviewing 'the long term strategy for 2000 to 2020' from 2001, to come up with suggestions / recommendations on how to define and proceed with, the necessary research activities of the IEA Wind Agreement and governments involved on key wind issues related to offshore technologies. (au)

  6. Key elements of communication in cancer care.

    Science.gov (United States)

    Maex, E; De Valck, C

    2006-01-01

    In this chapter the "communication compass" is introduced. It defines the key elements of communication and provides a language with which to communicate about communication in cancer care. The communication compass consists of two axes. One axis defines the associated perspectives of the clinician and the patient, the other axis the content of information and emotional experience. "Two lovers sat on a park bench with their bodies touching each other, holding hands in the moonlight. There was silence between them. So profound was their love for each other, they needed no words to express it." (Samuel Johnson). Sometimes communication just flows. There are these special moments, as fleeting as they are intense. Often communication is stuck. It is as if we speak another language and never manage to understand one another. The lovers on the park bench need no words to express what they feel, neither do they need words to speak about communication. Where communication gets stuck, we need a suitable language to speak about communication. Professional communication cannot be learned from a cookbook. Most of all it implies a readiness to communicate, which means openness to the other. The old adage that it is impossible not to communicate is only true if no criterion of quality is applied. As soon as some mutual understanding is implied in the definition of communication, the fact that it is at all possible to communicate becomes a miracle. Since there is an important gap between theory and practice, we created a tool that aims to bridge that gap. We call it the communication compass. It does not propose a model of "ideal communication," but provides a language with which to examine and analyze specific situations and to determine what the pitfalls and possibilities are. It is useful as a tool for identifying communicational difficulties in daily clinical practice and it can serve as a model for training basic communication skills.

  7. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  8. Quantum key distribution using three basis states

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics; Volume 54; Issue 5. Quantum key distribution using three ... This note presents a method of public key distribution using quantum communication of photons that simultaneously provides a high probability that the bits have not been tampered. It is a variant of the quantum ...

  9. Optimizing Key Updates in Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Sensor networks offer the advantages of simple and low–resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the key points in security, which...

  10. Locks & keys service moves to building 55

    CERN Multimedia

    2012-01-01

    Please note that as of July 12 Locks & keys service will be at building 55 second floor. The opening hours are as follows: 08:30 am to 12:30 pm - 1:30 pm to 5:30 pm. The procedures and rules relating to applications for key and cylinder have not changed. GI-IS Group

  11. Strategy Keys as Tools for Problem Solving

    Science.gov (United States)

    Herold-Blasius, Raja

    2017-01-01

    Problem solving is one of the main competences we seek to teach students at school for use in their future lives. However, when dealing with mathematical problems, teachers encounter a wide variety of difficulties. To foster students' problem-solving skills, the authors developed "strategy keys." Strategy keys can serve as material to…

  12. Secure key distribution by swapping quantum entanglement

    International Nuclear Information System (INIS)

    Song, Daegene

    2004-01-01

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes

  13. A survey on exploring key performance indicators

    Directory of Open Access Journals (Sweden)

    Mohammed Badawy

    2016-12-01

    Full Text Available Key Performance Indicators (KPIs allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI's either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for exploring and predicting key performance indicators (KPIs.

  14. Optimal grazing management strategies: evaluating key concepts ...

    African Journals Online (AJOL)

    Finally, overstocking will override key management initiatives, such as effective recovery periods, leading to rangeland degradation. Thus, in variable climates, stocking rate should be set conservatively to allow easier adaptation of animal numbers to rainfall variability from year to year. We suggest several key concepts that ...

  15. Basic roles of key molecules connected with NMDAR signaling pathway on regulating learning and memory and synaptic plasticity

    Institute of Scientific and Technical Information of China (English)

    Hui Wang; Rui-Yun Peng

    2016-01-01

    With key roles in essential brain functions ranging from the long-term potentiation (LTP) to synaptic plasticity,the N-methyl-D-aspartic acid receptor (NMDAR) can be considered as one of the fundamental glutamate receptors in the central nervous system.The role of NMDA R was first identified in synaptic plasticity and has been extensively studied.Some molecules,such as Ca2+,postsynaptic density 95 (PSD-95),calcium/calmodulin-dependent protein kinase Ⅱ (CaMK Ⅱ),protein kinase A (PKA),mitogen-activated protein kinase (MAPK) and cyclic adenosine monophosphate (cAMP) responsive element binding protein (CREB),are of special importance in learning and memory.This review mainly focused on the new research of key molecules connected with learning and memory,which played important roles in the NMDAR signaling pathway.

  16. Wide range neutron monitoring device

    International Nuclear Information System (INIS)

    Okido, Fumiyasu; Arita, Setsuo; Ishii, Kazuhiko; Matsumiya, Shoichi; Furusato, Ken-ichiro; Nishida, Akira.

    1994-01-01

    The present invention has a function of reliably switching measuring values between a pulse method and a Cambel method even if noise level and saturated level are fluctuated. That is, a proportional range judging means always monitors neutron flux measuring values in a start-up region and neutron flux measuring values in an intermediate power region, so that the proportional range is detected depending on whether the difference or a variation coefficient of both of the measured values is constant or not. A switching value determining means determines a switching value by the result of judgement of the proportional range judging means. A selection/output means selects and outputs measuring signals at a neutron flux level in the start-up region or the intermediate power region by the output of the switching value determining means. With such procedures, since the measuring value is switched after confirming that arrival at the proportional range where the difference or a variation coefficient of the measured value between the pulse processing method and the measured value by the Cambel method is constant, an accurate neutron flux level containing neither noise level nor saturated level can be outputted. (I.S.)

  17. Truthful approximations to range voting

    DEFF Research Database (Denmark)

    Filos-Ratsika, Aris; Miltersen, Peter Bro

    We consider the fundamental mechanism design problem of approximate social welfare maximization under general cardinal preferences on a finite number of alternatives and without money. The well-known range voting scheme can be thought of as a non-truthful mechanism for exact social welfare...

  18. Heteronuclear Long-Range Correlation

    DEFF Research Database (Denmark)

    Sørensen, Ole W.

    The lecture will cover heteronuclear long-range correlation techniques like HMBC, H2BC, and HAT HMBC with the emphasis on determining the number of covalent bonds between two spins being correlated. H2BC and HMBC spectra are quite complementary as a peak can be strong in one of the two spectra...

  19. Multiparty quantum key agreement with single particles

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  20. Key Questions in Building Defect Prediction Models in Practice

    Science.gov (United States)

    Ramler, Rudolf; Wolfmaier, Klaus; Stauder, Erwin; Kossak, Felix; Natschläger, Thomas

    The information about which modules of a future version of a software system are defect-prone is a valuable planning aid for quality managers and testers. Defect prediction promises to indicate these defect-prone modules. However, constructing effective defect prediction models in an industrial setting involves a number of key questions. In this paper we discuss ten key questions identified in context of establishing defect prediction in a large software development project. Seven consecutive versions of the software system have been used to construct and validate defect prediction models for system test planning. Furthermore, the paper presents initial empirical results from the studied project and, by this means, contributes answers to the identified questions.